Advanced persistent threat monitoring and traceability technology for industrial networks
赵云龙1,霍朝宾1,于运涛1,王绍杰1,鲁华伟2
A bidirectional privacy protection method based on anonymous query
郭丞,陶晓英,魏立钧,徐文涛,戴荣峰
Research on the security protection of data′s entire life cycle in the financial industry
孔德亮,王弢,刘静远
Intrusion detection based on self-supervised graph neural networks and hybrid neural networks
王明
Privacy-preserving decision-making method for electrolytic aluminum production
曾凡锋,杨玉丽
Heuristic multi-agent path finding VIA imitation learning and reinforcement learning
郭传友,刘志飞,田景志,刘先忠
Study on staffer-post matching methods based on information tag hierarchy
武国斌,张之明,杨文欣
Research on the framework of assisting technology for implementation of personal information protection compliance audit
刁毅刚1,张玲翠2,刘晓蒙3
An empirical analysis on the new round of provincial-level data management institution reform
李哲行,曾建,魏贝
Research on the innovative development of cultural digitalization under the background of data factorization
宋姝媛,乔亲旺,夏磊,李啸宇,陈晨
Research on the system construction and practice path of a data governance for smart party building in universities
曲丽君,赵树林,王存鹏,牟肖光,王海
The discussion on the denial of civil subject qualification of artificial intelligence
陈思敏,蔡唱
Standardized development and practical implementation of real-time data services for intelligent oilfields based on a data lake platform
牛永胜1,岳翔2,陈维汉1,王思楠3
Design and implementation of multi-satellite measurement and control system
杨欢,姬胜凯,王硕,张姗,李斌
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。