Research on comprehensive evaluation methods of security effectiveness in cyber range
王晓菲,闫子淇,张茜,王亚洲,战海心,曾颖明
Design and implementation of multi-channel 10G network security device
王硕1,胡现刚2,杨欢1,黄毅龙1,姬胜凯1
Design and implementation of multi-channel 10G network security device
陈春娣,龚忠慧
Attribute access control scheme supporting data sensitivity grading
张绮文1,袁凌云1,2,王孜冉1
Research on the implementation path and strategies for "Network De-NAT" in Macau
陈健1,蔡智明2,齐佳音3
Key technologies for data self-sensing access in data space
谢云龙1,宋雨伦1,徐文静1,孙林1,高泽昕2
Temporal rotation knowledge graph completion based on hybrid attention mechanism
王璐璐
Research on forest fire detection technology based on improved YOLOv8
杜世泽,银皓,丰大军,句海洋,刘天龙,李帅蓉,姚云
Practical solutions of algorithm impact assessment system
王宇晓1,2,吴少卿2,张静怡1,2
Research and reflection on the development of the marketization of government and enterprise data factors
宋姝媛1,乔亲旺1,王岩1,范国浩2
Privacy protection and efficiency improvement of public data authorization operation: based on the IAD framework
赵诗佳
Open circulation of enterprise data elements in China: dynamics, causes of the current situation and data space solutions
李啸宇,夏磊,吕东阳,逯登成,李晓楠
The dilemma and way out for the network platform to process personal information to inform consent
袁莹莹
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。