Overview of network intrusion detection technology based on machine learning
张茜,王晓菲,王亚洲,尚颖,王芳鸣,曾颖明
Architecture design of secure operation and maintenance management platform for cloud desktop environment
王中华1,2,张鹏1,2,刘中一1,2,黄向平1,2
Security analysis and attack feasibility study on WPA3-SAE
申海霞,李涵,赵斐,曹铁勇
Research on the theory and typical applications of operating system behavior
祝林,邬江,刘克斌,钟杰
Adaptive image tracing technology based on fractional transform domain digital watermark
孟燕雨1,唐雪译1,2,李维皓1
Design of identity authentication and encrypted communication scheme based on identity-based cryptograph technology
钱锋,谢丹绮
Research on multi-source heterogeneous big data governance architecture based on cloud-edge-end
许政,阮西玥,陈祥浩
Text data entity recognition based on muti-head convolution residual connections
刘微,李波,杨思瑶
Research on current situation and countermeasures of the data asset registration platform
陈晨,温士苇,王思博,宋姝媛,姚倩
Data security compliance risks and countermeasures under the data elements
王冬梅1,谭睿1,魏伟2,李宏辉3,许朝1
Research on anti-unfair competition regulation of Internet public data crawling behavior
胡佳泺
Security risks and governance paradigm for cross-border data flows of Generative AI
姚迁,刘晋名,盛小宝
Anti-monopoly law protection of consumer personal information rights and interests from multiple regulatory perspectives
沈雅君,黄佳钰
The dilemma of duty performance and regulatory strategies for personal information protection officers
张冬阳,周晨宇
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。