A survey of provenance graph-based methods for advanced persistent threat detection
张䶮1,2,杨晓帆1,2
Research on ransomware protection based on kernel instruction detection technology
靳京
Research on the construction of network security protection for industrial control system of tobacco commercial enterprises
王晔1,万佳蓉1,荆琛1,钟湘琼2
Research on trusted protection solution of mobile police terminal and edge equipment
赵荣辉1,王志宇1, 苏禹2
Construction of geographical knowledge graphs based on large language models and its security applications
刘颖1,2,李勇1
A data modeling framework driven by knowledge graphs and ontologies
徐睿1,2,刘金1,2,冯志1,2,张雅勤1,2,董伟1,2
Review and refinement of China′s cross-border data flow rules under the E-Commerce Agreement framework
何云富,赵庆超
Definition of sensitive personal information and improvement of the path of handling
朱鸿静
Research and analysis on the structure and development of China′s data industry
李哲行,曾建,魏伟,魏贝,王萍萍
Review of the current situation and optimization path of the order of civil public interest litigation for personal information protection
刘栩
Design and implementation of wind power data analysis platform based on SCADA
王芯,徐颂,冷柯
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。