Intrusion detection method for electric vehicle charging station based on interpretable lightweight gradient boosting machine
姚沁怡,龙莆均,陈世伦
Research on online training security system based on zero-trust architecture
秦文远,安宁
Data-driven network security situational awareness and prediction
吴宝江
A method for event extraction from lengthy news texts
武剑涛,李俊达,李佰文,淮晓永
Research on a coagulation dosing model incorporating convolutional neural networks
李泽楷,章杰
A communication signal modulation identification method based on DRSN-GAN
刘高辉,顾家华
Review of the data security review system in Belgium
赵丽莉1,劳鑫鑫2
A systematic design for parallel entitlement to medical data property rights among multiple subjects
刘云,玄立杰
Research on the design and operation of the public data authorization operation platform based on practice analysis
王萍萍,李哲行,魏贝
Reflections and progress on the paradigm for identifying unfair competition in data scraping——based on the analysis of 44 judicial documents
陈雅婷,陈曦,曹煜鹏
The application of the informed-consent rule in the protection of laborers′ personal information Liu Tiantian,Tang Min
刘甜甜,汤敏
The new developments and enlightenments of the EU′s cross-border electronic evidence collection system in criminal matters
孙键
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。