A review of data lineage relationship construction methods
吕琳1,田庆业2,焦冬冬1,郭金磊1,房志奇1,陈瑞1
A fuzz testing method for industrial control protocols based on representation learning and reinforcement learning
何戡1,2,王植1,2,史洪岩1,2,连莲1,2,孙逸菲1,2,宁博伟2,3,宗学军1,2
Research on log anomaly detection method based on autoencoder
杨光1,雷玉芳2,王鹏2,孙强2,闫凯鑫1,朱燕1,潘号龙1,王旭仁3
Research on a multi-dimensional security defense model for the Internet of Things
黎珂
Design and implementation of a high-performance industrial power conversion module
殷宇朝,王营营,刘泽华,霍毅,刘晖,赵斌卿
Research on low-altitude aircraft recognition technology based on YOLOv8n and attention mechanism
杨光飞1,2,张蕾蕾1
Research on data traceability of the original library in data middle platform based on origin annotation
周学文,薛猛
The practice of the international microdata value mining and its implications: from the perspective of privacy computing technology
董波1,2,高金莎1,2,方丹1,2
The theoretical logic and mechanism design of data element empowering lowaltitude economic development
陈晨1,乔亲旺2,宋姝媛1,李啸宇1,滕皓琳1
The typological reconstruction of data competition behaviors and the regulatory responses
李佐
Conflicts and corrections in the attribution logic of tort liability legislation for artificial intelligence
徐榕岭
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。