Data Factory: an emerging form of national data infrastructure
张茜茜1, 殷宏宇2,杨光3
Research on the composition, construction models and operation mechanisms of data factories
涂群1,耿贵宁2,张茜茜3
Data components: a trusted abstraction and encapsulation method for cross-domain data flow
林绍福1,李云江1,王宇航2,贾晓丰2
Analysis of the current situation, problems, and development suggestions for national data infrastructure construction
李哲行1,何凌昊2,刘海阳1,王萍萍1,陆晓宁1
A two-stage feature selection method for network attack detection in UAV networks
邓琬巾1,文新2,李维皓1,张玮石1,白猛1
A malware behavior detection method based on the fusion of multi-scale CNN and Transformer
刘帅1,2,王小英1,2,戚盼盼1,2,崔方方1,2,谷瑞泽1,2
A joint framework of graph neural networks integrating multisource heterogeneous data
胡开明,陈建华
Multi-objective optimization for enhanced explainability in medical imaging models
李海芳1,2,3,唐超3,岳鑫3,张强1,2
Research on construction technology of intelligent question-answering system based on knowledge bases of data center
王亮,张强,魏韵萧
The shaping mechanism of the comprehensive network governance system under the concept of community
马嘉阳
Research on the application of trusted data space in the power industry
国丽,朱永春,丁浩
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。