Research on the composition, construction models and operation mechanisms of data factories
涂群1,耿贵宁2,张茜茜3
Data components: a trusted abstraction and encapsulation method for cross-domain data flow
林绍福1,李云江1,王宇航2,贾晓丰2
Analysis of the current situation, problems, and development suggestions for national data infrastructure construction
李哲行1,何凌昊2,刘海阳1,王萍萍1,陆晓宁1
A two-stage feature selection method for network attack detection in UAV networks
邓琬巾1,文新2,李维皓1,张玮石1,白猛1
A malware behavior detection method based on the fusion of multi-scale CNN and Transformer
刘帅1,2,王小英1,2,戚盼盼1,2,崔方方1,2,谷瑞泽1,2
A joint framework of graph neural networks integrating multisource heterogeneous data
胡开明,陈建华
Multi-objective optimization for enhanced explainability in medical imaging models
李海芳1,2,3,唐超3,岳鑫3,张强1,2
Research on construction technology of intelligent question-answering system based on knowledge bases of data center
王亮,张强,魏韵萧
The shaping mechanism of the comprehensive network governance system under the concept of community
马嘉阳
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。