Research on personal trusted confirmation scheme for risk control of electronic payment
樊 凯1,韩小军2,汪 书3
Analysis of HTTP Slow DDoS attack mechanism and research on defense strategy and architecture of OpenStack cloud platform
白翼铭,燕 玮,许凤凯,郝 帅,范春雷
Research on credit system construction and privacy protection system based on the IoT
林美玉1,韩海庭2,吴 晖3
Research on industrial Internet data security classification and grading protection framework
张雪莹,杨帅锋,王冲华,李 俊,陈雪鸿
Maximum power point tracking for photovoltaic array using improved whale algorithm
孙荣霞,尚娅慧,韩 帅
Research and module development of visibility analysis based on ray tracing
陈 川,任 强,邓金华
Garbage image classification algorithm based on residual structure and ghost module
郑佑顺1,2,林珊玲2,3,林志贤1,2,周雄图1,2,郭太良1,2
Public opinion sentiment analysis of automobile enterprises based on attention mechanism and Bi-LSTM
李宸严,刘 继
Research on SSD-Mobilenet model optimization based on K-Means algorithm
刘津龙,贾郭军
Application of 5G virtual private network based on MEC in home appliance manufacturing industry
汪双兔1,汪海旸2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。