A survey of intrusion detection technology on industrial control system
刘 睿1,2,洪 晟3,李 伟1,2,王 欣1,2
Entity relation extraction method for quality text of industrial manufacturing based on Piecewise Convolutional Neural Network
张 彤1,宋明艳1,王 俊1,2,白 洋1
An active immune protection design for industrial control system based on trust root of TPCM
孙 瑜,洪 宇,王炎玲
Key technology construction and future evolution direction of security operation automation based on SOAR
赵粤征,叶建伟,贠 珊,郭兰杰
Application research of national secret algorithm in industrial Internet security
苏彬庭1,2,陈明志3,许 力1,2,周赵斌1,2
Research on gesture recognition method for automatic vision detection
何启莉,何家峰,郭 娟
A remote sensing image target recognition method based on improved Mask R-CNN model
余慧明,周志祥,彭 杨,崔志斌
Quantitative analysis method of gas mixture based on deep residual network
詹灿坚,何家峰,骆德汉
An indoor positioning method for fine timing measurement
赵跃新1,林 杰1,2,刘 鹏1,赵志佳1
Design of intelligent meter communication system based on LoRa
刘羽轩1,蔡高琰2,梁炳基2,骆德汉1,何家峰1
New energy charging pile shared charging management scheme based on blockchain
匡图上青1,祁 宏1,周盛文1,段桂华1,段红松2
Latent path analysis test of bus port with 1553B bus circuit cold backup application
刘士全,曹晓斌,蔡洁明,王 栋
Click farm identification method based on dense subgraph mining
郑赜一,王 澎
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。