Research on design and application of industrial data security monitoring method based on NTA
胡冰蔚1,洪 晟2,王泽政3,李鹏超3,刘博宇1,冼 峰4,赵立鸣4
Digital twins based attack and defense verification technology for water industrial control systems
陈 升1,2,宗志锋1,倪 华2,黄非易3,刘 虹3
Text classification method for equipment quality problems based on failure mode
费清春1,史莹莹1,曾庆国2
Research on classification method of private industrial control protocol
周 帅,王绍杰
Research on industrial intrusion detection method based on 1d-MSCNN+GRU model
宗学军,宋治文,何 戡,连 莲
Design of industrial Internet platform security system based on Cloud computing
林南南,曹紫薇,刘志钢
Design and application of localized ubiquitous Internet of Things security protection system
曾 彬,苏亮源,文吉刚
Personalized upgrade method for smart contracts in power supply chain scenarios
李 达1,2,王 栋1,2,阮倩昀3,柏德胜1,4,许洪华5,霍冬冬3
Research on the security protection strategy of industrial control network in key industries based on classified security protection standard 2.0
张 悦1,荆 琛2,衣 然2
Research on patching strategy of industrial control system vulnerability
周 磊,姜双林,饶志波
Research on traceability model of discrete manufacturing process information for complex products
梁军义,李智皓,刘 伟
Brief analysis of challenges faced by the construction of industrial Internet security related legal system in China
肖洢柟,洪 晟
An web automated testing framework based on unittest and selenium
单攀攀
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。