Technology graph and application prospect of reconnaissance image processing in naval battlefield
王培元,吴凤芳,关 欣
Research on the evaluation of enterprise negative events online public opinion response level
陈淑琴,王筱莉,张 静
Security modeling of driving mode switching in GoA4 level automatic operation system
谢迎锋1,王 蓉2
Research progress of honeypot-based ICS security protection technology
李 实1,万佳蓉2,林显盛3
Application research of SM9 in ubiquitous Internet of Things
边杏宾,马俊明,胡志勇,郑伟伟
Dynamic taint analysis based on code rewriting
梁 威1,洪 倩2
Accurately classify software requirements using prompt learning on BERT
罗贤昌,薛吟兴
Dynamic soft sensor of average particle size in PTA process based on differential evolution algorithm
郭储磊
Research on adversarial attack risk of automatic credit approval model
林琴萍1,李 庚1,崔润邦2,邓 江2
Integrated design of new smart city construction based on "urban brain"
林游龙
Communication network topology discovery method based on connection relation
朱 瑾,俞 璐,姚昌华,邓 祥
Research on monitoring technology of TTP data bus
刘智武,周 耿,孟 悦
Study on medical device traceability monitoring system based on blockchain technology
谢亚平1,王云光2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。