Research on the scheme and mode of data sovereign exchange platform
房殿军1,2,郑卓远1,洪 晟3,韩佳良1,向佳豪1,蒋红琰1,2,4
Intelligent clothing detection within a washing machine based on data sovereignty
谢海琴,杨 雯,肖 琳
Research on repair method in Industrial Internet of Things based on attack anomaly characteristics
赵剑明1,2,3,4,曾 鹏1,2,3,袁 辉5
Case study on data governance in digital transformation of optical fiber industry
汪 洋1,王 柯1,张桃宁1,韩 蕊1,彭艳兵1,2,汤国强1,2
Research on fuzzy test method of the detection ability of in-vehicle CAN bus intrusion detection algorithm
田韵嵩1,李中伟1,谭 凯1,洪 晟2,刘 勇1,金显吉1
Application research for remote monitoring and fault diagnosis of locomotive
谢 利1,洪 晟2,谢经广1,董先明1
Research on the security application of encrypted multi-source collaborative for power big data
杨赟博1,2,胡雪晖1,洪 晟3
Research on security monitoring method of Docker container engine based on OpenStack cloud platform
崔 轲,燕 玮,刘子健,张慕榕,贾星威,许凤凯
Method for deleting duplicate domain name data based on Simhash algorithm
侯开茂,韩庆敏,吴云峰,黄 兵,张久发,柴处处
Research on network security problems and countermeasures under the background of wisdom campus
张 鸿,高晓艳
Abnormal user behavior detection algorithm based on dynamic time span and cluster difference index
詹 麟1,曾献辉1,2,代凯旋1
凡《网络安全与数据治理》(原《信息技术与网络安全》)录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。