Research on high reliable RTK service framework of Beidou satellite navigation system based on blockchain
袁小溪1,孙 舟1,陈 平1,及洪泉1,刘祥璐1,潘鸣宇1,陈思源2,3
Blockchain abnormal transaction detection based on network representation learning
张晓琦1,白 雪2,李光松1,王永娟3
Blockchain-based artificial intelligence detection model for medical data
陈思源1,2,谭艾迪3,魏双剑3,盖珂珂2,4
Application and research on DCMM based evaluation of university data governance capability
张国宝
Big data modeling and security analysis of epidemic situation investigation in public security work
田学成1,韩 宁2
Research on the behavior monitoring of virtual currency mining Trojan
周成胜1,2,董 伟3,崔枭飞1,2,葛悦涛1,2
Intrusion detection method of Internet of Things based on combined neural network
曾凡锋,谢世游,王景中
Detecting advanced persistent threats through provenance graph in node level
罗汉新,王金双,伍文昌
Static detection technique for malicious code based on feature sequences
魏利卓,石春竹,许凤凯,张慕榕,郝 娇
Online multi-label feature selection algorithm based on binary relevance strategy
张永伟1,2,朱 祁1,2,吴永城1,2
A piecewise linear fusion localization algorithm for wireless sensor networks
李 锋,魏楚强
Enterprise tacit knowledge propagation model with consideration of knowledge base
钱梦迪,王筱莉,张 静,陈淑琴
Research on the application of spatiotemporal coding technology in Web3.0 digital finance
田力男1,孙 琦1,聂二保2,朱 江2
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。