Research on method of network assets detection
邵 磊1,余 晓2,吴剑章1
Overview of server performance evaluation methods
李 亮1,2,3,李安昊1,2,方鲁杰1,2,3,张 宇1,2,3,李锁在1,2,3,徐志亮1,2,3,袁 泉1,2,3
Research on PLC development trend in industrial Internet era
原崇蛟,郭肖旺,贡春燕
A study of the problems in security regulation of China′s enterprise data cross-border transfer
焦小妹,沈本秋
Research on big data governance system of railway
王 喆
Code vulnerability detection based on multi-relational graph neural network
潘禺涵1,舒远仲1,洪 晟2,罗 斌1,聂云峰1
An adaptive insider threat detection model based on user portrait
李俊强1,黄 洪1,2,周子云1
Security analysis of TLS1.3 protocol based on HCPN model
陈真好1,田学成2
The legal attribution of IP location and platform liability review
严 驰
Dual path image super-resolution reconstruction algorithm based on residual network
谢余杭
Research on the capability evaluation system of industrial Internet security supervision platform
金夏垚1,黄 颖2,周成胜3
Research on the influence of digital input on business performance of manufacturing enterprises in Yangtze River Delta
朱妍妍1,吕阳阳2,齐佳音3
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。