The current development and future trend of data trading market in ChinaWang
王江,姜伟,王普
Research on security risks and response strategies of cloud based industry software
孟祥曦,姚欢,杜洪涛
Research on fuzzing of industrial control protocol based on generative adversarial network
宗学军1,2,隋一凡1,2,王国刚1,2,宁博伟2,3,何戡1,2,连莲1,2,孙逸菲1,2
Design of DNS based Zero Trust enhanced authentication system
邹立刚1,张逸凡1,张新跃2,袁建廷3
Research on risk URL detection based on Boosting ensemble learning
冯美琪1,2,李赟1,2,蒋冰1,2,王立松1,2,刘春波3,陈伟1,2
Ethereum malicious address detection method based on transaction time decay
梁飞1,石文君2,苏则燊3,张敏4
Analysis of Russian AI regulation policies: framework, characteristics and implications
张涛,翟梦婷
A textual study of cultural policies in Chinese provincial five-year plans based on Word2Vec and LDA topic model
高娜1,东梅2
Application and research of master data coding rules based on condition setting
于百勇,杨旭,易危香,呼雨欣,马彬焱
The rationale and path of platform data monopoly compliance under the digital economy
陈镜霖
Challenges and paths to responsible development of generative AI
邓臻宇
Conflict resolution of data-related legal norms: form and substance dichotomy
柴雪映
From a legislative perspective: a fourfold conceptual definition and distinction between "Information" and "Data"
靳雨露
The dilemma of the application of the CPTPP security exception provision under data sovereignty and relief
陈思怡
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。