Research on abnormal network traffic detection based on machine learning and rule-based methods
尤刚1,徐蕾2,李美鹏1,刘文杰1,张鹏1,陆振奎2
Research on network security monitoring technology for large unmanned wind farm based on neural network
邱情芳1,曹学铭1,王丹丹1,蔡继峰1,李新华1,周成胜2
A dual-modal fusion approach for ZigBee device identification
李荣,赖怡聪,李乐言
Research and practice on the localization of Gansu earthquake information system
董思秀,马晓妹,朱琳,李艳芹,张婧瑶
A robust blind watermarking method for databases based on additive noise
李程,张国栋
Research on data desensitization technology based on differential privacy
李思慧1,戴明超1,蔡伍洲2
Dynamic storage of data in permissioned blockchain networks
刘新璐1,闫皓楠2,张平1,庄兴昌1,严超1
Research on the cooperation paths of data governance in emerging industries among ASEAN, China, Japan and South Korea
张礼明1,2,刘小茵1,2,高智伟1,2,刘丕群1,2,郭伟龙1,2
Analysis and interpretation of the negative list system for data export from China′s pilot free trade zones
单博深1,丁妤2,左晓栋3
Exploring the development path of network identity authentication public service under three-dimensional perspective
李佳强
Criminal law regulation of cyber harassment
陈佳雯
The legitimate basis and content system of social responsibility of data processors
陆格非
Design and application of distributed cloud platform for quality control of typical special equipment
曹宏伟1,周前飞2,张莉君3,庆光蔚2,李歌1,唐海龙2
Research on data mining and analysis of tunnel working face
孙明宇,王利民,王首晨
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。