A review of IoT intrusion detection systems based on deep learning
周品希,沈岳,李伟
Design and implementation of lightweight IPsec encryption based on wireless Ad hoc network
张卫敏1,焦运良1,王硕2,郑和芳2,张攀1
A traceable ring signature scheme based on Dilithium algorithm
刘健1,2,王伊婷1,严妍3,霍珊珊1,李艳俊1
Research on firewall security policy configuration and analysis methods
李沛婷,陈飞,鲁知朋
Design of wireless passive long-distance reconfigurable security sensing terminal
邓洋1,张世杰1,刘成旺1,李征1,冉君1,钟永明1,王坚1,施昶2,李钢2
A multi-label text classification method based on a mixed-granularity global graph
王哲,温秀梅
The research on the eligible subjects of data trust trustee
徐漪,罗蓉蓉
Research on the situation, current status, and mechanism of cross-border data flow in China——taking the free trade zone as an example
徐浩1,王建1,王思博1,黄岩2
Research on China′s public data authorization operation policy under three-dimensional policy tools
乔舒静,姜景,陈悦
Rights infringements and institutional responses to deepfake commercial application software: an empirical analysis based on court judgments
孙辉
Research on the command and decision-making support platform for space launch missions and key technologies
杜兵,李林峰,靳书云,杜超
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。