A fingerprint recognition technology for power IoT devices integrating multidimensional information
卢列文1,刘佳烨2,杨盛明1
Research on the classification model of security threats in industrial control system
万佳蓉,王晔,张雷,刘奇,李春阳,周帅
Integrated practice based on Cybersecurity Classified Protection 2.0 validation testing and the ATT&CK matrix
颜星晨1,2,张鑫1,2,周志洪1,2,陈恺凡1,2
Research on key technologies of industrial terminal security protection based on zero trust
孙国锋1,曾彬2,唐宁1
Blockchain-based framework design for copyright protection of digital cultural heritage resources
胡君仪1,赵庆聪2,3
Adaptive cleaning and intelligent transformation framework for large-scale heterogeneous data migration
许文静,安宁,于重,刘珠慧
Explainable methods for layer-wise evaluating noise resistance of deep networks
周瑞丰1,栾瑞鹏2,张超1
Optimization of XGBoost indoor positioning method with HF and fluctuation parameter assistance
刘高辉,凌凤智
Algorithmic administration in the framework of due process: challenge relief and regulatory reconstruction
王潘
The causes, risks and governance of personal information dissemination in online public opinion
李源
Comparative study on personal data development and utilization models in major countries worldwide
滕皓琳1,宋姝媛1,乔亲旺2,陈晨1,李啸宇1
Practical dilemmas and rule optimization in the protection of commercial data against unfair competition
司雨,王波
凡《信息技术与网络安全》录用的文章,如作者没有关于汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权等版权的特殊声明,即视作该文章署名作者同意将该文章的汇编权、翻译权、印刷权及电子版的复制权、信息网络传播权与发行权授予本刊,本刊有权授权本刊合作数据库、合作媒体等合作伙伴使用。同时,本刊支付的稿酬已包含上述使用的费用,特此声明。