[1] |
Zelin LU, Yan CHEN.
The theoretical connotation, realistic challenges, and practical path on marketization for data
[J]. Information and Communications Technology and Policy, 2022, 48(1): 11-18.
|
[2] |
Yuxia SHI.
Data element market situation, problems and suggestions
[J]. Information and Communications Technology and Policy, 2022, 48(1): 19-23.
|
[3] |
WEI Liang, TIAN Huirong, .
Development status and trend of network security.
[J]. Information and Communications Technology and Policy, 2021, 47(8): 17-23.
|
[4] |
SUN Limin, PAN Zhiwen, LYU Shichao, SHI Zhiqiang, ZHU Hongsong, .
Risk analysis and countermeasure design for Industrial Internet under the scenario of Intelligent Manufacturing
[J]. Information and Communications Technology and Policy, 2021, 47(8): 24-29.
|
[5] |
CHEN Qing, LI Han, DU Yuejin, ZHANG Yirong, .
Practice and thinking of cyberspace surveying and mapping technology
[J]. Information and Communications Technology and Policy, 2021, 47(8): 30-38.
|
[6] |
ZHANG Feng, YU Le, MA Yusheng, ZHANG Hongyang, JIANG Weiqiang, .
Research and practice of data security classification and grading
[J]. Information and Communications Technology and Policy, 2021, 47(8): 45-50.
|
[7] |
LI Xiaowei, WU Ying, ZOU Yu, BAI Yunfei, .
Research on data security governance architecture and technology
[J]. Information and Communications Technology and Policy, 2021, 47(8): 51-55.
|
[8] |
NING Tingyong, XIONG Jie, HU Yongbo, .
Research on security threats of AI application landing
[J]. Information and Communications Technology and Policy, 2021, 47(8): 64-68.
|
[9] |
LONG Guilu, PAN Dong, .
Progress in quantum secure direct communication
[J]. Information and Communications Technology and Policy, 2021, 47(7): 1-7.
|
[10] |
ZHAO Jingwu, ZHOU Ruijue .
Privacy preserving computing: the construction of synchronization rules for data flow and data security
[J]. Information and Communications Technology and Policy, 2021, 47(7): 53-.
|
[11] |
WEI Wei, NIU Jinhang, JING Huiyun.
Build security system to escort the development of new infrastructure for artificial intelligence
[J]. Information and Communications Technology and Policy, 2021, 47(5): 11-14.
|
[12] |
LIN Meiyu, WANG Qi.
The overview of EU 5G security regulatory model
[J]. Information and Communications Technology and Policy, 2021, 47(5): 60-66.
|
[13] |
YANG Zhengjun, ZHANG Guohua, SHI Yuxia, GAO Fuping.
Research on the problems of digital advertising identifier and countermeasures
[J]. Information and Communications Technology and Policy, 2021, 47(3): 41-48.
|
[14] |
CHE Lijun, TIAN Bo, ZHANG Huazhi, WU Jiawei.
Practice of privacy protection for telecommunications users
[J]. Information and Communications Technology and Policy, 2021, 47(2): 68-73.
|
[15] |
WANG Qi.
The research on the security risks of 5G clouds
[J]. Information and Communications Technology and Policy, 2021, 47(2): 92-96.
|