[1] |
TAN Qingling, XIE Lijing.
Analysis of the data security risk of Internet of Vehicles and the solutions
[J]. Information and Communications Technology and Policy, 2020, 46(8): 37-40.
|
[2] |
YANG Chunbaixue, CHEN Tian.
Epidemic response and data protection in Europe and America
[J]. Information and Communications Technology and Policy, 2020, 46(8): 63-67.
|
[3] |
WANG Yanyan, GUI Li, CAI Yafen.
Research on the evaluation of user data protection of IoV
[J]. Information and Communications Technology and Policy, 2020, 46(8): 68-71.
|
[4] |
WANG Chen, SONG Liang.
Research on data security protection system of Industrial Internet
[J]. Information and Communications Technology and Policy, 2020, 46(4): 7-11.
|
[5] |
WANG Zhuo, LIU Guowei, WANG Yan, LI Yuan.
Research on the development and trend of data masking technology
[J]. Information and Communications Technology and Policy, 2020, 46(4): 18-22.
|
[6] |
ZHOU Jun, WANG Xianqiang.
Research of government data security in the construction of new-type smart city
[J]. Information and Communications Technology and Policy, 2020, 46(3): 29-33.
|
[7] |
LIU Xiaoman, DONG Yue, ZHANG Yu, YANG Dongmei.
The IoT Security Maturity Model Practitioner's Guide and its enlightment for China
[J]. Information and Communications Technology and Policy, 2020, 46(2): 57-60.
|
[8] |
GOU Wenqi, LI Mingqiang, HUANG Dekan.
Analysis and significance of attack protection response in APT supply chain
[J]. Information and Communications Technology and Policy, 2020, 46(2): 65-68.
|
[9] |
GUO Jiannan.
Network data security analysis of new technologies and new services in the telecommunications industry
[J]. Information and Communications Technology and Policy, 2020, 46(2): 69-73.
|
[10] |
XU Minghui, JIN Le, FENG Xiaopeng.
Research on smart city construction and big data security
[J]. Information and Communications Technology and Policy, 2020, 46(11): 39-43.
|
[11] |
DONG Yue, LI Yi, QIN Guoying, LI Shan.
Research of data security in Industrial Internet
[J]. Information and Communications Technology and Policy, 2020, 46(10): 38-41.
|
[12] |
WANG Juanjuan, SONG Kai.
Analysis on risk and countermeasures of cross-border data flow
[J]. Information and Communications Technology and Policy, 2019, 45(7): 65-68.
|
[13] |
WANGHai.
Development of personal information protection and escort informatization
[J]. Information and Communications Technology and Policy, 2019, 45(7): 75-77.
|
[14] |
FENG Shi duo, CAO Heng, GAO Jing jie.
The trend of IoT equipments safety supervision and its enlightment from the“SB-327 Information Privacy: Connected Devices”
[J]. Information and Communications Technology and Policy, 2019, 45(7): 78-80.
|