| [1] |
WANG Juanjuan, ZHANG Qian.
Research on major global cybersecurity indicators
[J]. Information and Communications Technology and Policy, 2024, 50(8): 2-8.
|
| [2] |
DONG Yaocong, ZHANG Qian, LI Baoqiang, LI Yi, DONG Yue.
Research on security technology and application of industrial internet based on generative artificial intelligence
[J]. Information and Communications Technology and Policy, 2024, 50(8): 32-37.
|
| [3] |
CHEN Tian, LIU Minghui, WANG Lulu.
Data security architecture of computing power network
[J]. Information and Communications Technology and Policy, 2024, 50(8): 62-67.
|
| [4] |
GUAN Weidong.
Foreign artificial intelligence data security regulation and enlightenment to China
[J]. Information and Communications Technology and Policy, 2024, 50(8): 68-72.
|
| [5] |
QIU Shiyun, LIN Zihan.
Exploration of the construction of data outbound transfer security mechanism for intelligent connected vehicle industry
[J]. Information and Communications Technology and Policy, 2024, 50(8): 73-79.
|
| [6] |
YAO Jingliang.
Measures for government data security issues in the era of internet+
[J]. Information and Communications Technology and Policy, 2024, 50(8): 80-83.
|
| [7] |
GENG Jinbu, HE Lei, NIU Yukun.
Development and suggestions for manufacturing cybersecurity under the background of digital transformation
[J]. Information and Communications Technology and Policy, 2024, 50(8): 9-16.
|
| [8] |
MIAO Yajun, DONG Peng, LI Minghan, MA Zhangchao, QI Wei.
Overview of quantum secure communication technology for time-sensitive networking
[J]. Information and Communications Technology and Policy, 2024, 50(7): 2-8.
|
| [9] |
LAI Junsen, ZHAO Wenyu, ZHANG Haiyi.
Analysis of information security threats for quantum computing and countermeasures
[J]. Information and Communications Technology and Policy, 2024, 50(7): 24-29.
|
| [10] |
SHI Lei, YUAN Zhongju, YI Qiang, LI Shi.
Reflections on HarmonyOS application security and personal information protection
[J]. Information and Communications Technology and Policy, 2024, 50(6): 70-75.
|
| [11] |
PAN Feng, HU Changjun, MIAO Xinyu, LI Shufang.
Research on key technologies for synchronization network security
[J]. Information and Communications Technology and Policy, 2024, 50(3): 83-89.
|
| [12] |
WU Linna, SONG Kai, WANG Songhe.
The challenges and response strategies of generative artificial intelligence for personal information security
[J]. Information and Communications Technology and Policy, 2024, 50(1): 13-18.
|
| [13] |
WU Shenkuo, KE Xiaowei.
Normative imperative and institutional implications of the EU Data Act from perspective of personal information protection
[J]. Information and Communications Technology and Policy, 2024, 50(1): 2-6.
|
| [14] |
WANG Yanhong, KONG Ling, FU Yanyan, LI Jingdian.
Analysis and suggestions on the standardization path of privacy computing technology
[J]. Information and Communications Technology and Policy, 2024, 50(1): 32-36.
|
| [15] |
JIAO Zhiwei, WU Zhenghao, XU Yijia, WEI Fanxing.
Research and practice of decentralized digital identity authentication technology based on privacy protection
[J]. Information and Communications Technology and Policy, 2024, 50(1): 59-66.
|