内容标题
×
内容
绑定机构
扫描成功
请在APP上操作
打开万方数据APP,点击右上角"扫一扫",扫描二维码即可将您登录的个人账号与机构账号绑定,绑定后您可在APP上享有机构权限,如需更换机构账号,可到个人中心解绑。
登录机构账号
登录 / 注册
登录 / 注册
机构登录
学习中心
个人中心
社区
退出
简
繁
学习中心
应用
会员
这是测试提示消息
首页
>
期刊导航
>
信息网络安全
信息网络安全
Netinfo Security 신식망락안전
AMI(2022)
CSCD(2023-2024)
CSTPCD(2023)
北大核心(2023)
曾用名:
公安应用技术通讯(-2000)
主办单位:
公安部第三研究所
中国计算机学会计算机安全专业委员会
主编:
关非
出版周期:
月刊
语种:
中文
国际刊号:
1671-1122
国内刊号:
31-1859/TN
影响因子:
1.71
文献量:
7549
被引量:
34944
下载量:
214426
基金论文量:
1898
电话:
021-34010750
邮政编码:
200031
地址:
上海岳阳路76号4号楼211室
文章浏览
特色栏目
统计分析
期刊简介
征稿启事
DOI服务
[{"name":"技术研究","count":1629,"id":1},{"name":"网域动态","count":540,"id":2},{"name":"入选论文","count":449,"id":3},{"name":"权威分析","count":326,"id":4},{"name":"专题研究","count":300,"id":5},{"name":"理论研究","count":228,"id":6},{"name":"特别报道","count":198,"id":7},{"name":"等级保护","count":185,"id":8},{"name":"理论探讨","count":125,"id":9},{"name":"技术研究与应用","count":85,"id":10},{"name":"技术广场","count":82,"id":11},{"name":"实践探究","count":74,"id":12},{"name":"商海泛舟","count":73,"id":13},{"name":"案例分析","count":69,"id":14},{"name":"市场观察","count":64,"id":15},{"name":"司局长论坛","count":61,"id":16},{"name":"用户之声","count":61,"id":17},{"name":"产品·方案","count":60,"id":18},{"name":"百家争鸣","count":56,"id":19},{"name":"问题与对策","count":56,"id":20},{"name":"海外资讯","count":51,"id":21},{"name":"区域纵横","count":49,"id":22},{"name":"新闻纵横","count":47,"id":23},{"name":"专题报道","count":46,"id":24},{"name":"独家授权","count":46,"id":25},{"name":"行业关注","count":45,"id":26},{"name":"解决方案","count":45,"id":27},{"name":"交流驿站","count":43,"id":28},{"name":"应用技术","count":42,"id":29},{"name":"热点追踪","count":40,"id":30},{"name":"优秀论文","count":38,"id":31},{"name":"行业应用","count":33,"id":32},{"name":"专家论坛","count":32,"id":33},{"name":"信息安全等级保护技术大会入选论文","count":31,"id":34},{"name":"各地安全","count":31,"id":35},{"name":"安全法谈","count":29,"id":36},{"name":"安全论坛","count":28,"id":37},{"name":"观察·思考","count":28,"id":38},{"name":"专题讨论","count":27,"id":39},{"name":"安全驿站","count":26,"id":40},{"name":"信息播报","count":25,"id":41},{"name":"博士之窗","count":25,"id":42},{"name":"业界动态","count":23,"id":43},{"name":"安全视点","count":23,"id":44},{"name":"法制时空","count":23,"id":45},{"name":"部长之声","count":22,"id":46},{"name":"信息安全等级保护技术大会优秀论文","count":20,"id":47},{"name":"安全信箱","count":20,"id":48},{"name":"学术交流","count":19,"id":49},{"name":"理论探究","count":19,"id":50},{"name":"研究探讨","count":18,"id":51},{"name":"安全监察","count":17,"id":52},{"name":"案件回放","count":16,"id":53},{"name":"法律法规","count":16,"id":54},{"name":"海外视点","count":16,"id":55},{"name":"系统安全","count":16,"id":56},{"name":"产品·服务","count":15,"id":57},{"name":"国内网事","count":15,"id":58},{"name":"专题演讲","count":14,"id":59},{"name":"入侵检测","count":14,"id":60},{"name":"热点聚焦","count":14,"id":61},{"name":"观察领域","count":14,"id":62},{"name":"专栏","count":13,"id":63},{"name":"产业化·项目巡礼","count":13,"id":64},{"name":"政策篇","count":13,"id":65},{"name":"标准化","count":13,"id":66},{"name":"犯罪专论","count":13,"id":67},{"name":"优秀论文展","count":12,"id":68},{"name":"安全服务","count":12,"id":69},{"name":"探讨","count":12,"id":70},{"name":"环球瞭望","count":12,"id":71},{"name":"T型台","count":11,"id":72},{"name":"专项行动","count":11,"id":73},{"name":"产品·市场","count":11,"id":74},{"name":"保障","count":11,"id":75},{"name":"动态·简讯","count":11,"id":76},{"name":"安全事件","count":11,"id":77},{"name":"安全管理","count":11,"id":78},{"name":"新闻","count":11,"id":79},{"name":"观点交锋","count":11,"id":80},{"name":"e家之言","count":10,"id":81},{"name":"分析","count":10,"id":82},{"name":"域外传真","count":10,"id":83},{"name":"培训·认证","count":10,"id":84},{"name":"政府机构解决方案","count":10,"id":85},{"name":"观察论述","count":10,"id":86},{"name":"顾问笔会","count":10,"id":87},{"name":"专访","count":9,"id":88},{"name":"争鸣","count":9,"id":89},{"name":"产品方案","count":9,"id":90},{"name":"企业之窗","count":9,"id":91},{"name":"关键产品","count":9,"id":92},{"name":"无线专题","count":9,"id":93},{"name":"法治空间","count":9,"id":94},{"name":"献计献策","count":9,"id":95},{"name":"电子数据取证鉴定技术优秀论文","count":9,"id":96},{"name":"病毒防治","count":9,"id":97},{"name":"知识之窗","count":9,"id":98},{"name":"产品服务","count":8,"id":99},{"name":"加密解密","count":8,"id":100},{"name":"域外法评","count":8,"id":101},{"name":"存储及其它行业解决方案","count":8,"id":102},{"name":"市场准入","count":8,"id":103},{"name":"技术市场","count":8,"id":104},{"name":"政策导航","count":8,"id":105},{"name":"能源行业解决方案","count":8,"id":106},{"name":"E家之言","count":7,"id":107},{"name":"历程·2006","count":7,"id":108},{"name":"基础设施","count":7,"id":109},{"name":"技术手段分析","count":7,"id":110},{"name":"技术篇","count":7,"id":111},{"name":"法律透视","count":7,"id":112},{"name":"电子政务安全·方案","count":7,"id":113},{"name":"专题报道·北美大停电","count":6,"id":114},{"name":"专题报道二","count":6,"id":115},{"name":"安全空间","count":6,"id":116},{"name":"技术探讨","count":6,"id":117},{"name":"政策法规","count":6,"id":118},{"name":"法苑纵横","count":6,"id":119},{"name":"点击人物","count":6,"id":120},{"name":"电信行业解决方案","count":6,"id":121},{"name":"行动","count":6,"id":122},{"name":"制造行业解决方案","count":5,"id":123},{"name":"前沿理论","count":5,"id":124},{"name":"动态信息","count":5,"id":125},{"name":"安全故事","count":5,"id":126},{"name":"安全辞典","count":5,"id":127},{"name":"政府","count":5,"id":128},{"name":"无线安全","count":5,"id":129},{"name":"本刊特稿","count":5,"id":130},{"name":"法律法规分析","count":5,"id":131},{"name":"论文选登","count":5,"id":132},{"name":"防火墙","count":5,"id":133},{"name":"隐私保护","count":5,"id":134},{"name":"高层专访","count":5,"id":135},{"name":"专题报道·反垃圾邮件","count":4,"id":136},{"name":"专题报道一","count":4,"id":137},{"name":"人才培养","count":4,"id":138},{"name":"企业动态","count":4,"id":139},{"name":"前沿技术","count":4,"id":140},{"name":"区块链与可信交易","count":4,"id":141},{"name":"取证","count":4,"id":142},{"name":"学习园地","count":4,"id":143},{"name":"安全视角","count":4,"id":144},{"name":"实践探讨","count":4,"id":145},{"name":"技术","count":4,"id":146},{"name":"技术探究","count":4,"id":147},{"name":"教育研究","count":4,"id":148},{"name":"案件分析","count":4,"id":149},{"name":"法律篇","count":4,"id":150},{"name":"金融","count":4,"id":151},{"name":"金融行业解决方案","count":4,"id":152},{"name":"高层论坛","count":4,"id":153},{"name":"CA专栏","count":3,"id":154},{"name":"专题","count":3,"id":155},{"name":"专题报道·冲击波","count":3,"id":156},{"name":"产品.方案","count":3,"id":157},{"name":"人物风采","count":3,"id":158},{"name":"信息公告","count":3,"id":159},{"name":"回顾·展望","count":3,"id":160},{"name":"域外采风","count":3,"id":161},{"name":"存储技术","count":3,"id":162},{"name":"学习交流","count":3,"id":163},{"name":"安全新闻","count":3,"id":164},{"name":"安全法苑","count":3,"id":165},{"name":"安全直通车","count":3,"id":166},{"name":"总是与对策","count":3,"id":167},{"name":"教育","count":3,"id":168},{"name":"新闻综述","count":3,"id":169},{"name":"时事追踪","count":3,"id":170},{"name":"本刊专稿","count":3,"id":171},{"name":"案例","count":3,"id":172},{"name":"法制空间","count":3,"id":173},{"name":"物联网安全","count":3,"id":174},{"name":"特别策划","count":3,"id":175},{"name":"理论控讨","count":3,"id":176},{"name":"电子商务","count":3,"id":177},{"name":"电子政务安全·专家","count":3,"id":178},{"name":"综述论文","count":3,"id":179},{"name":"能源","count":3,"id":180},{"name":"观察思考","count":3,"id":181},{"name":"视点","count":3,"id":182},{"name":"访谈","count":3,"id":183},{"name":"高层指导","count":3,"id":184},{"name":"ClO访谈","count":2,"id":185},{"name":"e路采风","count":2,"id":186},{"name":"专家访谈","count":2,"id":187},{"name":"产品","count":2,"id":188},{"name":"保密检查","count":2,"id":189},{"name":"信息安全人才讨论之三","count":2,"id":190},{"name":"加密·解密","count":2,"id":191},{"name":"存储备份","count":2,"id":192},{"name":"安全初涉","count":2,"id":193},{"name":"安全此刻","count":2,"id":194},{"name":"安全防护","count":2,"id":195},{"name":"展望 回顾","count":2,"id":196},{"name":"市场","count":2,"id":197},{"name":"应用","count":2,"id":198},{"name":"总目次","count":2,"id":199},{"name":"支撑体系","count":2,"id":200}]
全部
近一年
近三年
近五年
查看更多栏目
<
1
/
1
>
排序:
年/期
被引
下载
批量选择
(已选择)
0
条
清除
导出
共有
62
篇文献
题名
基于一类受限存取结构上的量子秘密共享方案
文摘阅读
32
下载
9
第三方链接
0
被引
0
作者: 李志慧 罗双双 韦性佳
年/期:2023/8
被引:0
下载:9
一种基于QKD的多方拜占庭共识协议
文摘阅读
26
下载
8
第三方链接
0
被引
0
作者: 谢四江 程安东 公鹏飞
年/期:2023/8
被引:0
下载:8
基于对抗性机器学习的网络入侵检测方法研究
文摘阅读
50
下载
36
第三方链接
0
被引
0
作者: 沈华 田晨 郭森森 慕志颖
年/期:2023/8
被引:0
下载:36
SDP-CoAP:基于软件定义边界的安全增强CoAP通信框架设计
文摘阅读
36
下载
14
第三方链接
0
被引
0
作者: 张伟 李子轩 徐晓瑀 黄海平
年/期:2023/8
被引:0
下载:14
面向多源异构数据融合的隐私集合求交研究
文摘阅读
55
下载
43
第三方链接
0
被引
0
作者: 丁江 张国艳 魏子重 王梅
年/期:2023/8
被引:0
下载:43
基于动态时间切片和高效变异的定向模糊测试
文摘阅读
28
下载
8
第三方链接
0
被引
0
作者: 钟远鑫 刘嘉勇 贾鹏
年/期:2023/8
被引:0
下载:8
面向跨链的改进加权拜占庭容错算法
文摘阅读
39
下载
11
第三方链接
0
被引
0
作者: 邵震哲 蒋佳佳 赵佳豪 张玉书
年/期:2023/8
被引:0
下载:11
基于深度学习的HTTP负载隐蔽信道检测方法
文摘阅读
47
下载
15
第三方链接
0
被引
0
作者: 苑文昕 陈兴蜀 朱毅 曾雪梅
年/期:2023/7
被引:0
下载:15
基于双通道特征融合的分布式拒绝服务攻击检测算法
文摘阅读
49
下载
19
第三方链接
0
被引
1
作者: 蒋英肇 陈雷 闫巧
年/期:2023/7
被引:1
下载:19
基于稀疏自动编码器的可解释性异常流量检测
文摘阅读
55
下载
21
第三方链接
0
被引
2
作者: 刘宇啸 陈伟 张天月 吴礼发
年/期:2023/7
被引:2
下载:21
上一页
1
2
3
4
5
6
7
下一页
src='', frameborder='0',name='_blank', scrolling='no')
分享到微信朋友圈
打开微信,点击底部的“发现”,使用“扫一扫”即可将网页分享到我的朋友圈。