Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 179-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
姜玮杨洋
(中华人民共和国上海海关上海200002)
通讯作者:
姜玮
正高级工程师.主要研究方向为安全管理与法规、网络与数据安全.
Kathy22106@qq.com
作者简介:姜玮
正高级工程师.主要研究方向为安全管理与法规、网络与数据安全.
Kathy22106@qq.com
杨洋
硕士,高级工程师.主要研究方向为信息安全管理.
yang_yang@customs.gov.cn
基金资助:海关总署科研项目(2024HK292)
[1]张蕾, 闻书韵. 基础软件供应链安全现状分析与对策建议[J]. 信息安全研究, 2024, 10(8): 780784[2]王江, 姜伟, 张璨. 开源软件供应链安全风险分析研究[J]. 信息安全研究, 2024, 10(9): 862869[3]李祉岐, 郭晨萌, 汤文玉, 等. 关键信息基础设施软件供应链风险分析及应对方法研究[J]. 信息安全研究, 2024, 10(9): 833839[4]Wang L, Liu Y, Chen T. Software composition analysis for vulnerability detection:An empirical study on java projects[EBOL]. 2017[20240513]. https:senchen.github.ioimg_cspdffse2023sca.pdf[5]国家标准化管理委员会. GBT 43698—2024 网络安全技术 软件供应链安全要求[S]. 北京: 中国标准出版社, 2024 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||