Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 277-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-29
王峥1宁玉桥2陈阳2薛世豪2
1(工业和信息化部装备工业发展中心北京100846) 2(中汽智联技术有限公司天津300300)
通讯作者:
王峥
硕士,高级工程师.主要研究方向为新能源汽车产品安全.
sjzwangzheng@163.com
作者简介:王峥
硕士,高级工程师.主要研究方向为新能源汽车产品安全.
sjzwangzheng@163.com
宁玉桥
高级工程师.主要研究方向为智能网联汽车信息安全.
ningyuqiao@catarc.ac.cn
陈阳
硕士,工程师.主要研究方向为智能网联汽车信息安全.
chenyang2022@catarc.ac.cn
薛世豪
助理工程师.主要研究方向为智能网联汽车信息安全.
xueshihao@catarc.ac.cn
[1]吕斌. 企业数据安全保护研究分析与应用[J]. 网络安全技术与应用, 2025, 2(2): 5557[2]周映, 杨琦, 杨梓涛. 一种基于纵深管理的数据安全综合治理方案[J]. 工业信息安全, 2024, 23(6): 5358[3]韩钢, 刘琨, 孙树鹏. 数据全生命周期的合规安全治理研究[J]. 通信管理与技术, 2024, 45(5): 5154[4]程远. 数字化时代企业合规的关键——从法律视角看隐私保护与数据安全[J]. 法制博览, 2025, 15(3): 163165[5]Stewart H, Jürjens J. Information security management and the human aspect in organiza tions[J]. Information & Computer Security, 2017, 25(5): 494534 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||