期刊文献+
共找到719篇文章
< 1 2 36 >
每页显示 20 50 100
IMPLEMENTING SECURITY FOR ACTIVE NETWORKS IN INTERNET
1
作者 Tang Yin Wang Weiran (College of Electronic Engineering, UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2003年第4期305-308,共4页
Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastruc... Active networks is primarily a Defense Advanced Research Projects Agency(DARPA)-funded project focusing on the research of mechanisms, applications, and operating systems to develop a reconfigurable network infrastructure. This letter proposes an Secure Active Tracing System (SATS) to implementing security for active networking in Internet. Unlike currently existing schemes, SATS reduces the computational overloads by executing the filtering operation on selected packet streams only when needed. 展开更多
关键词 活动网络 安全性 信号协议 主干网 AN ASP
下载PDF
A Cluster-Based Secure Active Network Environment
2
作者 CHENXiao-lin ZHOUJing-yang +2 位作者 DAIHan LUSang-lu CHENGui-hai 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期142-146,共5页
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or tru... We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallely processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers. 展开更多
关键词 active networks security DSM
下载PDF
Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks
3
作者 R.Sabitha C.Gokul Prasad S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第6期2795-2810,共16页
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W... In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works. 展开更多
关键词 Enhanced security model wireless sensor networks improved defensive routing mechanism secure paths node security
下载PDF
Identification of Important FPGA Modules Based on Complex Network
4
作者 Senjie Zhang Jinbo Wang +3 位作者 Shan Zhou Jingpei Wang Zhenyong Zhang Ruixue Wang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1027-1047,共21页
The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,exi... The globalization of hardware designs and supply chains,as well as the integration of third-party intellectual property(IP)cores,has led to an increased focus from malicious attackers on computing hardware.However,existing defense or detection approaches often require additional circuitry to perform security verification,and are thus constrained by time and resource limitations.Considering the scale of actual engineering tasks and tight project schedules,it is usually difficult to implement designs for all modules in field programmable gate array(FPGA)circuits.Some studies have pointed out that the failure of key modules tends to cause greater damage to the network.Therefore,under limited conditions,priority protection designs need to be made on key modules to improve protection efficiency.We have conducted research on FPGA designs including single FPGA systems and multi-FPGA systems,to identify key modules in FPGA systems.For the single FPGA designs,considering the topological structure,network characteristics,and directionality of FPGA designs,we propose a node importance evaluationmethod based on the technique for order preference by similarity to an ideal solution(TOPSIS)method.Then,for the multi-FPGA designs,considering the influence of nodes in intra-layer and inter-layers,they are constructed into the interdependent network,and we propose a method based on connection strength to identify the important modules.Finally,we conduct empirical research using actual FPGA designs as examples.The results indicate that compared to other traditional indexes,node importance indexes proposed for different designs can better characterize the importance of nodes. 展开更多
关键词 Hardware security FPGA circuits node importance interdependent network
下载PDF
Resources Management in Active Networks
5
作者 WANGJian-guo LIZeng-zhi KOUYan-an 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第1期66-71,共6页
In an active network, users can insert customized active codes into activenodes, to execute. Thus it needs more resources than those required by conventional networks, andthese resources must be effectively monitored ... In an active network, users can insert customized active codes into activenodes, to execute. Thus it needs more resources than those required by conventional networks, andthese resources must be effectively monitored and managed. Management policies in existing OSs aretoo complicated to apply to simple active packets. In this paper, we present new resourcesmanagement policies that are mainly adoped to manage CPU, storage and transmission bandwidth.Namely, we use SPF algorithm to schedule and process active packets, and import an interval queuemethod to allocate transmission bandwidth, and use feedback mechanism to control congestion . At thesame time, we design some experiments on prototype systems with and without resources managementpolicies respectively. The experiments results show that management policies presented by us caneffectively manage resources in active nodes and can improve the performance of active networks. 展开更多
关键词 active network active node resources management transmission bandwidth
原文传递
Key Technologies of Wireless Heterogeneous Network Security 被引量:2
6
作者 Wu Meng,Ji Lina,Wang Kun(Nanjing University of Posts and Telecommunications,Nanjing 210003,China) 《ZTE Communications》 2008年第3期34-39,共6页
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp... Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc. 展开更多
关键词 Key Technologies of Wireless Heterogeneous network security node WLAN
下载PDF
Node cooperation based location secure verification algorithm in wireless sensor networks localization 被引量:2
7
作者 唐弢 Guo Qing +1 位作者 Li Hanqing Peng Bao 《High Technology Letters》 EI CAS 2012年第4期376-381,共6页
关键词 无线传感器网络 验证算法 安全性 节点 位置 网络定位 协作 自适应阵列天线
下载PDF
Incentive Schemes of Nodes for Ad Hoc and Multi-hop Cellular Networks
8
作者 Wang Kun Wu Meng 《China Communications》 SCIE CSCD 2007年第4期79-88,共10页
Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding des... Nodes cooperation is a significant prerequisite for the realization of the relaying Ad Hoc.While with the development of multi-hop cellular networks, how to stimulate intermediate nodes to do the packet-forwarding deserves more concerning.At present research,the incentive schemes in pure Ad Hoc and multi-hop cellular networks are analyzed and compared to classify the strengths and drawbacks of each scheme.We explain in particular what the key issues are to implement incentive schemes for cooperation. Finally,an incentive scheme based on integration of reputation and charging systems is proposed not only to block the existence of selfish nodes,but to satisfy the rational requirement of nodes. 展开更多
关键词 node cooperation INCENTIVE scheme in-depth SUMMARY MULTI-HOP cellular networks Ad HOC security
下载PDF
Analytical Modeling of a Multi-queue Nodes Network Router
9
作者 Hussein Al-Bahadili Jafar Ababneh Fadi Thabtah 《International Journal of Automation and computing》 EI 2011年第4期459-464,共6页
This paper presents the derivation of an analytical model for a multi-queue nodes network router, which is referred to as the multi-queue nodes (mQN) model. In this model, expressions are derived to calculate two pe... This paper presents the derivation of an analytical model for a multi-queue nodes network router, which is referred to as the multi-queue nodes (mQN) model. In this model, expressions are derived to calculate two performance metrics, namely, the queue node and system utilization factors. In order to demonstrate the flexibility and effectiveness of the mQN model in analyzing the performance of an mQN network router, two scenarios are performed. These scenarios investigated the variation of queue nodes and system utilization factors against queue nodes dropping probability for various system sizes and packets arrival routing probabilities. The performed scenarios demonstrated that the mQN analytical model is more flexible and effective when compared with experimental tests and computer simulations in assessing the performance of an mQN network router. 展开更多
关键词 Congested networks network routers active queue managements multi-queue nodes (mQN) systems analytical model- ing utilization factor.
下载PDF
Neural Cryptography with Fog Computing Network for Health Monitoring Using IoMT 被引量:1
10
作者 G.Ravikumar K.Venkatachalam +2 位作者 Mohammed A.AlZain Mehedi Masud Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期945-959,共15页
Sleep apnea syndrome(SAS)is a breathing disorder while a person is asleep.The traditional method for examining SAS is Polysomnography(PSG).The standard procedure of PSG requires complete overnight observation in a lab... Sleep apnea syndrome(SAS)is a breathing disorder while a person is asleep.The traditional method for examining SAS is Polysomnography(PSG).The standard procedure of PSG requires complete overnight observation in a laboratory.PSG typically provides accurate results,but it is expensive and time consuming.However,for people with Sleep apnea(SA),available beds and laboratories are limited.Resultantly,it may produce inaccurate diagnosis.Thus,this paper proposes the Internet of Medical Things(IoMT)framework with a machine learning concept of fully connected neural network(FCNN)with k-near-est neighbor(k-NN)classifier.This paper describes smart monitoring of a patient’s sleeping habit and diagnosis of SA using FCNN-KNN+average square error(ASE).For diagnosing SA,the Oxygen saturation(SpO2)sensor device is popularly used for monitoring the heart rate and blood oxygen level.This diagnosis information is securely stored in the IoMT fog computing network.Doctors can care-fully monitor the SA patient remotely on the basis of sensor values,which are efficiently stored in the fog computing network.The proposed technique takes less than 0.2 s with an accuracy of 95%,which is higher than existing models. 展开更多
关键词 Sleep apnea POLYSOMNOGRAPHY IOMT fog node security neural network KNN signature encryption sensor
下载PDF
Study on Security Technologies for Wireles Network Integration
11
作者 Feng Min (Department of Communication Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China) 《ZTE Communications》 2006年第2期43-47,共5页
The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated netw... The network integration provides users with a new network with long connection time and a high data rate when needed, but it also brings the defects of all the networks that integrate together into the integrated network. This will cause all kinds of existing and some new security problems in the operation of the integrated network. A complete protection based on recovery is proposed in the paper. It uses the public-key algorithm to authorize and private-key algorithm to encrypt the communicating data. This solution can provide the system with reliable security, and avoid Denial of Service (DoS) of the user. This solution has been proposed lately, and we should further identify the correct action of all the layers and figure out how to react when a legal node is framed by multiple malicious nodes. 展开更多
关键词 security USA WLAN node IEEE IPSEC Study on security Technologies for Wireles network Integration
下载PDF
Security of Ad Hoc Network
12
作者 Zhou Yajian Yang Yixian(Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2007年第4期24-26,共3页
An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),h... An Ad hoc network is composed of wireless mobile nodes.Because there is no other wired infrastructure such as base stations,the ad hoc network,unlike other wireless networks such as Wireless Local Area Network(WLAN),has to face attacks from both the control plane and the data plane.Ad hoc should ensure the routing security on the control plane,and the secure forwarding of packets on the data plane.The distributed network protocol should operate safely,and peer-to-peer nodes should have trusting relations for each other.For this purpose,a complete security solution should include three parts:security on the control plane,security on the data plane,and security of key management. 展开更多
关键词 HOC WORK node security of Ad Hoc network OSPF
下载PDF
Network security protection technology for a cloud energy storage network controller
13
作者 Tao Yan Jialiang Liu +3 位作者 Qianqian Niu Jizhong Chen Shaohua Xu Meng Niu 《Global Energy Interconnection》 2020年第1期86-98,共13页
As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,p... As part of the ongoing information revolution,smart power grid technology has become a key focus area for research into power systems.Intelligent electrical appliances are now an important component of power systems,providing a smart power grid with increased control,stability,and safety.Based on the secure communication requirements of cloud energy storage systems,this paper presents the design and development of a node controller for a cloud energy storage network.The function division and system deployment processes were carried out to ensure the security of the communication network used for the cloud energy storage system.Safety protection measures were proposed according to the demands of the communication network,allowing the system to run safely and stably.Finally,the effectiveness of the system was verified through a client-side distributed energy storage demonstration project in Suzhou,China.The system was observed to operate safely and stably,demonstrating good peak-clipping and valley filling effects,and improving the system load characteristics. 展开更多
关键词 CLOUD ENERGY STORAGE system node CONTROLLER network security Smart grid Distributed ENERGY STORAGE
下载PDF
Steadfast Energy Proficient Sensor Node Activation System in Wireless Networks Lifetime Enhancement
14
作者 R. Saravanakumar Dr. N. Mohankumar 《Circuits and Systems》 2016年第4期402-416,共15页
The wireless sensor network (WSN) is one of the budding exploring areas and fast rising fields in wireless communications. The sensor nodes in the network are generally small-size, low-cost, low-power and multi-functi... The wireless sensor network (WSN) is one of the budding exploring areas and fast rising fields in wireless communications. The sensor nodes in the network are generally small-size, low-cost, low-power and multi-function capabilities. Wireless sensor networks (WSNs) are used for various applications;since numerous sensor nodes are usually deployed on remote and inaccessible places, the employment and preservation should be easy and scalable. Sensor nodes in the field being run out of energy quickly has been an issue and many energy efficient routing protocols have been proposed to solve this problem and preserve the long life of the network. This paper work proposes a hierarchical based node activation routing technique which shows energy efficiency. This technique selects cluster head with highest residual energy in each communication round of transmission to the base station from the cluster heads. Hierarchical based node activation routing technique with different levels of hierarchy simulation results prolongs the lifetime of the network compared to other clustering schemes and communication rounds of simulation increase significantly. 展开更多
关键词 Wireless Sensor networks Hierarchical Routing Energy Efficiency CLUSTERING node Activation Scheme network Lifespan
下载PDF
A Cooperative Security Monitoring Mechanism Aided by Optimal Multiple Slave Cluster Heads for UASNs
15
作者 Yougan Chen Wei Wang +3 位作者 Xiang Sun Yi Tao Zhenwen Liu Xiaomei Xu 《China Communications》 SCIE CSCD 2023年第5期148-169,共22页
As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this... As each cluster head(CH)sensor node is used to aggregate,fuse,and forward data from different sensor nodes in an underwater acoustic sensor network(UASN),guaranteeing the data security in a CH is very critical.In this paper,a cooperative security monitoring mechanism aided by multiple slave cluster heads(SCHs)is proposed to keep track of the data security of a CH.By designing a low complexity“equilateral triangle algorithm(ETA)”,the optimal SCHs(named as ETA-based multiple SCHs)are selected from the candidate SCHs so as to improve the dispersion and coverage of SCHs and achieve largescale data security monitoring.In addition,by analyzing the entire monitoring process,the close form expression of the probability of the failure attack identification for the SCHs with respect to the probability of attack launched by ordinary nodes is deduced.The simulation results show that the proposed optimal ETA-based multiple SCH cooperation scheme has lower probability of the failure attack identification than that of the existing schemes.In addition,the numerical simulation results are consistent with the theoretical analysis results,thus verifying the effectiveness of the proposed scheme. 展开更多
关键词 underwater acoustic sensor networks data security cluster head nodes optimal location distribution of multiple slave cluster head nodes
下载PDF
A Systematic Overview of Underwater Wireless Sensor Networks:Applications,Challenge and Research Perspectives
16
作者 Fethi Demim Rekia Bouguessa +1 位作者 Abdenebi Rouigueb Abdelkrim Nemra 《Journal of Computer Science Research》 2023年第2期52-77,共26页
Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and ... Underwater Wireless Sensor Networks(UWSNs)are becoming increasingly popular in marine applications due to advances in wireless and microelectronics technology.However,UWSNs present challenges in processing,energy,and memory storage due to the use of acoustic waves for communication,which results in long delays,significant power consumption,limited bandwidth,and packet loss.This paper provides a comprehensive review of the latest advancements in UWSNs,including essential services,common platforms,critical elements,and components such as localization algorithms,communication,synchronization,security,mobility,and applications.Despite significant progress,reliable and flexible solutions are needed to meet the evolving requirements of UWSNs.The purpose of this paper is to provide a framework for future research in the field of UWSNs by examining recent advancements,establishing a standard platform and service criteria,using a taxonomy to determine critical elements,and emphasizing important unresolved issues. 展开更多
关键词 Wireless sensor networks Ad-hoc networks Internet of Things Localization algorithms node mobility security mechanisms Energy-efficient communication
下载PDF
基于模糊评判的无线传感器网络簇间数据转发算法
17
作者 周海飞 芦翔 胡春芬 《传感技术学报》 CAS CSCD 北大核心 2024年第6期1067-1072,共6页
由于无线传感器网络在簇间数据转发过程中消耗能量较大、转发效率低,导致数据在转发过程中容易失效。为此,提出基于模糊评判的无线传感器网络簇间数据转发算法。建立无线传感器网络模型和通信模型,明确节点的运行方式和转发数据所消耗... 由于无线传感器网络在簇间数据转发过程中消耗能量较大、转发效率低,导致数据在转发过程中容易失效。为此,提出基于模糊评判的无线传感器网络簇间数据转发算法。建立无线传感器网络模型和通信模型,明确节点的运行方式和转发数据所消耗的能量,构建模糊综合评判模型,选取梯形隶属度函数计算传感器节点的相似度和活跃度,找出最佳转发节点,完成数据转发任务。仿真结果表明,所提算法的第一个节点死亡轮数和网络失效轮数最高为167和178,在仿真轮数达到1000轮时,该算法剩余的网络能量和节点平均能量分别为4 J和0.01 J,证明所提算法在数据转发过程中可消耗最少的能量,高效率地完成数据转发任务。 展开更多
关键词 无线传感器网络 簇间数据转发 模糊评判 梯形隶属度函数 节点活跃度
下载PDF
航空器场面滑行关键路径识别与抗毁性研究
18
作者 康瑞 牟睿聆 +1 位作者 李凌海 周裕川 《重庆理工大学学报(自然科学)》 CAS 北大核心 2024年第2期181-188,共8页
为准确辨识机场地面滑行系统重要路段,提升拥塞风险控制能力,通过构建机场活动区交通网络模型,从节点近邻、全局路径、特征向量和网络位置4个角度挖掘关键节点,提出改进介数中心性算法,得到节点重要度排序样例集。综合鲁棒性、性能下降... 为准确辨识机场地面滑行系统重要路段,提升拥塞风险控制能力,通过构建机场活动区交通网络模型,从节点近邻、全局路径、特征向量和网络位置4个角度挖掘关键节点,提出改进介数中心性算法,得到节点重要度排序样例集。综合鲁棒性、性能下降速率以及单位时间性能损失等网络性能指标,通过抗毁性实验分析性能变化曲线,确定综合抗毁性衡量指标ki测度下复杂网络节点重要度排序结果,实现关键路径识别。以华北某机场为例开展实证研究,结果表明:机场活动区交通网络具有较小的聚类系数,在随机攻击下抗毁性较强,基于度中心性的节点序列为所有样例中最满足实际运行中的关键路段,管制员可实施重点路段流量调配,抑制冲突。 展开更多
关键词 机场活动区 复杂网络 节点重要度 抗毁性
下载PDF
基于KAP理论的大学生网络安全教育研究
19
作者 李媛媛 袁玉林 随力瑞 《中国安全科学学报》 CAS CSCD 北大核心 2024年第5期1-8,共8页
为改善大学生网络安全教育现状,提高大学生网络安全教育水平,结合知识-态度-行为(KAP)理论,构建大学生安全教育KAP模型;通过问卷发放和筛选,获取659份有效问卷;采用结构方程模型(SEM)检验网络安全教育对网络安全认知、网络安全态度、网... 为改善大学生网络安全教育现状,提高大学生网络安全教育水平,结合知识-态度-行为(KAP)理论,构建大学生安全教育KAP模型;通过问卷发放和筛选,获取659份有效问卷;采用结构方程模型(SEM)检验网络安全教育对网络安全认知、网络安全态度、网络安全行为的影响,以及可能存在的中介作用影响路径。结果表明:网络安全教育显著影响网络安全认知、网络安全态度、网络安全行为,其中,网络安全认知、网络安全态度起到独立中介及链式中介作用;法律道德教育、知识教育、实践活动、榜样引领均能直接影响网络安全行为,其中,法律道德教育对网络安全行为的影响最强,知识教育次之,实践活动和榜样引领最弱。在具体作用路径方面,法律道德教育主要通过直接效应来影响网络安全行为,知识教育、实践活动、榜样引领主要通过安全认知间接影响网络安全行为。 展开更多
关键词 知识-态度-行为(KAP) 网络安全教育 法律道德教育 实践活动 榜样引领 结构方程模型(SEM)
下载PDF
帮信罪与拒履网安义务罪适用差异研究——以刑法网络治理模式为视角
20
作者 马松建 孙常啸 《聊城大学学报(社会科学版)》 2024年第4期46-56,共11页
帮助信息网络犯罪活动罪的司法案件数量和学术讨论热度远超拒不履行信息网络安全管理义务罪,教义学分析无法充分解释二罪差异。实证分析二罪理论文献及司法解释文件,发现国家对拒不履行信息网络安全管理义务罪的网络治理效能抱有期待。... 帮助信息网络犯罪活动罪的司法案件数量和学术讨论热度远超拒不履行信息网络安全管理义务罪,教义学分析无法充分解释二罪差异。实证分析二罪理论文献及司法解释文件,发现国家对拒不履行信息网络安全管理义务罪的网络治理效能抱有期待。适当转变司法治理思维,减少直接性控制,承认社会个体治理能力,建立“共建共享公治”的多元网络治理格局,既符合我国的社会发展趋势也具备政策基础。多元治理利于调动网络安全管理义务人网络专长,及时处理信息。即使无法完全采取多元治理模式,也应对帮助信息网络犯罪活动罪的体系突破进行限缩,防止其持续膨胀。 展开更多
关键词 帮助信息网络犯罪活动罪 拒不履行信息网络安全管理义务罪 网络社会治理 多元共治
下载PDF
上一页 1 2 36 下一页 到第
使用帮助 返回顶部