[{"name":"学术研究","count":1764,"id":1},{"name":"Academic Research","count":1155,"id":2},{"name":"市场纵横","count":588,"id":3},{"name":"本期特稿","count":546,"id":4},{"name":"通信技术","count":443,"id":5},{"name":"学术争鸣","count":418,"id":6},{"name":"本期专题","count":337,"id":7},{"name":"专家新论","count":334,"id":8},{"name":"方案应用","count":311,"id":9},{"name":"Market Profile","count":296,"id":10},{"name":"业界动态","count":261,"id":11},{"name":"前沿技术","count":248,"id":12},{"name":"政府之声","count":240,"id":13},{"name":"Perspectives","count":225,"id":14},{"name":"Communications Technologies","count":217,"id":15},{"name":"新品推介","count":199,"id":16},{"name":"Features","count":171,"id":17},{"name":"视点","count":160,"id":18},{"name":"PERSPECTIVES","count":158,"id":19},{"name":"行业分析","count":144,"id":20},{"name":"Special Topic","count":131,"id":21},{"name":"企业·人物","count":113,"id":22},{"name":"高端访谈","count":98,"id":23},{"name":"Communication Technologies","count":90,"id":24},{"name":"Experts' Forum","count":90,"id":25},{"name":"专题","count":85,"id":26},{"name":"企业风采","count":85,"id":27},{"name":"Technology & Research","count":82,"id":28},{"name":"技研学术","count":82,"id":29},{"name":"Solutions & Applications","count":77,"id":30},{"name":"产业观察","count":77,"id":31},{"name":"同业之窗","count":77,"id":32},{"name":"海外报告","count":77,"id":33},{"name":"方案与应用","count":75,"id":34},{"name":"政策评论","count":73,"id":35},{"name":"百家争鸣","count":72,"id":36},{"name":"Government Voice","count":71,"id":37},{"name":"视野","count":71,"id":38},{"name":"科技前沿","count":69,"id":39},{"name":"Theses of the 11th Symposium on Communication Priv","count":66,"id":40},{"name":"网络漫步","count":64,"id":41},{"name":"Thoughts Contending","count":62,"id":42},{"name":"权威测评","count":61,"id":43},{"name":"管理集萃","count":59,"id":44},{"name":"New Products","count":57,"id":45},{"name":"Industry Analysis","count":54,"id":46},{"name":"POLICY REVIEW","count":53,"id":47},{"name":"本期视点","count":51,"id":48},{"name":"电子商务","count":51,"id":49},{"name":"业界精英","count":50,"id":50},{"name":"Technical Frontier","count":48,"id":51},{"name":"Overseas Reports","count":46,"id":52},{"name":"本期简讯","count":45,"id":53},{"name":"电子政务","count":44,"id":54},{"name":"Expert' Forum","count":43,"id":55},{"name":"Scheme & Application","count":41,"id":56},{"name":"The 10th Symposium on the Status Quo of Private Communication & Information Security --Information Security","count":40,"id":57},{"name":"新品博览","count":40,"id":58},{"name":"第十一届保密通信与信息安全现状研讨会会议论文——信","count":40,"id":59},{"name":"第十届\"保密通信与信息安全现状研讨会\"--信息安全","count":40,"id":60},{"name":"特别策划","count":37,"id":61},{"name":"Communication Technology","count":36,"id":62},{"name":"Industrial Science","count":36,"id":63},{"name":"产业学术","count":36,"id":64},{"name":"特稿","count":35,"id":65},{"name":"卷首语","count":33,"id":66},{"name":"行业应用","count":33,"id":67},{"name":"业界要闻","count":30,"id":68},{"name":"时事简评","count":30,"id":69},{"name":"评论","count":30,"id":70},{"name":"报道","count":29,"id":71},{"name":"简讯","count":29,"id":72},{"name":"Focus In This Issue","count":27,"id":73},{"name":"网络文化","count":27,"id":74},{"name":"The 10th Symposium on the Status Quo of Private Communication & Information Security--Cryptographic Technology","count":26,"id":75},{"name":"第十一届保密通信与信息安全现状研讨会会议论文——密","count":26,"id":76},{"name":"第十届\"保密通信与信息安全现状研讨会\"--密码技术","count":26,"id":77},{"name":"警钟长鸣 ALARMING BELL","count":26,"id":78},{"name":"网际视点","count":25,"id":79},{"name":"Feature","count":23,"id":80},{"name":"内网安全","count":23,"id":81},{"name":"专题| Special Subject","count":22,"id":82},{"name":"产品·方案","count":21,"id":83},{"name":"他山之石 REFERENCE MATERIALS","count":21,"id":84},{"name":"企业","count":20,"id":85},{"name":"国内看点 DOMESTIC FOCUS","count":20,"id":86},{"name":"Enterprises·Figures","count":19,"id":87},{"name":"人才天地","count":19,"id":88},{"name":"他山之石","count":19,"id":89},{"name":"法理述评","count":19,"id":90},{"name":"Academic Reaearch","count":18,"id":91},{"name":"Enterprises & Elites","count":18,"id":92},{"name":"安全人+","count":18,"id":93},{"name":"INTERNATIONAL REPORTS","count":17,"id":94},{"name":"域外传真","count":17,"id":95},{"name":"浪潮专栏","count":17,"id":96},{"name":"管理之窗","count":17,"id":97},{"name":"Inner-Network Security","count":16,"id":98},{"name":"Inspur Column","count":16,"id":99},{"name":"TECHNICAL FRONTIER","count":16,"id":100},{"name":"政策荟萃","count":16,"id":101},{"name":"视点 Viewpoints","count":16,"id":102},{"name":"Leading-edge Technologies","count":15,"id":103},{"name":"刊中刊:网安观察","count":15,"id":104},{"name":"史林漫步","count":15,"id":105},{"name":"域外视点","count":15,"id":106},{"name":"百家争鸣 Thoughts Contending","count":15,"id":107},{"name":"Enterprises & Elite","count":14,"id":108},{"name":"LEADDING SOLUTIONS OF CYBER SECURITY","count":14,"id":109},{"name":"优秀网络安全解决方案","count":14,"id":110},{"name":"新闻分析","count":14,"id":111},{"name":"Solutions & Application","count":13,"id":112},{"name":"人物","count":13,"id":113},{"name":"卫士通专栏","count":13,"id":114},{"name":"双十推介","count":12,"id":115},{"name":"安全服务","count":12,"id":116},{"name":"用户·应用","count":12,"id":117},{"name":"防火墙风云榜","count":12,"id":118},{"name":"LEADING INNOVATIVE PRODUCTS OF CYBER SECURITY","count":11,"id":119},{"name":"RTOM Column","count":11,"id":120},{"name":"View","count":11,"id":121},{"name":"Web World","count":11,"id":122},{"name":"Westone Column","count":11,"id":123},{"name":"e趣茶坊","count":11,"id":124},{"name":"优秀网络安全创新产品","count":11,"id":125},{"name":"技术·学术","count":11,"id":126},{"name":"瑞通专栏","count":11,"id":127},{"name":"科技前沿 Technical Frontier","count":11,"id":128},{"name":"网安观察","count":11,"id":129},{"name":"网安观察|Cyber Security Observation","count":11,"id":130},{"name":"网际视点 Viewpoints -- 网络的精彩与无奈","count":11,"id":131},{"name":"观点 Personage","count":11,"id":132},{"name":"Management Treasure","count":10,"id":133},{"name":"News Analysis","count":10,"id":134},{"name":"THOUGHTS CONTENDING","count":10,"id":135},{"name":"VPN专题","count":10,"id":136},{"name":"专家视点","count":10,"id":137},{"name":"人物专访","count":10,"id":138},{"name":"专家热谈","count":9,"id":139},{"name":"卫士通","count":9,"id":140},{"name":"方案精选","count":9,"id":141},{"name":"专题 |Special Subject","count":8,"id":142},{"name":"专题:安全普及","count":8,"id":143},{"name":"产业聚焦","count":8,"id":144},{"name":"安全集萃","count":8,"id":145},{"name":"数图| Data & Graph","count":8,"id":146},{"name":"网站导航","count":8,"id":147},{"name":"行业应用 Industry Applications","count":8,"id":148},{"name":"视野 |lnsight","count":8,"id":149},{"name":"Viewpoint","count":7,"id":150},{"name":"产业学术 Industrial Science","count":7,"id":151},{"name":"产业趋势","count":7,"id":152},{"name":"企业人物","count":7,"id":153},{"name":"安全文化","count":7,"id":154},{"name":"应用","count":7,"id":155},{"name":"\"双十\"特别策划","count":6,"id":156},{"name":"Experts Forum","count":6,"id":157},{"name":"IDS天地","count":6,"id":158},{"name":"Scheme Application","count":6,"id":159},{"name":"Solutions &Applications","count":6,"id":160},{"name":"View Point","count":6,"id":161},{"name":"人工智能与安全","count":6,"id":162},{"name":"国富安","count":6,"id":163},{"name":"安全讲堂","count":6,"id":164},{"name":"技研学术| Technology & Research","count":6,"id":165},{"name":"政府之声 Government Voice","count":6,"id":166},{"name":"本期专题——新冠肺炎疫情对我国数字经济产业的挑战与机遇","count":6,"id":167},{"name":"视野| Insight","count":6,"id":168},{"name":"评论 |Commentary","count":6,"id":169},{"name":"调查报告","count":6,"id":170},{"name":"Communications Technology","count":5,"id":171},{"name":"Industry Inalysis","count":5,"id":172},{"name":"Network Protection for Minors","count":5,"id":173},{"name":"Overseas Studies","count":5,"id":174},{"name":"Technical frontier","count":5,"id":175},{"name":"Top-level Design Improvements of Personal Information Protection System","count":5,"id":176},{"name":"专题:宣传教育","count":5,"id":177},{"name":"专题:法制看点","count":5,"id":178},{"name":"中国电信","count":5,"id":179},{"name":"区块链与安全","count":5,"id":180},{"name":"国内看点","count":5,"id":181},{"name":"国家网络安全宣传周","count":5,"id":182},{"name":"图书推荐","count":5,"id":183},{"name":"外企风采","count":5,"id":184},{"name":"安全隔离","count":5,"id":185},{"name":"完善个人信息保护体制的顶层设计","count":5,"id":186},{"name":"新闻?News","count":5,"id":187},{"name":"未成年人网络保护","count":5,"id":188},{"name":"本期专题/SPECIAL TOPIC","count":5,"id":189},{"name":"本期专题——ICT 供应链安全的国际治理亟待展开","count":5,"id":190},{"name":"海外研究","count":5,"id":191},{"name":"海外视野 INFORMATION FORM ABOARD","count":5,"id":192},{"name":"特稿 Features","count":5,"id":193},{"name":"移动互联专题","count":5,"id":194},{"name":"立法探索","count":5,"id":195},{"name":"行业热议","count":5,"id":196},{"name":"Authoritative Certification","count":4,"id":197},{"name":"Blockchain Technology and Data Governance for Privacy Protection","count":4,"id":198},{"name":"Communications Technologies","count":4,"id":199},{"name":"E-Government","count":4,"id":200}]