Resource Type

Journal Article 293

Year

2023 29

2022 30

2021 27

2020 23

2019 21

2018 21

2017 18

2016 29

2015 17

2014 8

2013 6

2012 3

2011 4

2010 9

2009 5

2008 6

2007 9

2006 3

2005 3

2004 3

open ︾

Keywords

food security 39

energy security 19

architecture 11

China 7

sustainable development 7

cyberspace security 5

security 5

Physical layer security 4

water security 4

Network security 3

Security 3

industrial Internet security 3

Artificial intelligence (AI) 2

Block cipher 2

Embedded security 2

GIS 2

Moving target defense 2

Network architecture 2

Provable security 2

open ︾

Search scope:

排序: Display mode:

Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

JIANG Limin, JIANG Du

Frontiers of Structural and Civil Engineering 2007, Volume 1, Issue 2,   Pages 234-239 doi: 10.1007/s11709-007-0029-8

Abstract: In retrospect of the architecture design of Exit-Entry Administration Building of Shanghai MunicipalPublic Security Bureau, this paper elaborates on the architect s pursuit of the symbol of the image,It promotes a case which deals with the harmony of the architecture individuality and the urban space

Keywords: commonness     retrospect     sequence     architecture individuality     architect    

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Strategic Study of CAE 2008, Volume 10, Issue 8,   Pages 56-59

Abstract:

The security problem, such as network security, user data protection,This paper focuses on the design research of the PWLAN security architecture.A security model based on access controller is proposed in this paper.

Keywords: public WLAN     security architecture     authentication     access controller    

Cyberspace Endogenous Safety and Security Article

Jiangxing Wu

Engineering 2022, Volume 15, Issue 8,   Pages 179-185 doi: 10.1016/j.eng.2021.05.015

Abstract:

Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult;dark functions” such as system vulnerabilities and backdoors, and points out that endogenous securitythe theoretical and engineering levels; rather, it is necessary to develop or utilize the endogenous securityfunctions of the system architecture itself.redundancy (DHR) architecture, and describes the theoretical implications of a coding channel based

Keywords: Cyberspace endogenous security problem     Uncertain threat     Cyberspace endogenous safety and security     Relative right axiom     Dynamic heterogeneous redundant architecture    

Development of Security Protection Technologies for Industrial Control System

Sun Yanbin, Wang Hongyi, Tian Zhihong , Fang Binxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 126-136 doi: 10.15302/J-SSCAE-2023.06.008

Abstract: This study focuses on the security protection issues of ICS.and uncontrollable security challenges of ICS.The network attacks on ICS are summarized and analyzed, and then the security protection systemsIn view of the security challenges, the development ideas are given from the aspects of securitysecurity protection system of ICS based on a self-defense plus guard mode, such that the security

Keywords: industrial control system     security protection     autonomous and controllable     new security-protectionarchitecture     guard mode    

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 44-48 doi: 10.15302/J-SSCAE-2016.06.009

Abstract:

Cyberspace security professional certification and vocational training is an important part of cyberspacesecurity talent cultivation.First, we survey the current situation of cyberspace security professional certification and vocationalThen, we analyze the main problems of cyberspace security professional certification and vocational trainingFinally, we propose a policy proposal to establish the architecture of cyberspace security professional

Keywords: cyberspace security     workforce framework     professional certification     vocational training    

Privacy and security federated reference architecture for Internet of Things Position Paper

Musab KAMAL, Imran RASHID, Waseem IQBAL, Muhammad Haroon SIDDIQUI, Sohaib KHAN, Ijaz AHMAD,waseem.iqbal@mcs.edu.pk

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 4,   Pages 481-508 doi: 10.1631/FITEE.2200368

Abstract: This has given rise to risks associated with the privacy and security of systems.to deficiencies in the architecture.The IoT architecture has evolved over the years, improving the stack of architecture with new solutionsprivacy and security concerns.We propose an architecture, the privacy-federated IoT security reference architecture (PF-IoT-SRA), which

Keywords: Architecturally significant requirement (ASR)     Architecture trade-off analysis method (ATAM)     Internetarchitecture board     Internet of Things (IoT)     Privacy enhancing technologies     Privacy validation chain    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract: Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasinglyThis study expounds on the basic concept and major characteristics of cyberspace security in the railfactors become the double threats to the industry’s dedicated network and the traditional network architecturerestricts network security and reliability in the rail transit industry.for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 106-115 doi: 10.15302/J-SSCAE-2023.06.018

Abstract: regions such as the United States and Europe to implement digital transformation and address network securitydigital technologies based on the cyber resilience standard and to improve the digital infrastructure securityMoreover, the study goes further to propose a dynamic heterogeneous redundancy architecture basedon an endogenous security and safety (ESS) theory.nbsp;with Chinese characteristics, establish corresponding regulatory systems to clarify the network security

Keywords: cyberspace     endogenous safety and security     cyber resilience     structure encryption     dynamic heterogeneousredundancy architecture    

NC flame pipe cutting machine tool based on open architecture CNC system

Xiaogen NIE, Yanbing LIU

Frontiers of Mechanical Engineering 2009, Volume 4, Issue 2,   Pages 147-152 doi: 10.1007/s11465-009-0025-x

Abstract: The paper deals with the design and implementation of an open architecture CNC system for the NFPCM,

Keywords: flame pipe cutting     flame incision tracks     CNC     open architecture CNC system    

Modular architecture model of CSCD system

Hongxue XU, Hong ZHENG, Xiuying GUO

Frontiers of Mechanical Engineering 2010, Volume 5, Issue 4,   Pages 470-475 doi: 10.1007/s11465-010-0119-5

Abstract: A modular architecture model of a computer-supported collaborative design (CSCD) system is proposed onmodule as the core organizing and managing design objects and uses the common object request broker architecture

Keywords: computer-supported collaborative design (CSCD)     distributed system     component object technology     modular architecture    

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 15-21 doi: 10.15302/J-SSCAE-2021.02.003

Abstract: Finally we propose the key technologies for the new network development in China, including new network architecturetechnology, polymorphic addressing and routing technology, network intelligence technology, and endogenous securityFrom the aspect of technology roadmap, we suggest that an open, integrated, and secure new architecture

Keywords: new network architecture,full-dimension definable,polymorphic addressing and routing,network intelligence, endogenous security structure    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Civil, Hydraulic Engineering & Architecture Front 2017

Civil, Hydraulic Engineering & Architecture Project Team

Engineering Fronts 2017, Volume 1, Issue 1,   Pages 125-151

ROLE OF NITROGEN SENSING AND ITS INTEGRATIVE SIGNALING PATHWAYS IN SHAPING ROOT SYSTEM ARCHITECTURE

Frontiers of Agricultural Science and Engineering 2022, Volume 9, Issue 3,   Pages 316-332 doi: 10.15302/J-FASE-2022441

Abstract:

● The Green Revolution broadened the trade-off between yield and nitrogen-use efficiency.

Keywords: Nitrogen     root system architecture     phytohormone     crosstalk     nitrogen-use efficiency     breeding strategy    

Title Author Date Type Operation

Architecture design of Exit-Entry Administration Building of Shanghai Municipal Public Security Bureau

JIANG Limin, JIANG Du

Journal Article

The Design on the Security Architecture of Public WLAN Based on Access Controller Mode

Song Yubo, Huai qun, Yang Xiaohui

Journal Article

Cyberspace Endogenous Safety and Security

Jiangxing Wu

Journal Article

Development of Security Protection Technologies for Industrial Control System

Sun Yanbin, Wang Hongyi, Tian Zhihong , Fang Binxing

Journal Article

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Journal Article

Privacy and security federated reference architecture for Internet of Things

Musab KAMAL, Imran RASHID, Waseem IQBAL, Muhammad Haroon SIDDIQUI, Sohaib KHAN, Ijaz AHMAD,waseem.iqbal@mcs.edu.pk

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Journal Article

NC flame pipe cutting machine tool based on open architecture CNC system

Xiaogen NIE, Yanbing LIU

Journal Article

Modular architecture model of CSCD system

Hongxue XU, Hong ZHENG, Xiuying GUO

Journal Article

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Journal Article

Soil security and global food security

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Civil, Hydraulic Engineering & Architecture Front 2017

Civil, Hydraulic Engineering & Architecture Project Team

Journal Article

ROLE OF NITROGEN SENSING AND ITS INTEGRATIVE SIGNALING PATHWAYS IN SHAPING ROOT SYSTEM ARCHITECTURE

Journal Article