Resource Type

Journal Article 726

Year

2024 3

2023 75

2022 72

2021 85

2020 63

2019 56

2018 54

2017 42

2016 55

2015 15

2014 7

2013 10

2012 12

2011 16

2010 12

2009 12

2008 14

2007 20

2006 21

2005 22

open ︾

Keywords

food security 17

neural network 16

Deep learning 10

energy security 10

Safety 9

Artificial intelligence 8

Neural network 8

Software-defined networking (SDN) 7

sustainable development 7

Machine learning 5

cyberspace 5

cyberspace security 5

safety 5

security 5

6G 4

ANN 3

Attention mechanism 3

BP neural network 3

Boolean control networks 3

open ︾

Search scope:

排序: Display mode:

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation strategy    

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006

Abstract:

Although cybersecurity legislation has made some progress since the 18th National Congress of the Communist Party of China, there is still a large gap between the law and development of cybersecurity and informatization and the requirements of the public. In addition, many problems exist in the fields of legislation, enforcement, administration, and legality. Some people, both at home and abroad, question China's efforts in the legislation of cybersecurity. Based on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecurity legislation and improve the legal system, particularly in order to enact cybersecurity law, e-commercial law, administrative law for cyber information service, personal information protection law, e-government law, information and telecommunication network law, and administrative law for cyber society, supported by matched regulations and by laws. In this way, a perfected legal system for cybersecurity will be achieved.

Keywords: networks     Internet     cybersecurity     cybersecurity law     legal system    

Cyber security meets artificial intelligence: a survey Review Article

Jian-hua LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1462-1474 doi: 10.1631/FITEE.1800573

Abstract:

There is a wide range of interdisciplinary intersections between cyber security and artificial intelligence (AI). On one hand, AI technologies, such as deep learning, can be introduced into cyber security to construct smart models for implementing malware classification and intrusion detection and threating intelligence sensing. On the other hand, AI models will face various cyber threats, which will disturb their sample, learning, and decisions. Thus, AI models need specific cyber security defense and protection technologies to combat adversarial machine learning, preserve privacy in machine learning, secure federated learning, etc. Based on the above two aspects, we review the intersection of AI and cyber security. First, we summarize existing research efforts in terms of combating cyber attacks using AI, including adopting traditional machine learning methods and existing deep learning solutions. Then, we analyze the counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense methods. Finally, from the aspects of constructing encrypted neural network and realizing a secure federated deep learning, we expatiate the existing research on how to build a secure AI system.

Keywords: Cyber security     Artificial intelligence (AI)     Attack detection     Defensive techniques    

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Strategic Study of CAE 2004, Volume 6, Issue 1,   Pages 10-15

Abstract:

The content of computer network security is discussed in this article Firstly, the concept, system and structure and model of computer network security are given. Then the main content and correlative researching aspect are included. In the end, the main product is introduced.

Keywords: computer     network     system     security    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security. The rules and regulations for security testing and evaluation are distributed as policies for national security review or cyberspace management. This paper focuses on the current international systems related to cybersecurity review, and analyzes governments’ practices in the aspects of information technology product and service security evaluation, critical information infrastructure security evaluation and management, information and communication technology (ICT) supply chain security, and background security investigation. Based on the above, this paper discusses how to establish a cybersecurity review system in the fields of law and regulation, organization framework, operation mode, review approach, and supporting technology.

Keywords: cybersecurity review     information technology product and service     critical information infrastructure     supply chain security     background security    

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers

Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 872-884 doi: 10.1631/FITEE.1800520

Abstract:

By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-source threat intelligence data can be analyzed in a fine-grained manner. This has received extensive attention. It is difficult for traditional named entity recognition methods to identify mixed security entities in Chinese and English in the field of network security, and there are difficulties in accurately identifying network security entities because of insufficient features extracted. In this paper, we propose a novel FT-CNN-BiLSTM-CRF security entity recognition method based on a neural network CNN-BiLSTM-CRF model combined with a feature template (FT). The feature template is used to extract local context features, and a neural network model is used to automatically extract character features and text global features. Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security dataset and outperforms other methods.

Keywords: Network security entity     Security knowledge graph (SKG)     Entity recognition     Feature template     Neural network    

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017

Abstract:

Considering the emergence of recent network security threats, this article presents network security features and the current situation. Updated attack methods, enhanced attack technology, and expanded attack scope have changed emergency work. Some problems exist in emergency management of the status quo; the core technology and security assurance are relatively backward. Learning from the emergency response system in traditional areas in order to improve current emergency technical measures becomes an important part of network security. In this paper, the author proposes a multi-linkage elimination method that can mobilize system strength and protect against network threats based on the system and the mechanism.

Keywords: network security     threat     information security     emergency response     emergency system    

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Engineering 2018, Volume 4, Issue 1,   Pages 53-60 doi: 10.1016/j.eng.2018.01.004

Abstract:

Cyberattack forms are complex and varied, and the detection and prediction of dynamic types of attack are always challenging tasks. Research on knowledge graphs is becoming increasingly mature in many fields. At present, it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurity in order to construct a cybersecurity knowledge base. This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model. Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge base. New rules are then deduced by calculating formulas and using the path-ranking algorithm. The Stanford named entity recognizer (NER) is also used to train an extractor to extract useful information. Experimental results show that the Stanford NER provides many features and the useGazettes parameter may be used to train a recognizer in the cybersecurity domain in preparation for future work.

Keywords: Cybersecurity     Knowledge graph     Knowledge deduction    

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011

Abstract:

The new generation of information and communications technology is deeply integrated with the industrial system. The industrial Internet promotes the ubiquitous and deep interconnection and comprehensive perception of human, machines, and things. The industrial Internet equipment becomes increasingly networked, digital, and intelligent; therefore, the network security design, application management, and protection of these equipment become increasingly important. In this study, we clarify the connotation, protection scope, and requirements of the industrial Internet equipment, and summarize the development status of industrial Internet in China and abroad from the aspects of security control and security certification. Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzed, and the specific implementation paths regarding the network security management and protection for the industrial internet equipment in China are discussed. Furthermore, several development suggestions are proposed. Specifically, the network security access mechanism of the industrial Internet equipment should be improved at the national level, a network security testing and certification system for the equipment should be established, research on the network security architecture and engineering application of the equipment should be promoted, and the network security risk monitoring and perception of the equipment should be strengthened.

Keywords: industrial Internet equipment     network security     management     protection     certification    

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Engineering 2018, Volume 4, Issue 1,   Pages 1-2 doi: 10.1016/j.eng.2018.02.007

Cybersecurity Research—Essential to a Successful Digital Future

Jackie Craig

Engineering 2018, Volume 4, Issue 1,   Pages 9-10 doi: 10.1016/j.eng.2018.02.006

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012

Abstract:

This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.

Keywords: active defense     active immunity     trusted computing     trusted technology insurance system     cybersecurity infrastructure    

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense to Guard

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007

Abstract:
The rapid development of network attack and defense technologies has posed various challenges to current cybersecurity assurance systems. Therefore, studying a new cybersecurity assurance system has become an urgent need to promote the development of information technologies and is of strategic significance for strengthening the network security and availability in China. This study summarizes the operation status of and major security challenges faced by China’s current cybersecurity guarantee system that features a self-defense mode. A cybersecurity guarantee system based on a guard mode and its key technical tasks are proposed. Specifically, the tasks include honey point technology based on deep threat perception, honey court technology based on attack observation and discrimination, honey matrix technology based on collaborative linkage, and honey hole technology based on attack deterrence and mapping. Furthermore, we propose the following suggestions: (1) exploring the cybersecurity assurance mechanisms based on the guard mode to comprehensively improving the cybersecurity protection level of China; (2) exploring the research and application of security protection technologies based on the guard mode and achieving the integration of existing and new security protection technologies; (3) exploring a new talent-training model to cultivate innovative and practical professionals in the cybersecurity field.

Keywords: cybersecurity     assurance system     threat     active defense     guard mode    

Anonymous-address-resolution model Article

Guang-jia SONG,Zhen-zhou JI

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10,   Pages 1044-1055 doi: 10.1631/FITEE.1500382

Abstract: Address-resolution protocol (ARP) is an important protocol of data link layers that aims to obtain the corresponding relationship between Internet Protocol (IP) and Media Access Control (MAC) addresses. Traditional ARPs (address-resolution and neighbor-discovery protocols) do not consider the existence of malicious nodes, which reveals destination addresses in the resolution process. Thus, these traditional protocols allow malicious nodes to easily carry out attacks, such as man-in-the-middle attack and denial-of-service attack. To overcome these weaknesses, we propose an anonymous-address-resolution (AS-AR) protocol. AS-AR does not publicize the destination address in the address-resolution process and hides the IP and MAC addresses of the source node. The malicious node cannot obtain the addresses of the destination and the node which initiates the address resolution; thus, it cannot attack. Analyses and experiments show that AS-AR has a higher security level than existing security methods, such as secure-neighbor discovery.

Keywords: Network security     Address resolution     Neighbor discovery     Anonymous    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract:

Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defend it. Active defense technology is a new direction in cybersecurity research that has attracted more and more attention. This paper summarizes the development of active defense via the introduction of intrusion tolerance technology and moving target defense technology. We then introduce the theory, implementation, and testing of mimic defense. By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research direction and a key point in the cybersecurity rebalancing strategy in order to provide a reference for the development of national cybersecurity.

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Title Author Date Type Operation

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Journal Article

Cyber security meets artificial intelligence: a survey

Jian-hua LI

Journal Article

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF

Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN

Journal Article

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Journal Article

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Journal Article

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Journal Article

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Journal Article

Cybersecurity Research—Essential to a Successful Digital Future

Jackie Craig

Journal Article

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Journal Article

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense to Guard

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Journal Article

Anonymous-address-resolution model

Guang-jia SONG,Zhen-zhou JI

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article