Resource Type

Journal Article 447

Conference Videos 11

Conference Information 1

Year

2024 2

2023 40

2022 44

2021 41

2020 30

2019 28

2018 30

2017 26

2016 44

2015 24

2014 14

2013 14

2012 13

2011 15

2010 15

2009 13

2008 5

2007 13

2006 10

2005 6

open ︾

Keywords

food security 39

energy security 19

safety 16

food safety 11

Safety 9

sustainable development 8

China 7

safety assessment 6

cyberspace 5

cyberspace security 5

security 5

Physical layer security 4

accident prevention 4

management 4

water security 4

Network security 3

Security 3

construction safety 3

industrial Internet security 3

open ︾

Search scope:

排序: Display mode:

Cyberspace Endogenous Safety and Security Article

Jiangxing Wu

Engineering 2022, Volume 15, Issue 8,   Pages 179-185 doi: 10.1016/j.eng.2021.05.015

Abstract: problem in cyberspace.so-called “dark functions” such as system vulnerabilities and backdoors, and points out that endogenousit is necessary to develop or utilize the endogenous security functions of the system architecture itselfIn addition, this paper gives a definition for and lists the main technical characteristics of endogenoussafety and security in cyberspace, introduces endogenous security mechanisms and characteristics based

Keywords: Cyberspace endogenous security problem     Uncertain threat     Cyberspace endogenous safety and security    

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 106-115 doi: 10.15302/J-SSCAE-2023.06.018

Abstract: regions such as the United States and Europe to implement digital transformation and address network securitydigital technologies based on the cyber resilience standard and to improve the digital infrastructure securitythe study goes further to propose a dynamic heterogeneous redundancy architecture based on an endogenoussecurity and safety (ESS) theory.nbsp;with Chinese characteristics, establish corresponding regulatory systems to clarify the network security

Keywords: cyberspace     endogenous safety and security     cyber resilience     structure encryption     dynamic heterogeneous    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation    

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Strategic Study of CAE 2016, Volume 18, Issue 4,   Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006

Abstract:

The paper summarizes the development situation and experiences of the Chinese cyberspace securitydevelopment trends, and proposes policy suggestions for the industry development to provide a reference for cyberspacesecurity industry during the 13th Five-Year Plan.

Keywords: cyberspace security     cyberspace security industry     independent and controllable     standards    

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003

Abstract:

Cyberspace security has been a crucial part in national security and is more and more important inBased on the current situation of international cyberspace security, this article analyzes the opportunitiesand challenges that China is confronted with, and study China's international cyberspace security

Keywords: cyberspace security     cyberspace governance     cyberspace strategy    

Cyberspace Security Models and Systematic Development from Multiple Perspectives

Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 116-125 doi: 10.15302/J-SSCAE-2023.06.009

Abstract:

As cyberspace technologies advance rapidly, cyberspace security riskscyberspace security defense assessment.Focusing on the perspective of cyberspace security technology, this study proposes a cyberspace securitycyberspace security, (3) promoting the formulation of core technology standards regarding cyberspacesecurity, and (4) addressing AI security threats, thus to effectively deal with cyberspace security

Keywords: cyberspace     security model     security capability     derivative risk    

Cyberspace Security Competition and Talent Management

Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 49-52 doi: 10.15302/J-SSCAE-2016.06.010

Abstract:

Competition of talents is fundamental to international cyberspace security, and the discovery andFirst, we investigate the development status of domestic and international cyberspace security competitionThen, we analyze the main problems of cyberspace security competition in discovering and tracking talentsFinally, we propose a long-term policy to discover and track talents based on cyberspace competitions

Keywords: cyberspace security     competition     talent-discovery     talent-track    

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 44-48 doi: 10.15302/J-SSCAE-2016.06.009

Abstract:

Cyberspace security professional certification and vocational training is an important part of cyberspacesecurity talent cultivation.First, we survey the current situation of cyberspace security professional certification and vocationalThen, we analyze the main problems of cyberspace security professional certification and vocational trainingFinally, we propose a policy proposal to establish the architecture of cyberspace security professional

Keywords: cyberspace security     workforce framework     professional certification     vocational training    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract: Protecting cyberspace security is a major issue related to national security, national sovereignty, andsecurity has been facing new challenges.This study analyzes the new risks of cyberspace security in the era of AI, such as more intelligent networkThis study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularlythe construction of a cyberspace security knowledge brain and the detection of network attacks.

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Discussion on a new paradigm of endogenous security towards 6G networks Review

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1421-1450 doi: 10.1631/FITEE.2200060

Abstract:

The sixth-generation mobile communication (6G) networks will face more complex endogenous securityto deal with the "unknown unknown" security threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the visionof 6G cyberspace security.of endogenous security and traditional security.

Keywords: 6G security     New paradigm of endogenous security     Core network     Wireless access network    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract: Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasinglyThis study expounds on the basic concept and major characteristics of cyberspace security in the railIt sorts out the development status of cyberspace security protection systems in the rail transit industryMoreover, the study analyzes the corresponding security risks and causes, involving practical cases offor network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Artificial intelligence algorithms for cyberspace security applications: a technological and status review Review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1117-1142 doi: 10.1631/FITEE.2200314

Abstract: timeliness and accuracy of network attack detection, the credibility assessment and prediction of the securitysituation, and the effectiveness of security defense strategy optimization.algorithms have become the core means to increase the chance of security and improve the network attackthe current development trends of technology and application and hot issues in the field of network security

Keywords: intelligence (AI)     Machine learning (ML)     Deep learning (DL)     Optimization algorithm     Hybrid algorithm     Cyberspacesecurity    

Security for cyberspace: challenges and opportunities Editorial

Jiang-xing WU, Jian-hua LI, Xin-sheng JI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1459-1461 doi: 10.1631/FITEE.1840000

Abstract:

Keywords: None    

Construction of Strategic Early-Warning System in Cyberspace

Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 1-7 doi: 10.15302/J-SSCAE-2021.02.001

Abstract:

Cyberspace strategic early-warning is a monitoring and warning systemIt’s an important component of a national security defense system.the national cyber development strategy in China requires high attentions to the construction of a cyberspaceThis study analyzes the major characteristics and basic requirements of strategic early-warning in cyberspace, and studies four major warning styles: security vulnerabilities, security threats, intrusion attacks

Keywords: cyberspace security     strategic early warning     situation awareness     system construction    

The System Standpoint on Information Safety

Li Daimao

Strategic Study of CAE 2007, Volume 9, Issue 8,   Pages 21-25

Abstract:

The meanings in three layers on information safety are given.proposed that all management,  strategy and technology are necessary to implement information safety,  because the science of information safety is the merger of natural and social sciences.information safety in communication is given. The procedure of safety designing is suggested.

Keywords: information safety     security factor     information hiding     boundary     threat    

Title Author Date Type Operation

Cyberspace Endogenous Safety and Security

Jiangxing Wu

Journal Article

Cyber Resilience Enabled by Endogenous Safety and Security: Vision, Techniques, and Strategies

Wu Jiangxing , Zou Hong , Xue Xiangyang , Zhang Fan , Shang Yuting

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Journal Article

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Journal Article

Cyberspace Security Models and Systematic Development from Multiple Perspectives

Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong

Journal Article

Cyberspace Security Competition and Talent Management

Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting

Journal Article

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Discussion on a new paradigm of endogenous security towards 6G networks

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Journal Article

Security for cyberspace: challenges and opportunities

Jiang-xing WU, Jian-hua LI, Xin-sheng JI

Journal Article

Construction of Strategic Early-Warning System in Cyberspace

Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai

Journal Article

The System Standpoint on Information Safety

Li Daimao

Journal Article