Resource Type

Journal Article 1065

Conference Videos 114

Conference Topics 2

Conference Information 1

Year

2024 1

2023 78

2022 96

2021 128

2020 79

2019 49

2018 71

2017 61

2016 52

2015 45

2014 37

2013 43

2012 32

2011 35

2010 60

2009 52

2008 27

2007 35

2006 14

2005 24

open ︾

Keywords

technology 27

disruptive technology 12

information technology 12

key technology 12

technology foresight 12

technology innovation 12

2035 11

construction technology 10

engineering science and technology 10

China 7

development strategy 7

engineering 7

development 6

innovation 6

intelligent manufacturing 6

Three Gorges Project 5

coal 5

development trend 5

MR damper 4

open ︾

Search scope:

排序: Display mode:

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract: Active defense technology is a new direction in cybersecurity research that has attracted more and moreThis paper summarizes the development of active defense via the introduction of intrusion tolerance technologyand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012

Abstract: security infrastructure system, and proposes that cyberspace security infrastructure must be based on activedefense.Therefore, this paper proposes several suggestions for a trusted technology insurance system, which includethe following: In order to build a trusted technology insurance system, independent innovation in active; independent innovation must be increased; research, product development, and active defense applications

Keywords: active defense     active immunity     trusted computing     trusted technology insurance system     cybersecurity    

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007

Abstract: font-family:Times New Roman">The rapid development of network attack and defensestyle="font-size:8.99986pt">self-defensebased on deep threat perception, honey court technology based on attack observation and >discrimination, honey matrix technologybased on collaborative linkage, and honey hole technology based on attack deterrence and 

Keywords: cybersecurity     assurance system     threat     active defense     guard mode    

The Strategy of TC 3.0: A Revolutionary Evolution in Trusted Computing

Shen Changxiang,Zhang Dawei and Liu Jiqiang,Ye Heng, Qiu Shuo

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 53-57 doi: 10.15302/J-SSCAE-2016.06.011

Abstract:

This paper introduces the status, problems, and future strategies of the traditional defense systemWe then propose the trusted computing (TC) 3.0 strategy, which is an active defense architecture basedon active immunity.Furthermore, we give an example of TC 3.0 in cloud computing and provide some suggestions on enforcing activedefense.

Keywords: trusted computing (TC) 3.0     active defense     active immunity     multi-level protection     protection structure    

Development Trends of Chemical and Biological Weapons and Defense Technology in the 21st Century

Chen Jisheng

Strategic Study of CAE 2000, Volume 2, Issue 11,   Pages 25-28

Abstract: In this paper, the status of CB weapons, CB disarmament and trends in CB defense technology are introduced, and discussions on the key concerns of CB defense and medical protection in the future are presented

Keywords: chemical and biological weapon     chemical and biological defense     medical protection     chemical and biological    

Detection of Explosives and Active Material by Nuclear Technologies

Chen Hande

Strategic Study of CAE 2008, Volume 10, Issue 1,   Pages 77-85

Abstract: The active neutron interrogation technology and their application to detection of explosives are introducedThe non-neutron interrogation technology by gamma method, the commercialized industry neutron sources

Keywords: nuclear technology     neutron interrogation     explosive     active material     active material detector    

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013

Abstract: This paper first introduces some classic network defense technology.Next, it introduces the technology of mimic defense, including mimic defense systems, related scientificproblems, and the theoretical framework of mimicry defense.defense technology.Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Keywords: mimic defense     cyberspace     moving target defense     mimicry transformation    

Bandwidth-limited active suspension controller for an off-road vehicle based on co-simulation technology

FENG Jinzhi, ZHENG Songlin, YU Fan

Frontiers of Mechanical Engineering 2008, Volume 3, Issue 1,   Pages 111-117 doi: 10.1007/s11465-008-0020-7

Abstract: This paper presents the design process of a controller for bandwidth-limited active hydro-pneumatic suspensionemployed by an off-road vehicle based on co-simulation technology.Second, a combined PID and fuzzy controller is designed for the bandwidth-limited active suspension systemIn the end, the proposed active suspension system is compared with a conventional passive system.Simulation results show that the proposed active suspension system considerably improves both the ride

Keywords: co-simulation technology     exchange interface     conventional     bandwidth-limited     algorithm    

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1,   Pages 129-138 doi: 10.15302/J-FASE-2017197

Abstract: Physiological responses to low temperature were analyzed in a chilling-tolerant centipedegrass ( ) accession, Shao Guan (SG), in comparison to the commercial cultivar, Common. Lower levels of ion leakage and higher chlorophyll (Chl) concentration were observed in SG than in Common during chilling stress. The maximum photochemical efficiency, the actual photosystem II (PSII) efficiency, photochemical quenching efficiency, and net photosynthetic rate were decreased during chilling stress in both genotypes, with higher levels of these parameters shown by SG than Common. In addition, higher activities of superoxide dismutase (SOD), catalase (CAT), ascorbate-peroxidase (APX) and glutathione reductase (GR), and higher concentrations of ascorbic acid (AsA) and glutathione (GSH) were observed in SG than in Common. Moreover, higher concentrations of putrescine (Put), spermidine (Spd), and spermine (Spm) were observed in SG than in Common. Correlation analysis indicated that SOD, CAT, APX and GR activities, and AsA and GSH concentrations showed high correlation to Put, while APX, GR, and AsA concentrations were correlated to Spd. Exogenous Put or Spd increased antioxidant enzyme activities and chilling tolerance. The results suggested that polyamine-regulated antioxidants are important for chilling tolerance in centipedegrass and protect plants against chilling induced oxidative damage.

Keywords: antioxidants     centipedegrass     chilling     photosynthesis     polyamines    

Gametheoretic analysis for themechanism of moving target defense Article

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 2017-2034 doi: 10.1631/FITEE.1601797

Abstract: However, relevant analysis for the defense mechanism of the MTD technology is still absent.In this paper, we analyze the defense mechanism of MTD technology in two dimensions.First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technologyThis work gives theoretical support for understanding the defense process and defense mechanism of MTDtechnology and provides suggestions to improve the effectiveness of MTD approaches.

Keywords: Network security     Moving target defense (MTD)     Defense mechanism     Defense model     Game theory    

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationsanalyzes the functional composition and typical combat styles of the future underwater attack–defenseconfrontation system, and proposes corresponding suggestions for the development of the underwater attack–defense

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

Prospects for the Promotion and Application of Defense Disruptive Technology in Developing the Space

Luan Enjie,Sun Zongtan,Li Hui and Jia Ping

Strategic Study of CAE 2017, Volume 19, Issue 5,   Pages 74-78 doi: 10.15302/J-SSCAE-2017.05.013

Abstract:

This paper starts by making a qualitative selection of defense disruptiveIt considers the features of various defense disruptive technologies and establishes an index evaluationBased on this, this paper identifies major defense disruptive technologies that can have a huge impactsignificantly reduce research cost, and lead to a considerable improvement in the current level of space technology

Keywords: disruptive technologies     space     efficiency     cost    

Moving target defense: state of the art and characteristics Review

Gui-lin CAI,Bao-sheng WANG,Wei HU,Tian-zuo WANG

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 11,   Pages 1122-1153 doi: 10.1631/FITEE.1601321

Abstract: Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situationFirst, a new security model is introduced to describe the changes in the traditional defense paradigm

Keywords: Moving target defense     Security model     Function-and-movement model     Characteristics    

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 74-78 doi: 10.15302/J-SSCAE-2016.06.015

Abstract: This paper proposes a scheme of combining software diversity with mimic defense in the software security

Keywords: software diversity     mimic defense     software security product    

Title Author Date Type Operation

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Journal Article

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Journal Article

The Strategy of TC 3.0: A Revolutionary Evolution in Trusted Computing

Shen Changxiang,Zhang Dawei and Liu Jiqiang,Ye Heng, Qiu Shuo

Journal Article

Development Trends of Chemical and Biological Weapons and Defense Technology in the 21st Century

Chen Jisheng

Journal Article

Detection of Explosives and Active Material by Nuclear Technologies

Chen Hande

Journal Article

Advancing with the Times, Developing and Innovating-National Defense Science and Technology Industry

Journal Article

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Journal Article

Bandwidth-limited active suspension controller for an off-road vehicle based on co-simulation technology

FENG Jinzhi, ZHENG Songlin, YU Fan

Journal Article

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Journal Article

Gametheoretic analysis for themechanism of moving target defense

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Journal Article

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

Prospects for the Promotion and Application of Defense Disruptive Technology in Developing the Space

Luan Enjie,Sun Zongtan,Li Hui and Jia Ping

Journal Article

Moving target defense: state of the art and characteristics

Gui-lin CAI,Bao-sheng WANG,Wei HU,Tian-zuo WANG

Journal Article

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Journal Article