Search scope:
排序: Display mode:
Development Trend and Path of Industrial Internet Security Industry in China
Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 46-55 doi: 10.15302/J-SSCAE-2021.02.007
Industrial Internet security is a prerequisite and guarantee for the high-quality development of China’s industrial Internet industry; it is also important for enhancing China’s cyber and manufacturing industries. This study aims at the future development of the industrial Internet security industry in China. First, we analyze the development status of the industry in terms of industrial policies, standards system, industrial structure, and industrial scale. Subsequently, we elaborate on the opportunities and trends of the industry and propose the development path for the next-generation industrial Internet security industry in China. To explore a sustainable development path suitable for China’s industrial Internet security industry, top-level design and policy guidance should be enhanced; technological innovation and transformation should be reinforced; advantages of enterprises and organizations should be complemented to construct a healthy development ecosystem; the security and stability of the supply chain should be emphasized; and personnel training and team building should be promoted to support the research collaboration among government, industry, universities, research institutes, and application.
Keywords: industrial Internet security industry ecosystem classified protection of cybersecurity independent
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006
Although cybersecurity legislation has made some progress since the 18th National Congress of theCommunist Party of China, there is still a large gap between the law and development of cybersecurityBased on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecuritylaw, administrative law for cyber information service, personal information protection law, e-governmentIn this way, a perfected legal system for cybersecurity will be achieved.
Keywords: networks Internet cybersecurity cybersecurity law legal system
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Engineering 2018, Volume 4, Issue 1, Pages 53-60 doi: 10.1016/j.eng.2018.01.004
Keywords: Cybersecurity Knowledge graph Knowledge deduction
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012
This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.
Keywords: active defense active immunity trusted computing trusted technology insurance system cybersecurity
Fu-qing Liang,Yong-ping Sun
Frontiers of Engineering Management 2014, Volume 1, Issue 4, Pages 330-335 doi: 10.15302/J-FEM-2014055
Keywords: environmental science the Three Gorges cultural relics innovate environmental protection measures greenprotection
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security.This paper focuses on the current international systems related to cybersecurity review, and analyzesBased on the above, this paper discusses how to establish a cybersecurity review system in the fields
Keywords: cybersecurity review information technology product and service critical information infrastructure
The New Frontiers of Cybersecurity
Binxing Fang, Kui Ren, Yan Jia
Engineering 2018, Volume 4, Issue 1, Pages 1-2 doi: 10.1016/j.eng.2018.02.007
Cybersecurity Research—Essential to a Successful Digital Future
Jackie Craig
Engineering 2018, Volume 4, Issue 1, Pages 9-10 doi: 10.1016/j.eng.2018.02.006
CROP PROTECTION OPENS UP NEW ERA OF CONSERVATION AND UTILIZATION OF GREEN OPTIONS
Frontiers of Agricultural Science and Engineering 2022, Volume 9, Issue 1, Pages 1-3 doi: 10.15302/J-FASE-2021431
Field management is a traditional conservation agriculture technique on plant protection such
Pesticides are widely used in the crop protection.
Bioengineering protection mechanism of city rock slope and its laboratory test
Desong JIANG, Minghua ZHAO, Chong JIANG,
Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 4, Pages 414-421 doi: 10.1007/s11709-009-0055-9
Keywords: indoor engineering project protection mechanism different runoff lagging
Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014
Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreintrusion tolerance and moving target defense, we propose a research direction and a key point in the cybersecurityrebalancing strategy in order to provide a reference for the development of national cybersecurity.
Keywords: mimic defense active defense technology cybersecurity rebalance
Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense
Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007
Keywords: cybersecurity assurance system threat active defense guard mode
Game Theory Analysis of Marine Rights Protection
Wang Lei, Chen Hua, Kang Meize, Ma Xiaochuan
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 80-86 doi: 10.15302/J-SSCAE-2019.06.015
This study discusses marine rights protection from the perspective ofIt introduces the role of marine rights protection in handling marine disputes, as well as the nature, direction, and elements of the game in China’s marine rights protection.To this end, this study categorizes marine rights protection into three basic game processes, i.e., entryIt is concluded that improving technological means for marine rights protection can effectively change
Keywords: marine rights protection game theory marine rights protection technology United Nations Convention
Review of challenges and strategies for balanced urban–rural environmental protection in China
Beidou XI,Xiaoguang LI,Jixi GAO,Ying ZHAO,Hongliang LIU,Xunfeng XIA,Tianxue YANG,Lieyu ZHANG,Xuan JIA
Frontiers of Environmental Science & Engineering 2015, Volume 9, Issue 3, Pages 371-384 doi: 10.1007/s11783-014-0744-z
Keywords: urban environment rural environment balanced urban–rural environmental protection framework of balancedurban–rural environmental protection (BUREP)
Li Boheng
Strategic Study of CAE 2004, Volume 6, Issue 3, Pages 1-5
Keywords: enhance agricultural land protection
Title Author Date Type Operation
Development Trend and Path of Industrial Internet Security Industry in China
Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi
Journal Article
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Journal Article
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Journal Article
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Journal Article
Implement and Innovate Environmental Protection Measures, Promote Green Protection of Cultural Relics
Fu-qing Liang,Yong-ping Sun
Journal Article
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article
Bioengineering protection mechanism of city rock slope and its laboratory test
Desong JIANG, Minghua ZHAO, Chong JIANG,
Journal Article
Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense
Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan
Journal Article
Game Theory Analysis of Marine Rights Protection
Wang Lei, Chen Hua, Kang Meize, Ma Xiaochuan
Journal Article
Review of challenges and strategies for balanced urban–rural environmental protection in China
Beidou XI,Xiaoguang LI,Jixi GAO,Ying ZHAO,Hongliang LIU,Xunfeng XIA,Tianxue YANG,Lieyu ZHANG,Xuan JIA
Journal Article