Resource Type

Journal Article 82

Conference Videos 5

Conference Topics 1

Year

2023 7

2022 7

2021 11

2020 15

2019 8

2018 10

2017 9

2016 11

2015 2

2008 1

2005 1

2002 2

2000 1

1999 1

open ︾

Keywords

Cyber-physical systems 4

Industry 4.0 4

Cyber-physical system 3

Intelligent manufacturing 3

Internet of Things 3

Smart manufacturing 3

active defense 3

cyber-physical systems 3

Cyber–physical system 2

Database schemata 2

Industrial Internet of Things 2

Information schema constructs 2

Machine learning 2

Moving target defense 2

Network security 2

New-generation intelligent manufacturing 2

SMF genotypes 2

SMF instances 2

SMF phenotypes 2

open ︾

Search scope:

排序: Display mode:

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract:

As cyberspace carries more and more national, public, and private interests, the issue of a cyberFrom the perspective of China's cyber sovereignty situation, this paper analyzes the main problemsrelated to China's cyber sovereignty guarantee, including the implications of the cyber rights ofindependence, equality, self-defense, and jurisdiction.The purpose of this paper is to promote the establishment of cyber sovereignty, enhance China's discourse

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense     cyber right of jurisdiction     cyber border defense    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract: data, multi-source heterogeneous data, and real-time dynamic data, which can significantly improve the defenseThis study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularly

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Modernization of National Border Biosecurity Defense System

Xu Jianguo , Shu Yuelong , Yi Zaijiong , Tian Zhengan , Li Zhenjun , Wang Xiaoli ,Shen Hongbing , He Yuping

Strategic Study of CAE 2023, Volume 25, Issue 5,   Pages 21-29 doi: 10.15302/J-SSCAE-2023.05.001

Abstract: This study analyzed the current status of biosecurity defense capabilities and systems at frontier ports

Keywords: biosecurity     public health     national border     prevention and control of infectious diseases     health quarantine    

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002

Abstract: national security issues induced by the fusion, involving political, economic, social, and national defenseTo effectively address the security threats of AI-enabled cyber attacks, we suggest that an intelligentnetwork attack and defense system should be established and its capabilities upgraded to construct equivalentdata assets should be encouraged to develop a data-centered path for AI-enabled network attack and defenseFurthermore, the AI-enabled network attack and defense technologies should be evaluated and verified

Keywords: artificial intelligence (AI)     cyber attack and defense     national security     autonomous collaboration    

Theoretical research and application of petrochemical Cyber-physical Systems

Jiming WANG

Frontiers of Engineering Management 2017, Volume 4, Issue 3,   Pages 242-255 doi: 10.15302/J-FEM-2017053

Abstract: A Cyber-physical System (CPS) is the infrastructure of a petrochemical smart factory.

Keywords: Cyber-physical System (CPS)     petrochemical industry     smart factory    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract: Active defense technology is a new direction in cybersecurity research that has attracted more and moreThis paper summarizes the development of active defense via the introduction of intrusion tolerance technologyand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Comprehensive review of modeling, structure, and integration techniques of smart buildings in the cyber-physical-social

Frontiers in Energy 2022, Volume 16, Issue 1,   Pages 74-94 doi: 10.1007/s11708-021-0792-6

Abstract: Involving human behaviors and cyber space, a traditional power system evolves into a cyber-physical-social

Keywords: smart buildings     cyber-physical-social-system     optimization     modeling     demand response     virtual power    

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013

Abstract: This paper first introduces some classic network defense technology.Next, it introduces the technology of mimic defense, including mimic defense systems, related scientificproblems, and the theoretical framework of mimicry defense.defense technology.Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Keywords: mimic defense     cyberspace     moving target defense     mimicry transformation    

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1,   Pages 129-138 doi: 10.15302/J-FASE-2017197

Abstract: Physiological responses to low temperature were analyzed in a chilling-tolerant centipedegrass ( ) accession, Shao Guan (SG), in comparison to the commercial cultivar, Common. Lower levels of ion leakage and higher chlorophyll (Chl) concentration were observed in SG than in Common during chilling stress. The maximum photochemical efficiency, the actual photosystem II (PSII) efficiency, photochemical quenching efficiency, and net photosynthetic rate were decreased during chilling stress in both genotypes, with higher levels of these parameters shown by SG than Common. In addition, higher activities of superoxide dismutase (SOD), catalase (CAT), ascorbate-peroxidase (APX) and glutathione reductase (GR), and higher concentrations of ascorbic acid (AsA) and glutathione (GSH) were observed in SG than in Common. Moreover, higher concentrations of putrescine (Put), spermidine (Spd), and spermine (Spm) were observed in SG than in Common. Correlation analysis indicated that SOD, CAT, APX and GR activities, and AsA and GSH concentrations showed high correlation to Put, while APX, GR, and AsA concentrations were correlated to Spd. Exogenous Put or Spd increased antioxidant enzyme activities and chilling tolerance. The results suggested that polyamine-regulated antioxidants are important for chilling tolerance in centipedegrass and protect plants against chilling induced oxidative damage.

Keywords: antioxidants     centipedegrass     chilling     photosynthesis     polyamines    

Gametheoretic analysis for themechanism of moving target defense Article

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 2017-2034 doi: 10.1631/FITEE.1601797

Abstract: Moving target defense (MTD) is a novel way to alter the asymmetric situation of attacks and defenses,However, relevant analysis for the defense mechanism of the MTD technology is still absent.In this paper, we analyze the defense mechanism of MTD technology in two dimensions.First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technologyThis work gives theoretical support for understanding the defense process and defense mechanism of MTD

Keywords: Network security     Moving target defense (MTD)     Defense mechanism     Defense model     Game theory    

Onmodeling of electrical cyber-physical systems considering cyber security Project supported

Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 5,   Pages 465-478 doi: 10.1631/FITEE.1500446

Abstract: This paper establishes a new framework for modeling electrical cyber-physical systems (ECPSs), integratingBased on this model, the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service

Keywords: Cyber-physical systems     Cyber attacks     Cascading failure analysis     Smart grid    

Cyber–Physical Power System (CPPS): A review on measures and optimization methods of system resilience

Frontiers of Engineering Management 2021, Volume 8, Issue 4,   Pages 503-518 doi: 10.1007/s42524-021-0163-3

Abstract: The Cyber–Physical Power System (CPPS) is one of the most critical infrastructure systems in a countryidentifying and protecting critical nodes, and enhancing the coupling patterns between physical and cyber

Keywords: Cyber–Physical Power System     resilience assessment     resilience optimization     cascading failure modeling    

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationsanalyzes the functional composition and typical combat styles of the future underwater attack–defenseconfrontation system, and proposes corresponding suggestions for the development of the underwater attack–defense

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

Construction of Near-Zero-Carbon Manufacturing System under the Carbon Border Adjustment Mechanism

Cheng Runting , Zhang Yongjun , Li Licheng , Ding Maosheng , Lin Jingchun , Zhang Chunfeng , Han Yongxia

Strategic Study of CAE doi: 10.15302/J-SSCAE-2023.07.037

Abstract: This study focuses on the impact of the EU Carbon Border Adjustment Mechanism on China’s manufacturing

Keywords: European Union emissions trading system     Carbon Border Adjustment Mechanism     zero-carbon transformation    

Cyber security meets artificial intelligence: a survey Review Article

Jian-hua LI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1462-1474 doi: 10.1631/FITEE.1800573

Abstract:

There is a wide range of interdisciplinary intersections between cyber security and artificial intelligenceOn one hand, AI technologies, such as deep learning, can be introduced into cyber security to constructThus, AI models need specific cyber security defense and protection technologies to combat adversarialBased on the above two aspects, we review the intersection of AI and cyber security.counterattacks from which AI itself may suffer, dissect their characteristics, and classify the corresponding defense

Keywords: Cyber security     Artificial intelligence (AI)     Attack detection     Defensive techniques    

Title Author Date Type Operation

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Modernization of National Border Biosecurity Defense System

Xu Jianguo , Shu Yuelong , Yi Zaijiong , Tian Zhengan , Li Zhenjun , Wang Xiaoli ,Shen Hongbing , He Yuping

Journal Article

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Journal Article

Theoretical research and application of petrochemical Cyber-physical Systems

Jiming WANG

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

Comprehensive review of modeling, structure, and integration techniques of smart buildings in the cyber-physical-social

Journal Article

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Journal Article

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Journal Article

Gametheoretic analysis for themechanism of moving target defense

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Journal Article

Onmodeling of electrical cyber-physical systems considering cyber security Project supported

Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN

Journal Article

Cyber–Physical Power System (CPPS): A review on measures and optimization methods of system resilience

Journal Article

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

Construction of Near-Zero-Carbon Manufacturing System under the Carbon Border Adjustment Mechanism

Cheng Runting , Zhang Yongjun , Li Licheng , Ding Maosheng , Lin Jingchun , Zhang Chunfeng , Han Yongxia

Journal Article

Cyber security meets artificial intelligence: a survey

Jian-hua LI

Journal Article