Resource Type

Journal Article 681

Conference Videos 18

Year

2024 1

2023 76

2022 76

2021 74

2020 65

2019 43

2018 43

2017 45

2016 38

2015 34

2014 19

2013 19

2012 15

2011 8

2010 9

2009 10

2008 16

2007 18

2006 11

2005 16

open ︾

Keywords

food security 39

neural network 32

artificial neural network 21

energy security 19

Neural network 11

network 10

optimization 9

Artificial intelligence 7

China 7

convolutional neural network 7

genetic algorithm 7

sustainable development 7

artificial neural network (ANN) 6

Deep learning 5

cyberspace security 5

security 5

BP neural network 4

Physical layer security 4

water security 4

open ︾

Search scope:

排序: Display mode:

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Strategic Study of CAE 2004, Volume 6, Issue 1,   Pages 10-15

Abstract:

The content of computer network security is discussed in this article Firstly, the concept, systemand structure and model of computer network security are given.

Keywords: computer     network     system     security    

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017

Abstract:

Considering the emergence of recent network security threats, this article presents network securitySome problems exist in emergency management of the status quo; the core technology and security assurancetraditional areas in order to improve current emergency technical measures becomes an important part of networksecurity.author proposes a multi-linkage elimination method that can mobilize system strength and protect against network

Keywords: network security     threat     information security     emergency response     emergency system    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought aboutbecome the double threats to the industry’s dedicated network and the traditional network architecturerestricts network security and reliability in the rail transit industry.security, (3) improving the operation and management of network security, and (4) enhancing talent cultivationfor network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers

Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6,   Pages 872-884 doi: 10.1631/FITEE.1800520

Abstract:

By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-sourcein Chinese and English in the field of network security, and there are difficulties in accurately identifyingnetwork security entities because of insufficient features extracted.network CNN-BiLSTM-CRF model combined with a feature template (FT).Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security

Keywords: Network security entity     Security knowledge graph (SKG)     Entity recognition     Feature template     Neural network    

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011

Abstract: Moreover, the problems regarding the network security of industrial Internet equipment in China are analyzed, and the specific implementation paths regarding the network security management and protection forat the national level, a network security testing and certification system for the equipment shouldbe established, research on the network security architecture and engineering application of the equipmentshould be promoted, and the network security risk monitoring and perception of the equipment should

Keywords: industrial Internet equipment     network security     management     protection     certification    

Discussion on a new paradigm of endogenous security towards 6G networks Review

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10,   Pages 1421-1450 doi: 10.1631/FITEE.2200060

Abstract:

The sixth-generation mobile communication (6G) networks will face more complex endogenous securityproblems, and it is urgent to propose new universal security theories and establish new practice normsto deal with the "unknown unknown" security threats in cyberspace.of 6G cyberspace security.of endogenous security and traditional security.

Keywords: 6G security     New paradigm of endogenous security     Core network     Wireless access network    

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 15-21 doi: 10.15302/J-SSCAE-2021.02.003

Abstract: for new businesses and the continuous development of the Internet economy have increasingly demanded networkstatus of new network fields in China and abroad, and summarize the development trend of new networkSubsequently, we summarize the gaps and development goals of China in the new network field.Finally we propose the key technologies for the new network development in China, including new network, network intelligence technology, and endogenous security structure.

Keywords: new network architecture,full-dimension definable,polymorphic addressing and routing,network intelligence, endogenous security structure    

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014

Abstract: Research on computing task scheduling and network interconnection are still inadequate.and summarizes the developmental trends of computing-network integration., storage, and computing, intelligent arrangement of service functions, and endogenous securitystructure, as well as demonstration applications in the smart park network, vertical industry network, and data center network scenarios.

Keywords: intelligent connection computing network technology     diversified protocol     integration of network     storage     and computing     intelligent arrangement of service functions     endogenous security    

Security Development Path for Industrial Internet Supply Chain

Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 56-64 doi: 10.15302/J-SSCAE-2021.02.008

Abstract:

 Industrial Internet security is crucial for strengthening the manufacturingand network sectors of China.high portability, can support the establishment of an intelligent and autonomous industrial Internet securityIn this study, we analyze the development demand for industrial Internet security from the perspectivestatus of deep learning to industrial Internet security in terms of device, control, network, application

Keywords: industrial Internet,supply chain,network security,development path    

Automatic discovery of stateful variables in network protocol software based on replay analysis Research Article

Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3,   Pages 403-416 doi: 10.1631/FITEE.2200275

Abstract: is usually characterized by complicated functions and a vast state space. In this type of program, a massive number of that are used to represent the evolution of the states and store some information about the sessions are prone to potential flaws caused by violations of protocol specification requirements and program logic. Discovering such variables is significant in discovering and exploiting vulnerabilities in protocol software, and still needs massive manual verifications. In this paper, we propose a novel method that could automatically discover the use of in . The core idea is that a stateful variable features information of the communication entities and the software states, so it will exist in the form of a global or static variable during program execution. Based on recording and replaying a protocol program's execution, varieties of variables in the life cycle can be tracked with the technique of dynamic instrument. We draw up some rules from multiple dimensions by taking full advantage of the existing vulnerability knowledge to determine whether the data stored in critical memory areas have stateful characteristics. We also implement a prototype system that can discover automatically and then perform it on nine programs in ProFuzzBench and two complex real-world software programs. With the help of available open-source code, the evaluation results show that the average true positive rate (TPR) can reach 82% and the average precision can be approximately up to 96%.

Keywords: Stateful variables     Network protocol software     Program analysis technology     Network security    

Anonymous-address-resolution model Article

Guang-jia SONG,Zhen-zhou JI

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10,   Pages 1044-1055 doi: 10.1631/FITEE.1500382

Abstract: Analyses and experiments show that AS-AR has a higher security level than existing security methods,

Keywords: Network security     Address resolution     Neighbor discovery     Anonymous    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Theory and Practice of Hydrodynamic Reconstruction in Plain River Networks Article

Hongwu Tang, Saiyu Yuan, Hao Cao

Engineering 2023, Volume 24, Issue 5,   Pages 202-212 doi: 10.1016/j.eng.2022.01.015

Abstract: Filled with intense human activities, these areas are characterized by serious water security problemsfound that all these problems are related to hydrodynamics, and the spatiotemporal imbalance of river networkThe principles of the integrated management of water problems in river network areas are put forward.of the theory are demonstrated through a case study aiming to improve the water quality of the river network

Keywords: Plain river network     Water security problems     Hydrodynamic reconstruction     Multi-objective     Integrated    

Title Author Date Type Operation

Summarization of Network Security

Li Ying,Shan Xiuming,Ren Yong

Journal Article

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF

Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN

Journal Article

Network Security Management and Protection of Industrial Internet Equipment

Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu

Journal Article

Discussion on a new paradigm of endogenous security towards 6G networks

Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG

Journal Article

Innovative Development Strategy of New Network Technologies

Li Dan, Hu Yuxiang, Wu Jiangxing

Journal Article

Development of Intelligent Connection Computing Network Technologies

Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing

Journal Article

Security Development Path for Industrial Internet Supply Chain

Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang

Journal Article

Automatic discovery of stateful variables in network protocol software based on replay analysis

Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU

Journal Article

Anonymous-address-resolution model

Guang-jia SONG,Zhen-zhou JI

Journal Article

Soil security and global food security

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Theory and Practice of Hydrodynamic Reconstruction in Plain River Networks

Hongwu Tang, Saiyu Yuan, Hao Cao

Journal Article

Zou Yulong: 5G/6G Heterogeneous Network Communication Security and Power Internet of Things Application

17 Oct 2022

Conference Videos