Search scope:
排序: Display mode:
Summarization of Network Security
Li Ying,Shan Xiuming,Ren Yong
Strategic Study of CAE 2004, Volume 6, Issue 1, Pages 10-15
The content of computer network security is discussed in this article Firstly, the concept, systemand structure and model of computer network security are given.
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017
Considering the emergence of recent network security threats, this article presents network securitySome problems exist in emergency management of the status quo; the core technology and security assurancetraditional areas in order to improve current emergency technical measures becomes an important part of networksecurity.author proposes a multi-linkage elimination method that can mobilize system strength and protect against network
Keywords: network security threat information security emergency response emergency system
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005
The wide application of network technologies has meanwhile brought aboutbecome the double threats to the industry’s dedicated network and the traditional network architecturerestricts network security and reliability in the rail transit industry.security, (3) improving the operation and management of network security, and (4) enhancing talent cultivationfor network security in the rail transit industry.
Keywords: rail transit cyberspace security network architecture customized network network attack
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF Research Papers
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 6, Pages 872-884 doi: 10.1631/FITEE.1800520
By network security threat intelligence analysis based on a security knowledge graph (SKG), multi-sourcein Chinese and English in the field of network security, and there are difficulties in accurately identifyingnetwork security entities because of insufficient features extracted.network CNN-BiLSTM-CRF model combined with a feature template (FT).Experimental results showed that our method can achieve an F-score of 86% on a large-scale network security
Keywords: Network security entity Security knowledge graph (SKG) Entity recognition Feature template Neural network
Network Security Management and Protection of Industrial Internet Equipment
Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 81-87 doi: 10.15302/J-SSCAE-2021.02.011
Keywords: industrial Internet equipment network security management protection certification
Discussion on a new paradigm of endogenous security towards 6G networks Review
Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG
Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 10, Pages 1421-1450 doi: 10.1631/FITEE.2200060
The sixth-generation mobile communication (6G) networks will face more complex endogenous securityproblems, and it is urgent to propose new universal security theories and establish new practice normsto deal with the "unknown unknown" security threats in cyberspace.of 6G cyberspace security.of endogenous security and traditional security.
Keywords: 6G security New paradigm of endogenous security Core network Wireless access network
Innovative Development Strategy of New Network Technologies
Li Dan, Hu Yuxiang, Wu Jiangxing
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 15-21 doi: 10.15302/J-SSCAE-2021.02.003
Development of Intelligent Connection Computing Network Technologies
Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 39-48 doi: 10.15302/J-SSCAE-2023.06.014
Keywords: intelligent connection computing network technology diversified protocol integration of network storage and computing intelligent arrangement of service functions endogenous security
Security Development Path for Industrial Internet Supply Chain
Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 56-64 doi: 10.15302/J-SSCAE-2021.02.008
Industrial Internet security is crucial for strengthening the manufacturingand network sectors of China.high portability, can support the establishment of an intelligent and autonomous industrial Internet securityIn this study, we analyze the development demand for industrial Internet security from the perspectivestatus of deep learning to industrial Internet security in terms of device, control, network, application
Keywords: industrial Internet,supply chain,network security,development path
Automatic discovery of stateful variables in network protocol software based on replay analysis Research Article
Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 3, Pages 403-416 doi: 10.1631/FITEE.2200275
Keywords: Stateful variables Network protocol software Program analysis technology Network security
Anonymous-address-resolution model Article
Guang-jia SONG,Zhen-zhou JI
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 10, Pages 1044-1055 doi: 10.1631/FITEE.1500382
Keywords: Network security Address resolution Neighbor discovery Anonymous
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 144-151 doi: 10.15302/J-FASE-2015062
Keywords: food security protein security nutrition dietary pattern
Theory and Practice of Hydrodynamic Reconstruction in Plain River Networks Article
Hongwu Tang, Saiyu Yuan, Hao Cao
Engineering 2023, Volume 24, Issue 5, Pages 202-212 doi: 10.1016/j.eng.2022.01.015
Keywords: Plain river network Water security problems Hydrodynamic reconstruction Multi-objective Integrated
Title Author Date Type Operation
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Journal Article
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Journal Article
A network security entity recognition method based on feature template and CNN-BiLSTM-CRF
Ya QIN, Guo-wei SHEN, Wen-bo ZHAO, Yan-ping CHEN, Miao YU, Xin JIN
Journal Article
Network Security Management and Protection of Industrial Internet Equipment
Ma Juan, Yu Guangchen, Ke Haoren, Yang Dongmei, Wushour Silamu
Journal Article
Discussion on a new paradigm of endogenous security towards 6G networks
Xinsheng JI, Jiangxing WU, Liang JIN, Kaizhi HUANG, Yajun CHEN, Xiaoli SUN, Wei YOU, Shumin HUO, Jing YANG
Journal Article
Innovative Development Strategy of New Network Technologies
Li Dan, Hu Yuxiang, Wu Jiangxing
Journal Article
Development of Intelligent Connection Computing Network Technologies
Li Dan , Hu Yuxiang , Pan Heng , Zhang Jianhui , Wu Jiangxing
Journal Article
Security Development Path for Industrial Internet Supply Chain
Fan Peiru, Li Jun, Wang Chonghua, Zhang Xueying, Hao Zhiqiang
Journal Article
Automatic discovery of stateful variables in network protocol software based on replay analysis
Jianxin HUANG, Bo YU, Runhao LIU, Jinshu SU
Journal Article
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Journal Article
Theory and Practice of Hydrodynamic Reconstruction in Plain River Networks
Hongwu Tang, Saiyu Yuan, Hao Cao
Journal Article
Zou Yulong: 5G/6G Heterogeneous Network Communication Security and Power Internet of Things Application
17 Oct 2022
Conference Videos