Resource Type

Journal Article 348

Conference Videos 2

Year

2024 2

2023 41

2022 49

2021 39

2020 33

2019 18

2018 26

2017 33

2016 21

2015 11

2014 13

2013 9

2012 5

2011 5

2010 6

2009 10

2008 4

2005 1

2004 3

2003 5

open ︾

Keywords

review 22

China 8

literature review 8

3D printing 4

Additive manufacturing 3

Artificial intelligence 3

3D bioprinting 2

BIM 2

Machine learning 2

Recycling 2

Scaffold 2

Systematic review 2

adsorption 2

application 2

applications 2

carbon capture 2

characterization 2

combustion 2

cyberspace 2

open ︾

Search scope:

排序: Display mode:

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.and regulations for security testing and evaluation are distributed as policies for national security reviewThis paper focuses on the current international systems related to cybersecurity review, and analyzesBased on the above, this paper discusses how to establish a cybersecurity review system in the fieldsof law and regulation, organization framework, operation mode, review approach, and supporting technology

Keywords: cybersecurity review     information technology product and service     critical information infrastructure    

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006

Abstract:

Although cybersecurity legislation has made some progress since the 18th National Congress of theCommunist Party of China, there is still a large gap between the law and development of cybersecuritySome people, both at home and abroad, question China's efforts in the legislation of cybersecurityBased on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecurityIn this way, a perfected legal system for cybersecurity will be achieved.

Keywords: networks     Internet     cybersecurity     cybersecurity law     legal system    

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Engineering 2018, Volume 4, Issue 1,   Pages 53-60 doi: 10.1016/j.eng.2018.01.004

Abstract: it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurityin order to construct a cybersecurity knowledge base.This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model.Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge baseStanford NER provides many features and the useGazettes parameter may be used to train a recognizer in the cybersecurity

Keywords: Cybersecurity     Knowledge graph     Knowledge deduction    

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012

Abstract:

This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.

Keywords: active defense     active immunity     trusted computing     trusted technology insurance system     cybersecurity    

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Engineering 2018, Volume 4, Issue 1,   Pages 1-2 doi: 10.1016/j.eng.2018.02.007

Cybersecurity Research—Essential to a Successful Digital Future

Jackie Craig

Engineering 2018, Volume 4, Issue 1,   Pages 9-10 doi: 10.1016/j.eng.2018.02.006

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract:

Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreintrusion tolerance and moving target defense, we propose a research direction and a key point in the cybersecurityrebalancing strategy in order to provide a reference for the development of national cybersecurity.

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007

Abstract: rapid development of network attack and defense technologies has posed various challenges to current cybersecurityTherefore, studying a new cybersecurity assurance system has become an urgent need to promote the developmentA cybersecurity guarantee system based on a guard mode and its key technical tasks are proposed.Furthermore, we propose the following suggestions: (1) exploring the cybersecurity assurance mechanisms3) exploring a new talent-training model to cultivate innovative and practical professionals in the cybersecurity

Keywords: cybersecurity     assurance system     threat     active defense     guard mode    

A DECADE REVIEW OF

Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1,   Pages 149-152 doi: 10.15302/J-FASE-2023481

Abstract: A DECADE REVIEW OF

Keywords: REVIEW    

Review of

Yang YU, Jiafu TANG

Frontiers of Engineering Management 2019, Volume 6, Issue 2,   Pages 183-192 doi: 10.1007/s42524-019-0028-1

Abstract: production is regarded as a new production mode and derived from the production site of Japanese electronics industry. This production mode is proposed to overcome the low flexibility of the assembly line. production has been successfully implemented in Japanese electronics industry, such as Canon and Sony. Benefits from production include rapid response, good flexibility, and high productivity. production has received extensive attention in academic research and production practice. This study reviews the background, characteristics, types, and operation of production. The advantages and applicable scenes of production are summarized from the perspective of business practice. We compare production and famous production modes, i.e., assembly line, cellular manufacturing, and Toyota Production System. The literature on production is surveyed and classified. Furthermore, future research directions are provided.

Keywords: seru production     production mode     flexibility     literature review    

A review of bifacial solar photovoltaic applications

Frontiers in Energy   Pages 704-726 doi: 10.1007/s11708-023-0903-7

Abstract: This review comprises an extensive in-depth look at BPV applications throughout all the current major

Keywords: bifacial photovoltaics (BPVs)     bifacial     photovoltaics     applications     review     solar    

Past in review and future plans

Yi QIAN

Frontiers of Environmental Science & Engineering 2009, Volume 3, Issue 1,   Pages 2-11 doi: 10.1007/s11783-009-0002-y

A brief review on nonlinear modeling methods and applications of compliant mechanisms

Guangbo HAO,Jingjun YU,Haiyang LI

Frontiers of Mechanical Engineering 2016, Volume 11, Issue 2,   Pages 119-128 doi: 10.1007/s11465-016-0387-9

Abstract: This paper aims to provide a brief systematic review on the advances of nonlinear static modeling approaches

Keywords: compliant mechanisms     modelling     nonlinearity     applications     review    

A concise review about fracture assessments of brittle solids with V-notches

Hsien-Yang YEH, Bin YANG

Frontiers of Structural and Civil Engineering 2019, Volume 13, Issue 2,   Pages 478-485 doi: 10.1007/s11709-019-0520-z

Abstract:

A concise review of recent studies about the fracture assessments of elastic brittle solid materials

Keywords: fracture     assessment     brittle solids     V-notches     review    

Systematic literature review on smart contracts in the construction industry: Potentials, benefits, and

Frontiers of Engineering Management 2022, Volume 9, Issue 2,   Pages 196-213 doi: 10.1007/s42524-022-0188-2

Abstract: Therefore, this study carries out a systematic review based on 81 research articles published from 2014

Keywords: smart contracts     blockchain     construction industry     BIM     systematic review    

Title Author Date Type Operation

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Journal Article

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Journal Article

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Journal Article

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Journal Article

Cybersecurity Research—Essential to a Successful Digital Future

Jackie Craig

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Journal Article

A DECADE REVIEW OF

Journal Article

Review of

Yang YU, Jiafu TANG

Journal Article

A review of bifacial solar photovoltaic applications

Journal Article

Past in review and future plans

Yi QIAN

Journal Article

A brief review on nonlinear modeling methods and applications of compliant mechanisms

Guangbo HAO,Jingjun YU,Haiyang LI

Journal Article

A concise review about fracture assessments of brittle solids with V-notches

Hsien-Yang YEH, Bin YANG

Journal Article

Systematic literature review on smart contracts in the construction industry: Potentials, benefits, and

Journal Article