Search scope:
排序: Display mode:
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security.and regulations for security testing and evaluation are distributed as policies for national security reviewThis paper focuses on the current international systems related to cybersecurity review, and analyzesBased on the above, this paper discusses how to establish a cybersecurity review system in the fieldsof law and regulation, organization framework, operation mode, review approach, and supporting technology
Keywords: cybersecurity review information technology product and service critical information infrastructure
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006
Although cybersecurity legislation has made some progress since the 18th National Congress of theCommunist Party of China, there is still a large gap between the law and development of cybersecuritySome people, both at home and abroad, question China's efforts in the legislation of cybersecurityBased on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecurityIn this way, a perfected legal system for cybersecurity will be achieved.
Keywords: networks Internet cybersecurity cybersecurity law legal system
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Engineering 2018, Volume 4, Issue 1, Pages 53-60 doi: 10.1016/j.eng.2018.01.004
Keywords: Cybersecurity Knowledge graph Knowledge deduction
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012
This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.
Keywords: active defense active immunity trusted computing trusted technology insurance system cybersecurity
The New Frontiers of Cybersecurity
Binxing Fang, Kui Ren, Yan Jia
Engineering 2018, Volume 4, Issue 1, Pages 1-2 doi: 10.1016/j.eng.2018.02.007
Cybersecurity Research—Essential to a Successful Digital Future
Jackie Craig
Engineering 2018, Volume 4, Issue 1, Pages 9-10 doi: 10.1016/j.eng.2018.02.006
Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014
Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreintrusion tolerance and moving target defense, we propose a research direction and a key point in the cybersecurityrebalancing strategy in order to provide a reference for the development of national cybersecurity.
Keywords: mimic defense active defense technology cybersecurity rebalance
Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense
Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007
Keywords: cybersecurity assurance system threat active defense guard mode
Frontiers of Agricultural Science and Engineering 2023, Volume 10, Issue 1, Pages 149-152 doi: 10.15302/J-FASE-2023481
Keywords: REVIEW
Yang YU, Jiafu TANG
Frontiers of Engineering Management 2019, Volume 6, Issue 2, Pages 183-192 doi: 10.1007/s42524-019-0028-1
Keywords: seru production production mode flexibility literature review
A review of bifacial solar photovoltaic applications
Frontiers in Energy Pages 704-726 doi: 10.1007/s11708-023-0903-7
Keywords: bifacial photovoltaics (BPVs) bifacial photovoltaics applications review solar
Past in review and future plans
Yi QIAN
Frontiers of Environmental Science & Engineering 2009, Volume 3, Issue 1, Pages 2-11 doi: 10.1007/s11783-009-0002-y
A brief review on nonlinear modeling methods and applications of compliant mechanisms
Guangbo HAO,Jingjun YU,Haiyang LI
Frontiers of Mechanical Engineering 2016, Volume 11, Issue 2, Pages 119-128 doi: 10.1007/s11465-016-0387-9
Keywords: compliant mechanisms modelling nonlinearity applications review
A concise review about fracture assessments of brittle solids with V-notches
Hsien-Yang YEH, Bin YANG
Frontiers of Structural and Civil Engineering 2019, Volume 13, Issue 2, Pages 478-485 doi: 10.1007/s11709-019-0520-z
A concise review of recent studies about the fracture assessments of elastic brittle solid materials
Keywords: fracture assessment brittle solids V-notches review
Frontiers of Engineering Management 2022, Volume 9, Issue 2, Pages 196-213 doi: 10.1007/s42524-022-0188-2
Keywords: smart contracts blockchain construction industry BIM systematic review
Title Author Date Type Operation
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan
Journal Article
A Practical Approach to Constructing a Knowledge Graph for Cybersecurity
Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li
Journal Article
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen
Journal Article
Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense
Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan
Journal Article
A brief review on nonlinear modeling methods and applications of compliant mechanisms
Guangbo HAO,Jingjun YU,Haiyang LI
Journal Article
A concise review about fracture assessments of brittle solids with V-notches
Hsien-Yang YEH, Bin YANG
Journal Article