Resource Type

Journal Article 558

Conference Videos 32

Conference Information 3

Year

2023 45

2022 57

2021 56

2020 47

2019 38

2018 37

2017 37

2016 56

2015 22

2014 19

2013 9

2012 9

2011 14

2010 13

2009 10

2008 17

2007 18

2006 13

2005 13

2004 11

open ︾

Keywords

food security 39

energy security 19

information 19

China 13

information technology 12

Software-defined networking (SDN) 7

sustainable development 7

building information modeling 5

cyberspace security 5

security 5

Physical layer security 4

climate change 4

cyberspace 4

energy revolution 4

geographic information system 4

system construction 4

water security 4

Geographic information system 3

Network security 3

open ︾

Search scope:

排序: Display mode:

Research and practice on system engineering management of a mobile payment project

Yongkai ZHOU, Hongfeng CHAI

Frontiers of Engineering Management 2017, Volume 4, Issue 2,   Pages 127-137 doi: 10.15302/J-FEM-2017011

Abstract: Integration of innovative technologies is introduced to resolve the contradiction between ease-of-use and security

Keywords: systems engineering     mobile payment     engineering management method     Mobile QuickPass     national informationsecurity     rapid iteration process     financial security     coordination and cooperation    

Contribution of national bioassessment approaches for assessing ecological water security: an AUSRIVAS

Susan J. NICHOLS, Fiona J. DYER

Frontiers of Environmental Science & Engineering 2013, Volume 7, Issue 5,   Pages 669-687 doi: 10.1007/s11783-013-0556-6

Abstract: River managers in Australia are managing in the face of extremes to provide security of water supplyBalancing the water requirements of people, environments and economies requires that water security isCommon definitions of water security focus on the needs of both humans and ecosystems for purposes suchInformation about achieving water security for the environment or ecological purposes can be a challengeYet the concepts surrounding river health are inherently linked to holistic concepts of water security

Keywords: ecological water security     biological assessment     river health    

Spatial distribution of ecological security status assessment of West-Liaohe River based on geographicinformation system

WANG Geng, WU Wei

Frontiers of Environmental Science & Engineering 2007, Volume 1, Issue 4,   Pages 471-476 doi: 10.1007/s11783-007-0075-4

Abstract: Eco-security assessment is a hot research area in resource and environmental science, which involvesGeographic information system (GIS), as a useful tool to analyze and mana

Keywords: environmental     Eco-security assessment     resource     Geographic information     non-linear    

The System Standpoint on Information Safety

Li Daimao

Strategic Study of CAE 2007, Volume 9, Issue 8,   Pages 21-25

Abstract:

The meanings in three layers on information safety are given.safety,  because the science of information safety is the merger of natural and social sciences The concept of information system which includes elements,  boundary,  working condition The relation between the system and information safety is analyzed,  and an example aboutinformation safety in communication is given.

Keywords: information safety     security factor     information hiding     boundary     threat    

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun

Strategic Study of CAE 2019, Volume 21, Issue 3,   Pages 108-113 doi: 10.15302/J-SSCAE-2019.03.006

Abstract: Meanwhile, multiple risks are also brought to information security by intelligentization and networkingIn recent years, hacker attacks frequently occur, and information security not only affects driving safetyand user data safety, but also threatens national security when being damaged.So, information security issues have attracted great attention from governments all over the world.In this context, China should promote the development and management of the information security of the

Keywords: intelligent connected vehicles     information security     automotive industry     management    

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003

Abstract:

Cyberspace security has been a crucial part in national security and is more and more important inBased on the current situation of international cyberspace security, this article analyzes the opportunitiesand challenges that China is confronted with, and study China's international cyberspace securitystrategy suitable for its own value and national interest.

Keywords: cyberspace security     cyberspace governance     cyberspace strategy    

Onmodeling of electrical cyber-physical systems considering cyber security Project supportedby the National Basic Research Program (863) of China (No. 2015AA05002), the National Natural Science

Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 5,   Pages 465-478 doi: 10.1631/FITEE.1500446

Abstract: This paper establishes a new framework for modeling electrical cyber-physical systems (ECPSs), integrating both power grids and communication networks. To model the communication network associated with a power transmission grid, we use a mesh network that considers the features of power transmission grids such as high-voltage levels, long-transmission distances, and equal importance of each node. Moreover, bidirectional links including data uploading channels and command downloading channels are assumed to connect every node in the communication network and a corresponding physical node in the transmission grid. Based on this model, the fragility of an ECPS is analyzed under various cyber attacks including denial-of-service (DoS) attacks, replay attacks, and false data injection attacks. Control strategies such as load shedding and relay protection are also verified using this model against these attacks.

Keywords: Cyber-physical systems     Cyber attacks     Cascading failure analysis     Smart grid    

Development and application of earth observation and nation security

Zhou Zhixing,Wu Zhigang,Ji Yan

Strategic Study of CAE 2008, Volume 10, Issue 6,   Pages 28-32

Abstract: The development trend of the earth observation technology is described from the angle of nation securityimportant on the economy building and technology development, which faces the different requirements on information

Keywords: earth observation     nation security     space information    

Developing coal chemical industry and ensuring national energy security

Xu Yaowu,Xu Liwei,Lu Yongjun

Strategic Study of CAE 2011, Volume 13, Issue 11,   Pages 20-25

Abstract:

This article proposes the way of thinking and viewpoints for implementing the strategy of coal replacing oil in view of actual situation of energy structure in China by means of explanation and analysis on theory and practice, expounding the necessity and significance of implementing the strategy of coal chemical industry replacing oil chemical industry from several respects, summarizes the technical process and market situation of several main coal chemical industry products, and makes comparison and analysis on their competitiveness. Based on this, this article explicitly proposes the detailed ideas and suggestions for implementing the strategy of coal replacing oil. At the same time, the article makes analysis and explanation on several focus issues such as water resource and carbon emission that attract much attention during the development of coal chemical industry, and proposes its own viewpoints.

Keywords: coal chemical industry     replacement     oil chemical industry     strategy     energy security     advice    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.The rules and regulations for security testing and evaluation are distributed as policies for nationalsystems related to cybersecurity review, and analyzes governments’ practices in the aspects of informationtechnology product and service security evaluation, critical information infrastructure security evaluationand management, information and communication technology (ICT) supply chain security, and background

Keywords: cybersecurity review     information technology product and service     critical information infrastructure     supply chain security     background security    

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017

Abstract:

Considering the emergence of recent network security threats, this article presents network securitySome problems exist in emergency management of the status quo; the core technology and security assuranceareas in order to improve current emergency technical measures becomes an important part of network security

Keywords: network security     threat     information security     emergency response     emergency system    

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 60-66 doi: 10.15302/J-SSCAE-2021.03.002

Abstract: Thus, studying the security problems induced by the deep fusion of AI and cyberspace security becomesIn this article, we systematically analyze the major national security issues induced by the fusion,involving political, economic, social, and national defense securities.These issues aggravate the existing security risks and trigger new threats.Sharing of AI security data assets should be encouraged to develop a data-centered path for AI-enabled

Keywords: artificial intelligence (AI)     cyber attack and defense     national security     autonomous collaboration    

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Strategic Study of CAE 2021, Volume 23, Issue 5,   Pages 41-50 doi: 10.15302/J-SSCAE-2021.05.006

Abstract: Strengthening research on the coordination of public health security emergency information and buildingthe public health security information management in China.This study analyzes the structure and connotations of public health security emergency information andproposes a new structure for emergency information management of sudden epidemics in China.We create a hierarchical blockchain model for information sharing among emergency response departments

Keywords: COVID-19 pandemic     public health security     emergency information     sharing     consortium blockchain    

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010

Abstract:

Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whilefrom the aspects of basic resource database construction, information sharing and exchange, situationproposed in terms of the compatibility and adaptation of information technology application innovationof intelligent security service, integrated public service platform, and new generation information

Keywords: industrial Internet security     security-related public service     cybersecurity     industrial informationsecurity     innovative development    

Energy Revolution and Security Guarantee of China’s Energy Economy

Huang Weihe, Mei Yingdan, Wu Lili, Liang Yunling, Zhao Xiaoli

Strategic Study of CAE 2021, Volume 23, Issue 1,   Pages 124-132 doi: 10.15302/J-SSCAE-2021.01.018

Abstract: We conclude that China’s energy revolution is less likely to affect the security of the energyeconomy and the energy price rise remains within the acceptable range of national economy and energyTo better ensure the security of energy economy in the process of China’s energy revolution, we

Keywords: energy revolution     security of energy economy     energy structure     energy price     national economy    

Title Author Date Type Operation

Research and practice on system engineering management of a mobile payment project

Yongkai ZHOU, Hongfeng CHAI

Journal Article

Contribution of national bioassessment approaches for assessing ecological water security: an AUSRIVAS

Susan J. NICHOLS, Fiona J. DYER

Journal Article

Spatial distribution of ecological security status assessment of West-Liaohe River based on geographicinformation system

WANG Geng, WU Wei

Journal Article

The System Standpoint on Information Safety

Li Daimao

Journal Article

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun

Journal Article

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Journal Article

Onmodeling of electrical cyber-physical systems considering cyber security Project supportedby the National Basic Research Program (863) of China (No. 2015AA05002), the National Natural Science

Yi-nan WANG,Zhi-yun LIN,Xiao LIANG,Wen-yuan XU,Qiang YANG,Gang-feng YAN

Journal Article

Development and application of earth observation and nation security

Zhou Zhixing,Wu Zhigang,Ji Yan

Journal Article

Developing coal chemical industry and ensuring national energy security

Xu Yaowu,Xu Liwei,Lu Yongjun

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Journal Article

AI-Enabled Cyberspace Attacks: Security Risks and Countermeasures

Fang Binxing, Shi Jinqiao, Wang Zhongru, Yu Weiqiang

Journal Article

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Journal Article

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Journal Article

Energy Revolution and Security Guarantee of China’s Energy Economy

Huang Weihe, Mei Yingdan, Wu Lili, Liang Yunling, Zhao Xiaoli

Journal Article