Resource Type

Journal Article 146

Year

2024 1

2023 6

2022 16

2021 8

2020 10

2019 7

2018 10

2017 3

2016 16

2015 11

2014 5

2013 3

2012 5

2011 4

2010 4

2009 7

2008 3

2007 7

2006 4

2004 2

open ︾

Keywords

environmental protection 16

protection 4

Environmental protection 3

Internet Plus 3

Sutong Bridge 3

active defense 3

sustainable development 3

COVID-19 2

Copyright protection 2

Machine learning 2

Northwest China 2

Qinba Mountain Area 2

Yellow River Basin 2

active immunity 2

cybersecurity 2

ecological protection 2

ecological protection and construction 2

energy saving 2

guard mode 2

open ︾

Search scope:

排序: Display mode:

Development Trend and Path of Industrial Internet Security Industry in China

Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 46-55 doi: 10.15302/J-SSCAE-2021.02.007

Abstract:

Industrial Internet security is a prerequisite and guarantee for the high-quality development of China’s industrial Internet industry; it is also important for enhancing China’s cyber and manufacturing industries. This study aims at the future development of the industrial Internet security industry in China. First, we analyze the development status of the industry in terms of industrial policies, standards system, industrial structure, and industrial scale. Subsequently, we elaborate on the opportunities and trends of the industry and propose the development path for the next-generation industrial Internet security industry in China. To explore a sustainable development path suitable for China’s industrial Internet security industry, top-level design and policy guidance should be enhanced; technological innovation and transformation should be reinforced; advantages of enterprises and organizations should be complemented to construct a healthy development ecosystem; the security and stability of the supply chain should be emphasized; and personnel training and team building should be promoted to support the research collaboration among government, industry, universities, research institutes, and application. 
 

Keywords: industrial Internet security     industry ecosystem     classified protection of cybersecurity     independent    

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 28-33 doi: 10.15302/J-SSCAE-2016.06.006

Abstract:

Although cybersecurity legislation has made some progress since the 18th National Congress of theCommunist Party of China, there is still a large gap between the law and development of cybersecurityBased on a study of current cybersecurity law, we suggest that it is necessary to speed up cybersecuritylaw, administrative law for cyber information service, personal information protection law, e-governmentIn this way, a perfected legal system for cybersecurity will be achieved.

Keywords: networks     Internet     cybersecurity     cybersecurity law     legal system    

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity Article

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Engineering 2018, Volume 4, Issue 1,   Pages 53-60 doi: 10.1016/j.eng.2018.01.004

Abstract: it is very significant that certain scholars have combined the concept of the knowledge graph with cybersecurityin order to construct a cybersecurity knowledge base.This paper presents a cybersecurity knowledge base and deduction rules based on a quintuple model.Using machine learning, we extract entities and build ontology to obtain a cybersecurity knowledge baseStanford NER provides many features and the useGazettes parameter may be used to train a recognizer in the cybersecurity

Keywords: Cybersecurity     Knowledge graph     Knowledge deduction    

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 58-61 doi: 10.15302/J-SSCAE-2016.06.012

Abstract:

This paper introduces the status, problems, and future strategies of the cyberspace security infrastructure system, and proposes that cyberspace security infrastructure must be based on active defense. Therefore, this paper proposes several suggestions for a trusted technology insurance system, which include the following: In order to build a trusted technology insurance system, independent innovation in active defense must be the breaking point; key information security systems must be developed by local institutions; independent innovation must be increased; research, product development, and active defense applications must be promoted; the development of trusted computing standards must be promoted; and experimental demonstrations must be carried out.

Keywords: active defense     active immunity     trusted computing     trusted technology insurance system     cybersecurity    

Implement and Innovate Environmental Protection Measures, Promote Green Protection of Cultural Relics

Fu-qing Liang,Yong-ping Sun

Frontiers of Engineering Management 2014, Volume 1, Issue 4,   Pages 330-335 doi: 10.15302/J-FEM-2014055

Abstract: The subject is implementing and innovating environmental protection measures, and promoting green protection

Keywords: environmental science     the Three Gorges cultural relics     innovate environmental protection measures     greenprotection    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.This paper focuses on the current international systems related to cybersecurity review, and analyzesBased on the above, this paper discusses how to establish a cybersecurity review system in the fields

Keywords: cybersecurity review     information technology product and service     critical information infrastructure    

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Engineering 2018, Volume 4, Issue 1,   Pages 1-2 doi: 10.1016/j.eng.2018.02.007

Cybersecurity Research—Essential to a Successful Digital Future

Jackie Craig

Engineering 2018, Volume 4, Issue 1,   Pages 9-10 doi: 10.1016/j.eng.2018.02.006

CROP PROTECTION OPENS UP NEW ERA OF CONSERVATION AND UTILIZATION OF GREEN OPTIONS

Frontiers of Agricultural Science and Engineering 2022, Volume 9, Issue 1,   Pages 1-3 doi: 10.15302/J-FASE-2021431

Abstract: Therefore, to solve the problem of crop pests and diseases, suitable green crop protection methods havemajor crop pests provides better pest management and acts as a fundamental part of an integrated plant protectiondocumenting the history of research and application, Chinese laws and regulations related to plant protection

Field management is a traditional conservation agriculture technique on plant protection such

Pesticides are widely used in the crop protection.

Bioengineering protection mechanism of city rock slope and its laboratory test

Desong JIANG, Minghua ZHAO, Chong JIANG,

Frontiers of Structural and Civil Engineering 2009, Volume 3, Issue 4,   Pages 414-421 doi: 10.1007/s11709-009-0055-9

Abstract: Based on the features of rock slope bioengineering protection, the ecology protection mechanism of theFurthermore, the indoor model experiment of urban crag rock slope ecology protection was designed and

Keywords: indoor     engineering project     protection mechanism     different     runoff lagging    

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract:

Cybersecurity is in an unbalanced situation: It is easy to attack cybersecurity but difficult to defendActive defense technology is a new direction in cybersecurity research that has attracted more and moreintrusion tolerance and moving target defense, we propose a research direction and a key point in the cybersecurityrebalancing strategy in order to provide a reference for the development of national cybersecurity.

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 96-105 doi: 10.15302/J-SSCAE-2023.06.007

Abstract: rapid development of network attack and defense technologies has posed various challenges to current cybersecurityA cybersecurity guarantee system based on a guard mode and its key technical tasks are proposed.protection level of China; (2) exploring the research and application of security protectiontechnologies based on the guard mode and achieving the integration of existing and new security protection

Keywords: cybersecurity     assurance system     threat     active defense     guard mode    

Game Theory Analysis of Marine Rights Protection

Wang Lei, Chen Hua, Kang Meize, Ma Xiaochuan

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 80-86 doi: 10.15302/J-SSCAE-2019.06.015

Abstract:

This study discusses marine rights protection from the perspective ofIt introduces the role of marine rights protection in handling marine disputes, as well as the nature, direction, and elements of the game in China’s marine rights protection.To this end, this study categorizes marine rights protection into three basic game processes, i.e., entryIt is concluded that improving technological means for marine rights protection can effectively change

Keywords: marine rights protection     game theory     marine rights protection technology     United Nations Convention    

Review of challenges and strategies for balanced urban–rural environmental protection in China

Beidou XI,Xiaoguang LI,Jixi GAO,Ying ZHAO,Hongliang LIU,Xunfeng XIA,Tianxue YANG,Lieyu ZHANG,Xuan JIA

Frontiers of Environmental Science & Engineering 2015, Volume 9, Issue 3,   Pages 371-384 doi: 10.1007/s11783-014-0744-z

Abstract: With the rise of environmentalism in China, great efforts have been devoted to environmental protectionCompared with urban environmental protection, rural environmental protection has not been attached enough, and the environmental protection awareness of people.urban–rural environmental protection” (BUREP), government should consider mapping out proper policieswith urban environmental protection in China.

Keywords: urban environment     rural environment     balanced urban–rural environmental protection     framework of balancedurban–rural environmental protection (BUREP)    

Enhance the Protection System of Primary Cultivated Land to Promote Sustainable Prosperity of the Chinese

Li Boheng

Strategic Study of CAE 2004, Volume 6, Issue 3,   Pages 1-5

Abstract: order to support sustainable economic development, the Chinese Government has decided to implement the protectionThe primary agricultural land protection system is one of the basic conditions to support sustainable

Keywords: enhance     agricultural land     protection    

Title Author Date Type Operation

Development Trend and Path of Industrial Internet Security Industry in China

Wang Qiuhua, Wu Guohua, Wei Dongxiao, Miao Gongxun, Xu Yanfei, Ren Yizhi

Journal Article

A Study on the Improvement of the Cybersecurity Legal System in China

Li Yuxiao,Wu Hequan and Xie Yongjiang,Jiang Shuli、Cui Congcong、Mi Tienan

Journal Article

A Practical Approach to Constructing a Knowledge Graph for Cybersecurity

Yan Jia, Yulu Qi, Huaijun Shang, Rong Jiang, Aiping Li

Journal Article

TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense

Zhang Dawei,Shen Changxiang, Liu Jiqiang, Zhang Feifei, Li Lun, Cheng Lichen

Journal Article

Implement and Innovate Environmental Protection Measures, Promote Green Protection of Cultural Relics

Fu-qing Liang,Yong-ping Sun

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

The New Frontiers of Cybersecurity

Binxing Fang, Kui Ren, Yan Jia

Journal Article

Cybersecurity Research—Essential to a Successful Digital Future

Jackie Craig

Journal Article

CROP PROTECTION OPENS UP NEW ERA OF CONSERVATION AND UTILIZATION OF GREEN OPTIONS

Journal Article

Bioengineering protection mechanism of city rock slope and its laboratory test

Desong JIANG, Minghua ZHAO, Chong JIANG,

Journal Article

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

Cybersecurity Assurance System in the New Era and Development Suggestions Thereof: From Self-Defense

Tian Zhihong, Fang Binxing , Liao Qing , Sun Yanbin , Wang Ye , Yang Xu , Feng Jiyuan

Journal Article

Game Theory Analysis of Marine Rights Protection

Wang Lei, Chen Hua, Kang Meize, Ma Xiaochuan

Journal Article

Review of challenges and strategies for balanced urban–rural environmental protection in China

Beidou XI,Xiaoguang LI,Jixi GAO,Ying ZHAO,Hongliang LIU,Xunfeng XIA,Tianxue YANG,Lieyu ZHANG,Xuan JIA

Journal Article

Enhance the Protection System of Primary Cultivated Land to Promote Sustainable Prosperity of the Chinese

Li Boheng

Journal Article