Search scope:
排序: Display mode:
Research on Cyberspace Sovereignty
Fang Binxing,Zou Peng and Zhu Shibing
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001
Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension ofnational sovereignty to the platform of information and communication technology systems.This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty,and judges several erroneous points of view that deny cyber sovereignty.
Keywords: cyberspace cyberspace sovereignty stakeholder
A Review of Major Viewpoints on Cyber Sovereignty around the World
Zhu Shibing,Zhang Xuebo and Wang Yu,Liu Yunjie
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 89-93 doi: 10.15302/J-SSCAE-2016.06.018
As well as bringing great convenience, cyberspace poses new problems and challenges.Cyber sovereignty, in particular, constitutes the basic principle for solving national interest conflictsthat arise in the process of cyberspace development.the world; namely, advocating for cyber sovereignty, opposing it, or being indifferent to it.Our purpose is to provide an objective description of the cyber sovereignty situation.
Keywords: cyberspace national sovereignty cyber sovereignty multiple stakeholders information communication
Study on the Development of China’s Cyberspace Security Industry
An Da, Liang Zhihao, Xu Shouren
Strategic Study of CAE 2016, Volume 18, Issue 4, Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006
The paper summarizes the development situation and experiences of the Chinese cyberspace securitydevelopment trends, and proposes policy suggestions for the industry development to provide a reference for cyberspace
Keywords: cyberspace security cyberspace security industry independent and controllable standards
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016
Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.
Keywords: cyberspace security emergency for cyberspace security response for cyberspace security transformation
Research on the International Strategy for National Cyberspace Security
Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003
Cyberspace security has been a crucial part in national security and is more and more important inBased on the current situation of international cyberspace security, this article analyzes the opportunitiesand challenges that China is confronted with, and study China's international cyberspace security
Keywords: cyberspace security cyberspace governance cyberspace strategy
Cyberspace Endogenous Safety and Security Article
Jiangxing Wu
Engineering 2022, Volume 15, Issue 8, Pages 179-185 doi: 10.1016/j.eng.2021.05.015
Keywords: Cyberspace endogenous security problem Uncertain threat Cyberspace endogenous safety and security
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002
As cyberspace carries more and more national, public, and private interests, the issue of a cybersovereignty guarantee has attracted great attention around the world.From the perspective of China's cyber sovereignty situation, this paper analyzes the main problemsrelated to China's cyber sovereignty guarantee, including the implications of the cyber rights ofright on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace
Keywords: cyber sovereignty cyber right of independence cyber right of equality cyber right of self-defense
Cyberspace Security Models and Systematic Development from Multiple Perspectives
Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 116-125 doi: 10.15302/J-SSCAE-2023.06.009
As cyberspace technologies advance rapidly, cyberspace security risksEstablishing a unique cyberspace security model is a common practice to deal with complex security threatsThis study evaluates existing cyberspace security models from the perspectives of technology, disciplineFocusing on the perspective of cyberspace security technology, this study proposes a cyberspace securityenhance the cyberspace security capabilities of China.
Keywords: cyberspace security model security capability derivative risk
Cyberspace Security Competition and Talent Management
Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 49-52 doi: 10.15302/J-SSCAE-2016.06.010
Competition of talents is fundamental to international cyberspace security, and the discovery andFirst, we investigate the development status of domestic and international cyberspace security competitionThen, we analyze the main problems of cyberspace security competition in discovering and tracking talentsFinally, we propose a long-term policy to discover and track talents based on cyberspace competitions
Keywords: cyberspace security competition talent-discovery talent-track
Research on the Architecture of Cyberspace Security Professional Certification in China
Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 44-48 doi: 10.15302/J-SSCAE-2016.06.009
Cyberspace security professional certification and vocational training is an important part of cyberspaceFirst, we survey the current situation of cyberspace security professional certification and vocationalThen, we analyze the main problems of cyberspace security professional certification and vocational trainingFinally, we propose a policy proposal to establish the architecture of cyberspace security professional
Keywords: cyberspace security workforce framework professional certification vocational training
Construction of Strategic Early-Warning System in Cyberspace
Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 1-7 doi: 10.15302/J-SSCAE-2021.02.001
Cyberspace strategic early-warning is a monitoring and warning systemthe national cyber development strategy in China requires high attentions to the construction of a cyberspaceThis study analyzes the major characteristics and basic requirements of strategic early-warning in cyberspaceIt also emphasizes four key projects, namely cyberspace surveying and mapping system, vulnerability collectionearly-warning system, after summarizing the construction of strategic early-warning and monitoring systems in cyberspace
Keywords: cyberspace security strategic early warning situation awareness system construction
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Strategic Study of CAE 2021, Volume 23, Issue 3, Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003
Cyberspace is regarded as the fifth largest activity space followingProtecting cyberspace security is a major issue related to national security, national sovereignty, andrapid development of artificial intelligence (AI) technology and its application in various fields, cyberspaceThis study analyzes the new risks of cyberspace security in the era of AI, such as more intelligent networkthe construction of a cyberspace security knowledge brain and the detection of network attacks.
Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1117-1142 doi: 10.1631/FITEE.2200314
Keywords: intelligence (AI) Machine learning (ML) Deep learning (DL) Optimization algorithm Hybrid algorithm Cyberspace
Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace
Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin
Strategic Study of CAE 2019, Volume 21, Issue 6, Pages 114-119 doi: 10.15302/J-SSCAE-2019.10.001
The cyberspace has expanded from traditional internet to ubiquitous cyberspacecomputing and edge computing can no longer satisfy the evolving computing needs of big data in ubiquitous cyberspaceThis paper presents a computing architecture named Fogcloud Computing for big data in ubiquitous cyberspacecollaborative computing language and models, thereby providing a solution for big data computing in ubiquitous cyberspace
Keywords: fogcloud computing ubiquitous cyberspace big data Internet of Things cloud computing
Current Status and Future Development of Cyberspace Security in Rail Transit Industry
Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke
Strategic Study of CAE 2023, Volume 25, Issue 6, Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005
Keywords: rail transit cyberspace security network architecture customized network network attack
Title Author Date Type Operation
A Review of Major Viewpoints on Cyber Sovereignty around the World
Zhu Shibing,Zhang Xuebo and Wang Yu,Liu Yunjie
Journal Article
Study on the Development of China’s Cyberspace Security Industry
An Da, Liang Zhihao, Xu Shouren
Journal Article
Emergency and Response for Cyberspace Security
Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong
Journal Article
Research on the International Strategy for National Cyberspace Security
Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru
Journal Article
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng,He Jun,Zou Hongxia,Liu Yunjie
Journal Article
Cyberspace Security Models and Systematic Development from Multiple Perspectives
Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong
Journal Article
Cyberspace Security Competition and Talent Management
Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting
Journal Article
Research on the Architecture of Cyberspace Security Professional Certification in China
Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan
Journal Article
Construction of Strategic Early-Warning System in Cyberspace
Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai
Journal Article
Artificial Intelligence Enabled Cyberspace Security Defense
Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan
Journal Article
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com
Journal Article
Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace
Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin
Journal Article