Resource Type

Journal Article 24

Year

2023 4

2022 1

2021 3

2019 1

2018 3

2016 10

2010 1

2005 1

open ︾

Keywords

cyberspace security 7

cyberspace 6

cyber sovereignty 2

national sovereignty 2

Artificial intelligence (AI) 1

Cyberspace 1

Cyberspace endogenous safety and security 1

Cyberspace endogenous security problem 1

Cyberspace security 1

Deep learning (DL) 1

Dynamic heterogeneous redundant architecture 1

Hybrid algorithm 1

Industrial 4.0 1

Internet of Things 1

Machine learning (ML) 1

Optimization algorithm 1

Relative right axiom 1

South China Sea 1

Uncertain threat 1

open ︾

Search scope:

排序: Display mode:

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001

Abstract:

Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension ofnational sovereignty to the platform of information and communication technology systems.This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty,and judges several erroneous points of view that deny cyber sovereignty.

Keywords: cyberspace     cyberspace sovereignty     stakeholder    

A Review of Major Viewpoints on Cyber Sovereignty around the World

Zhu Shibing,Zhang Xuebo and Wang Yu,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 89-93 doi: 10.15302/J-SSCAE-2016.06.018

Abstract:

As well as bringing great convenience, cyberspace poses new problems and challenges.Cyber sovereignty, in particular, constitutes the basic principle for solving national interest conflictsthat arise in the process of cyberspace development.the world; namely, advocating for cyber sovereignty, opposing it, or being indifferent to it.Our purpose is to provide an objective description of the cyber sovereignty situation.

Keywords: cyberspace     national sovereignty     cyber sovereignty     multiple stakeholders     information communication    

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Strategic Study of CAE 2016, Volume 18, Issue 4,   Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006

Abstract:

The paper summarizes the development situation and experiences of the Chinese cyberspace securitydevelopment trends, and proposes policy suggestions for the industry development to provide a reference for cyberspace

Keywords: cyberspace security     cyberspace security industry     independent and controllable     standards    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposesthat cyberspace security should shift its focus from emergency to response.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation    

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003

Abstract:

Cyberspace security has been a crucial part in national security and is more and more important inBased on the current situation of international cyberspace security, this article analyzes the opportunitiesand challenges that China is confronted with, and study China's international cyberspace security

Keywords: cyberspace security     cyberspace governance     cyberspace strategy    

Cyberspace Endogenous Safety and Security Article

Jiangxing Wu

Engineering 2022, Volume 15, Issue 8,   Pages 179-185 doi: 10.1016/j.eng.2021.05.015

Abstract: security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspacea definition for and lists the main technical characteristics of endogenous safety and security in cyberspace

Keywords: Cyberspace endogenous security problem     Uncertain threat     Cyberspace endogenous safety and security    

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract:

As cyberspace carries more and more national, public, and private interests, the issue of a cybersovereignty guarantee has attracted great attention around the world.From the perspective of China's cyber sovereignty situation, this paper analyzes the main problemsrelated to China's cyber sovereignty guarantee, including the implications of the cyber rights ofright on international cyberspace governance rules, and enhance the ability to safeguard national cyberspace

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense    

Cyberspace Security Models and Systematic Development from Multiple Perspectives

Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 116-125 doi: 10.15302/J-SSCAE-2023.06.009

Abstract:

As cyberspace technologies advance rapidly, cyberspace security risksEstablishing a unique cyberspace security model is a common practice to deal with complex security threatsThis study evaluates existing cyberspace security models from the perspectives of technology, disciplineFocusing on the perspective of cyberspace security technology, this study proposes a cyberspace securityenhance the cyberspace security capabilities of China.

Keywords: cyberspace     security model     security capability     derivative risk    

Cyberspace Security Competition and Talent Management

Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 49-52 doi: 10.15302/J-SSCAE-2016.06.010

Abstract:

Competition of talents is fundamental to international cyberspace security, and the discovery andFirst, we investigate the development status of domestic and international cyberspace security competitionThen, we analyze the main problems of cyberspace security competition in discovering and tracking talentsFinally, we propose a long-term policy to discover and track talents based on cyberspace competitions

Keywords: cyberspace security     competition     talent-discovery     talent-track    

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 44-48 doi: 10.15302/J-SSCAE-2016.06.009

Abstract:

Cyberspace security professional certification and vocational training is an important part of cyberspaceFirst, we survey the current situation of cyberspace security professional certification and vocationalThen, we analyze the main problems of cyberspace security professional certification and vocational trainingFinally, we propose a policy proposal to establish the architecture of cyberspace security professional

Keywords: cyberspace security     workforce framework     professional certification     vocational training    

Construction of Strategic Early-Warning System in Cyberspace

Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 1-7 doi: 10.15302/J-SSCAE-2021.02.001

Abstract:

Cyberspace strategic early-warning is a monitoring and warning systemthe national cyber development strategy in China requires high attentions to the construction of a cyberspaceThis study analyzes the major characteristics and basic requirements of strategic early-warning in cyberspaceIt also emphasizes four key projects, namely cyberspace surveying and mapping system, vulnerability collectionearly-warning system, after summarizing the construction of strategic early-warning and monitoring systems in cyberspace

Keywords: cyberspace security     strategic early warning     situation awareness     system construction    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract:

 Cyberspace is regarded as the fifth largest activity space followingProtecting cyberspace security is a major issue related to national security, national sovereignty, andrapid development of artificial intelligence (AI) technology and its application in various fields, cyberspaceThis study analyzes the new risks of cyberspace security in the era of AI, such as more intelligent networkthe construction of a cyberspace security knowledge brain and the detection of network attacks.

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Artificial intelligence algorithms for cyberspace security applications: a technological and status review Review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1117-1142 doi: 10.1631/FITEE.2200314

Abstract: Three technical problems should be solved urgently in : the timeliness and accuracy of network attack detection, the credibility assessment and prediction of the security situation, and the effectiveness of security defense strategy optimization. algorithms have become the core means to increase the chance of security and improve the network attack and defense ability in the application of . Recently, the breakthrough and application of AI technology have provided a series of advanced approaches for further enhancing network defense ability. This work presents a comprehensive review of AI technology articles for applications, mainly from 2017 to 2022. The papers are selected from a variety of journals and conferences: 52.68% are from Elsevier, Springer, and IEEE journals and 25% are from international conferences. With a specific focus on the latest approaches in , , and some popular s, the characteristics of the algorithmic models, performance results, datasets, potential benefits, and limitations are analyzed, and some of the existing challenges are highlighted. This work is intended to provide technical guidance for researchers who would like to obtain the potential of AI technical methods for and to provide tips for the later resolution of specific issues, and a mastery of the current development trends of technology and application and hot issues in the field of network security. It also indicates certain existing challenges and gives directions for addressing them effectively.

Keywords: intelligence (AI)     Machine learning (ML)     Deep learning (DL)     Optimization algorithm     Hybrid algorithm     Cyberspace    

Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace

Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 114-119 doi: 10.15302/J-SSCAE-2019.10.001

Abstract:

The cyberspace has expanded from traditional internet to ubiquitous cyberspacecomputing and edge computing can no longer satisfy the evolving computing needs of big data in ubiquitous cyberspaceThis paper presents a computing architecture named Fogcloud Computing for big data in ubiquitous cyberspacecollaborative computing language and models, thereby providing a solution for big data computing in ubiquitous cyberspace

Keywords: fogcloud computing     ubiquitous cyberspace     big data     Internet of Things     cloud computing    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract: Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasinglyThis study expounds on the basic concept and major characteristics of cyberspace security in the railIt sorts out the development status of cyberspace security protection systems in the rail transit industry

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Title Author Date Type Operation

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Journal Article

A Review of Major Viewpoints on Cyber Sovereignty around the World

Zhu Shibing,Zhang Xuebo and Wang Yu,Liu Yunjie

Journal Article

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Journal Article

Cyberspace Endogenous Safety and Security

Jiangxing Wu

Journal Article

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

Cyberspace Security Models and Systematic Development from Multiple Perspectives

Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong

Journal Article

Cyberspace Security Competition and Talent Management

Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting

Journal Article

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Journal Article

Construction of Strategic Early-Warning System in Cyberspace

Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Journal Article

Software Architecture of Fogcloud Computing for Big Data in Ubiquitous Cyberspace

Jia Yan, Fang Binxing, Wang Xiang, Wang Yongheng, An Jingbin,Li Aiping, Zhou Bin

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article