Resource Type

Journal Article 479

Year

2023 40

2022 37

2021 42

2020 39

2019 29

2018 31

2017 28

2016 38

2015 20

2014 18

2013 8

2012 8

2011 14

2010 10

2009 9

2008 15

2007 14

2006 11

2005 12

2004 11

open ︾

Keywords

food security 39

energy security 19

information 19

information technology 12

China 10

sustainable development 7

building information modeling 5

cyberspace security 5

security 5

Physical layer security 4

cyberspace 4

geographic information system 4

water security 4

Geographic information system 3

Network security 3

Security 3

industrial Internet security 3

project management 3

6G 2

open ︾

Search scope:

排序: Display mode:

Spatial distribution of ecological security status assessment of West-Liaohe River based on geographicinformation system

WANG Geng, WU Wei

Frontiers of Environmental Science & Engineering 2007, Volume 1, Issue 4,   Pages 471-476 doi: 10.1007/s11783-007-0075-4

Abstract: Eco-security assessment is a hot research area in resource and environmental science, which involvesGeographic information system (GIS), as a useful tool to analyze and mana

Keywords: environmental     Eco-security assessment     resource     Geographic information     non-linear    

The System Standpoint on Information Safety

Li Daimao

Strategic Study of CAE 2007, Volume 9, Issue 8,   Pages 21-25

Abstract:

The meanings in three layers on information safety are given.safety,  because the science of information safety is the merger of natural and social sciences The concept of information system which includes elements,  boundary,  working condition The relation between the system and information safety is analyzed,  and an example aboutinformation safety in communication is given.

Keywords: information safety     security factor     information hiding     boundary     threat    

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun

Strategic Study of CAE 2019, Volume 21, Issue 3,   Pages 108-113 doi: 10.15302/J-SSCAE-2019.03.006

Abstract: Meanwhile, multiple risks are also brought to information security by intelligentization and networkingIn recent years, hacker attacks frequently occur, and information security not only affects driving safetySo, information security issues have attracted great attention from governments all over the world.security.In this context, China should promote the development and management of the information security of the

Keywords: intelligent connected vehicles     information security     automotive industry     management    

Research and practice on system engineering management of a mobile payment project

Yongkai ZHOU, Hongfeng CHAI

Frontiers of Engineering Management 2017, Volume 4, Issue 2,   Pages 127-137 doi: 10.15302/J-FEM-2017011

Abstract: Integration of innovative technologies is introduced to resolve the contradiction between ease-of-use and security

Keywords: systems engineering     mobile payment     engineering management method     Mobile QuickPass     national informationsecurity     rapid iteration process     financial security     coordination and cooperation    

Development and application of earth observation and nation security

Zhou Zhixing,Wu Zhigang,Ji Yan

Strategic Study of CAE 2008, Volume 10, Issue 6,   Pages 28-32

Abstract: The development trend of the earth observation technology is described from the angle of nation securityimportant on the economy building and technology development, which faces the different requirements on information

Keywords: earth observation     nation security     space information    

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008

Abstract:

Cybersecurity is part of national security.systems related to cybersecurity review, and analyzes governments’ practices in the aspects of informationtechnology product and service security evaluation, critical information infrastructure security evaluationand management, information and communication technology (ICT) supply chain security, and backgroundsecurity investigation.

Keywords: cybersecurity review     information technology product and service     critical information infrastructure     supply chain security     background security    

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017

Abstract:

Considering the emergence of recent network security threats, this article presents network securitySome problems exist in emergency management of the status quo; the core technology and security assuranceareas in order to improve current emergency technical measures becomes an important part of network security

Keywords: network security     threat     information security     emergency response     emergency system    

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Strategic Study of CAE 2021, Volume 23, Issue 5,   Pages 41-50 doi: 10.15302/J-SSCAE-2021.05.006

Abstract: Strengthening research on the coordination of public health security emergency information and buildingthe public health security information management in China.This study analyzes the structure and connotations of public health security emergency information andproposes a new structure for emergency information management of sudden epidemics in China.We create a hierarchical blockchain model for information sharing among emergency response departments

Keywords: COVID-19 pandemic     public health security     emergency information     sharing     consortium blockchain    

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010

Abstract:

Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whilefrom the aspects of basic resource database construction, information sharing and exchange, situationproposed in terms of the compatibility and adaptation of information technology application innovationof intelligent security service, integrated public service platform, and new generation information

Keywords: industrial Internet security     security-related public service     cybersecurity     industrial informationsecurity     innovative development    

On the role of optimization algorithms in ownership-preserving data mining None

Muhammad KAMRAN, Ehsan Ullah MUNIR

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2,   Pages 151-164 doi: 10.1631/FITEE.1601479

Abstract: Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Wa-termarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives: (1) preserving the knowledge stored in the data; (2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark em-bedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics.

Keywords: Information security     Optimization     Digital rights     Watermarking    

Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI None

Wei YANG, Jing MAO, Chen CHEN, Xiang CHENG, Liu-qing YANG, Hai-ge XIANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3,   Pages 398-408 doi: 10.1631/FITEE.1700026

Abstract: under the condition that both legitimate users and the eavesdropper are with imperfect channel state information

Keywords: Resource allocation     Orthogonal frequency-division multiple access (OFDMA)     Imperfect channel state information(CSI)     Physical layer security    

Soil security and global food security

Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530

Abstract:

● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.

Keywords: Agriculture     soil security     food security     regenerative    

Preserving privacy information flowsecurity in composite service evolution None

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5,   Pages 626-638 doi: 10.1631/FITEE.1700359

Abstract: When the changes occur, it is critical to preserve privacy information flow security.We propose an approach to preserve privacy information flow security in composite service evolution.collected by each component service is derived through a privacy data item dependency graph, and the securityFinally, the evolution operations that preserve privacy information flow security are defined.

Keywords: Composite service     Privacy information flow security     Service evolution     Petri net    

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2,   Pages 144-151 doi: 10.15302/J-FASE-2015062

Abstract: Food security, the need to meet nutritional requirements, and four main problems for food protein securityresidents’ nutritional requirements and balanced dietary patterns, the conclusion is that food securityin China is in essence dependent on protein production and security of supply and that fat and carbohydratespolicy suggestions are made, which could ensure a balanced supply and demand for food protein and food security

Keywords: food security     protein security     nutrition     dietary pattern    

Development of Energy and Mining Governance System Based on New-Generation Information Technology

Wang Guofa, Zhang Tiegang, Wang Chengshan, Pang Yihui, Yang Ting, Sun Chunsheng,Hu Yahui, Zhang Peng

Strategic Study of CAE 2022, Volume 24, Issue 1,   Pages 176-189 doi: 10.15302/J-SSCAE-2022.01.019

Abstract: style="text-align: justify;">In view of the risks and challenges facing China’s energy and mining securitytechnological path for reforming China’s energy and mining governance system based on the new-generation informationSpecifically, we explore the integration of the newgeneration information technologies with the energyapproach of building a new governance model of energy and mining industries based on the new-generation information

Keywords: energy security,next-generation information technology,energy and mining,government regulation,governance    

Title Author Date Type Operation

Spatial distribution of ecological security status assessment of West-Liaohe River based on geographicinformation system

WANG Geng, WU Wei

Journal Article

The System Standpoint on Information Safety

Li Daimao

Journal Article

Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles

Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun

Journal Article

Research and practice on system engineering management of a mobile payment project

Yongkai ZHOU, Hongfeng CHAI

Journal Article

Development and application of earth observation and nation security

Zhou Zhixing,Wu Zhigang,Ji Yan

Journal Article

Research on a Cybersecurity Review System with Suggestions

Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu

Journal Article

The Current Network Security Situation and Emergency Network Response

Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong

Journal Article

Blockchain-Based Emergency Information Sharing System for Public Health Security

Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo

Journal Article

Paths for Improving Public Service Capability Regarding Industrial Internet Security

Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian

Journal Article

On the role of optimization algorithms in ownership-preserving data mining

Muhammad KAMRAN, Ehsan Ullah MUNIR

Journal Article

Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI

Wei YANG, Jing MAO, Chen CHEN, Xiang CHENG, Liu-qing YANG, Hai-ge XIANG

Journal Article

Soil security and global food security

Journal Article

Preserving privacy information flowsecurity in composite service evolution

Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG

Journal Article

Protein security and food security in China

Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN

Journal Article

Development of Energy and Mining Governance System Based on New-Generation Information Technology

Wang Guofa, Zhang Tiegang, Wang Chengshan, Pang Yihui, Yang Ting, Sun Chunsheng,Hu Yahui, Zhang Peng

Journal Article