Search scope:
排序: Display mode:
WANG Geng, WU Wei
Frontiers of Environmental Science & Engineering 2007, Volume 1, Issue 4, Pages 471-476 doi: 10.1007/s11783-007-0075-4
Keywords: environmental Eco-security assessment resource Geographic information non-linear
The System Standpoint on Information Safety
Li Daimao
Strategic Study of CAE 2007, Volume 9, Issue 8, Pages 21-25
The meanings in three layers on information safety are given.safety, because the science of information safety is the merger of natural and social sciences The concept of information system which includes elements, boundary, working condition The relation between the system and information safety is analyzed, and an example aboutinformation safety in communication is given.
Keywords: information safety security factor information hiding boundary threat
Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles
Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun
Strategic Study of CAE 2019, Volume 21, Issue 3, Pages 108-113 doi: 10.15302/J-SSCAE-2019.03.006
Keywords: intelligent connected vehicles information security automotive industry management
Research and practice on system engineering management of a mobile payment project
Yongkai ZHOU, Hongfeng CHAI
Frontiers of Engineering Management 2017, Volume 4, Issue 2, Pages 127-137 doi: 10.15302/J-FEM-2017011
Keywords: systems engineering mobile payment engineering management method Mobile QuickPass national informationsecurity rapid iteration process financial security coordination and cooperation
Development and application of earth observation and nation security
Zhou Zhixing,Wu Zhigang,Ji Yan
Strategic Study of CAE 2008, Volume 10, Issue 6, Pages 28-32
Keywords: earth observation nation security space information
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 39-43 doi: 10.15302/J-SSCAE-2016.06.008
Cybersecurity is part of national security.systems related to cybersecurity review, and analyzes governments’ practices in the aspects of informationtechnology product and service security evaluation, critical information infrastructure security evaluationand management, information and communication technology (ICT) supply chain security, and backgroundsecurity investigation.
Keywords: cybersecurity review information technology product and service critical information infrastructure supply chain security background security
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Strategic Study of CAE 2016, Volume 18, Issue 6, Pages 83-88 doi: 10.15302/J-SSCAE-2016.06.017
Considering the emergence of recent network security threats, this article presents network securitySome problems exist in emergency management of the status quo; the core technology and security assuranceareas in order to improve current emergency technical measures becomes an important part of network security
Keywords: network security threat information security emergency response emergency system
Blockchain-Based Emergency Information Sharing System for Public Health Security
Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo
Strategic Study of CAE 2021, Volume 23, Issue 5, Pages 41-50 doi: 10.15302/J-SSCAE-2021.05.006
Keywords: COVID-19 pandemic public health security emergency information sharing consortium blockchain
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian
Strategic Study of CAE 2021, Volume 23, Issue 2, Pages 74-80 doi: 10.15302/J-SSCAE-2021.02.010
Industrial Internet security public service ensures the healthy developmentIn this article, we elaborate on the importance of industrial Internet security public service whilefrom the aspects of basic resource database construction, information sharing and exchange, situationproposed in terms of the compatibility and adaptation of information technology application innovationof intelligent security service, integrated public service platform, and new generation information
Keywords: industrial Internet security security-related public service cybersecurity industrial informationsecurity innovative development
On the role of optimization algorithms in ownership-preserving data mining None
Muhammad KAMRAN, Ehsan Ullah MUNIR
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 2, Pages 151-164 doi: 10.1631/FITEE.1601479
Keywords: Information security Optimization Digital rights Watermarking
Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI None
Wei YANG, Jing MAO, Chen CHEN, Xiang CHENG, Liu-qing YANG, Hai-ge XIANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 3, Pages 398-408 doi: 10.1631/FITEE.1700026
Keywords: Resource allocation Orthogonal frequency-division multiple access (OFDMA) Imperfect channel state information(CSI) Physical layer security
Soil security and global food security
Frontiers of Agricultural Science and Engineering doi: 10.15302/J-FASE-2023530
● Much of the world’s agricultural land has been degraded through soil loss and degradation of soil organic matter.
Keywords: Agriculture soil security food security regenerative
Preserving privacy information flowsecurity in composite service evolution None
Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG
Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 5, Pages 626-638 doi: 10.1631/FITEE.1700359
Keywords: Composite service Privacy information flow security Service evolution Petri net
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Frontiers of Agricultural Science and Engineering 2015, Volume 2, Issue 2, Pages 144-151 doi: 10.15302/J-FASE-2015062
Keywords: food security protein security nutrition dietary pattern
Development of Energy and Mining Governance System Based on New-Generation Information Technology
Wang Guofa, Zhang Tiegang, Wang Chengshan, Pang Yihui, Yang Ting, Sun Chunsheng,Hu Yahui, Zhang Peng
Strategic Study of CAE 2022, Volume 24, Issue 1, Pages 176-189 doi: 10.15302/J-SSCAE-2022.01.019
Title Author Date Type Operation
Spatial distribution of ecological security status assessment of West-Liaohe River based on geographicinformation system
WANG Geng, WU Wei
Journal Article
Implementation Countermeasures for Information Security Management of Intelligent Connected Vehicles
Zhao Shijia, Xu Ke, Xue Xiaoqing, Qiao Yingjun
Journal Article
Research and practice on system engineering management of a mobile payment project
Yongkai ZHOU, Hongfeng CHAI
Journal Article
Development and application of earth observation and nation security
Zhou Zhixing,Wu Zhigang,Ji Yan
Journal Article
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua,He Dequan,Wang Hailong,Shang Yanmin,Xu Kefu
Journal Article
The Current Network Security Situation and Emergency Network Response
Liu Xinran、Li Baisong、Chang Anqi、Lu Hui、Tian Zhihong
Journal Article
Blockchain-Based Emergency Information Sharing System for Public Health Security
Chen Xiaohong, Xu Xuesong, Shao Hongyan, Hu Dongbin, Su Yun,Mao Xingliang, Tang Xiangbo
Journal Article
Paths for Improving Public Service Capability Regarding Industrial Internet Security
Zhou Hao, Li Jun, Wang Chonghua, Yin Libo, Zhao Qian
Journal Article
On the role of optimization algorithms in ownership-preserving data mining
Muhammad KAMRAN, Ehsan Ullah MUNIR
Journal Article
Resource allocation for physical-layer security in OFDMAdownlinkwith imperfect CSI
Wei YANG, Jing MAO, Chen CHEN, Xiang CHENG, Liu-qing YANG, Hai-ge XIANG
Journal Article
Preserving privacy information flowsecurity in composite service evolution
Huan-feng PENG, Zhi-qiu HUANG, Lin-yuan LIU, Yong LI, Da-juan FAN, Yu-qing WANG
Journal Article
Protein security and food security in China
Zheng RUAN,Shumei MI,Yan ZHOU,Zeyuan DENG,Xiangfeng KONG,Tiejun LI,Yulong YIN
Journal Article