Resource Type

Journal Article 851

Year

2024 4

2023 84

2022 83

2021 90

2020 71

2019 61

2018 65

2017 52

2016 63

2015 17

2014 10

2013 20

2012 12

2011 20

2010 12

2009 13

2008 24

2007 21

2006 27

2005 28

open ︾

Keywords

food security 17

neural network 16

Deep learning 10

energy security 10

Safety 9

Artificial intelligence 8

Neural network 8

Software-defined networking (SDN) 7

sustainable development 7

Machine learning 6

cyberspace 5

cyberspace security 5

safety 5

security 5

6G 4

ANN 3

Attention mechanism 3

BP neural network 3

Network security 3

open ︾

Search scope:

排序: Display mode:

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Strategic Study of CAE 2016, Volume 18, Issue 4,   Pages 38-43 doi: 10.15302/J-SSCAE-2016.04.006

Abstract:

The paper summarizes the development situation and experiences of the Chinese cyberspace security industry during the 12th Five-Year Plan, analyzes its new development trends, and proposes policy suggestions for the industry development to provide a reference for cyberspace security industry during the 13th Five-Year Plan.

Keywords: cyberspace security     cyberspace security industry     independent and controllable     standards    

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 13-16 doi: 10.15302/J-SSCAE-2016.06.003

Abstract:

Cyberspace security has been a crucial part in national security and is more and more important in the development of economy and society. Based on the current situation of international cyberspace security, this article analyzes the opportunities and challenges that China is confronted with, and study China's international cyberspace security strategy suitable for its own value and national interest. We then propose the objectives, principles and tasks of the strategy.

Keywords: cyberspace security     cyberspace governance     cyberspace strategy    

Cyberspace Endogenous Safety and Security Article

Jiangxing Wu

Engineering 2022, Volume 15, Issue 8,   Pages 179-185 doi: 10.1016/j.eng.2021.05.015

Abstract:

Uncertain security threats caused by vulnerabilities and backdoors are the most serious and difficult problem in cyberspace. This paper analyzes the philosophical and technical causes of the existence of so-called “dark functions” such as system vulnerabilities and backdoors, and points out that endogenous security problems cannot be completely eliminated at the theoretical and engineering levels; rather, it is necessary to develop or utilize the endogenous security functions of the system architecture itself. In addition, this paper gives a definition for and lists the main technical characteristics of endogenous safety and security in cyberspace, introduces endogenous security mechanisms and characteristics based on dynamic heterogeneous redundancy (DHR) architecture, and describes the theoretical implications of a coding channel based on DHR.

Keywords: Cyberspace endogenous security problem     Uncertain threat     Cyberspace endogenous safety and security     Relative right axiom     Dynamic heterogeneous redundant architecture    

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 79-82 doi: 10.15302/J-SSCAE-2016.06.016

Abstract:

Based on the current situation and main problems with cyberspace security in China, this paper proposes that cyberspace security should shift its focus from emergency to response. Some transformation strategies are proposed, including three aspects: network security-monitoring capacity, network security guarantee capacity, and talents construction capacity.

Keywords: cyberspace security     emergency for cyberspace security     response for cyberspace security     transformation strategy    

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 1-7 doi: 10.15302/J-SSCAE-2016.06.001

Abstract:

Cyberspace sovereignty (referred to here by its short form, cyber sovereignty) is the extension of national sovereignty to the platform of information and communication technology systems. This article defines cyberspace and cyber sovereignty, discusses the existence of cyber sovereignty, and judges several erroneous points of view that deny cyber sovereignty.

Keywords: cyberspace     cyberspace sovereignty     stakeholder    

A review on cyber security named entity recognition Review Article

Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 9,   Pages 1153-1168 doi: 10.1631/FITEE.2000286

Abstract: With the rapid development of Internet technology and the advent of the era of big data, more and more texts are provided on the Internet. These texts include not only security concepts, incidents, tools, guidelines, and policies, but also risk management approaches, best practices, assurances, technologies, and more. Through the integration of large-scale, heterogeneous, unstructured information, the identification and classification of entities can help handle issues. Due to the complexity and diversity of texts in the domain, it is difficult to identify security entities in the domain using the traditional methods. This paper describes various approaches and techniques for NER in this domain, including the rule-based approach, dictionary-based approach, and based approach, and discusses the problems faced by NER research in this domain, such as conjunction and disjunction, non-standardized naming convention, abbreviation, and massive nesting. Three future directions of NER in are proposed: (1) application of unsupervised or semi-supervised technology; (2) development of a more comprehensive ontology; (3) development of a more comprehensive model.

Keywords: 命名实体识别(NER);信息抽取;网络空间安全;机器学习;深度学习    

Cyberspace Security Models and Systematic Development from Multiple Perspectives

Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 116-125 doi: 10.15302/J-SSCAE-2023.06.009

Abstract:

As cyberspace technologies advance rapidly, cyberspace security risks derived from new applications and technologies are becoming more complex and hidden. Establishing a unique cyberspace security model is a common practice to deal with complex security threats in China and abroad. However, existing cyberspace security models have problems such as unclear development directions, insufficient ability to analyze risks derived from new technologies, and lack of security capabilities required for cyberspace security defense assessment. This study evaluates existing cyberspace security models from the perspectives of technology, discipline, and industry, sorts out the characteristics and development context of the cyberspace security technology system, and clarifies the urgent problems existing in cybersecurity applications. Focusing on the perspective of cyberspace security technology, this study proposes a cyberspace security model system framework based on technical elements, using existing security technologies and emerging technologies to verify the security analysis capabilities of the system framework. This study further proposes the following development suggestions: (1) improving the core framework of the cyberspace security technology system, (2) promoting the industryuniversity-research integration in the field of cyberspace security, (3) promoting the formulation of core technology standards regarding cyberspace security, and (4) addressing AI security threats, thus to effectively deal with cyberspace security threats and enhance the cyberspace security capabilities of China.

Keywords: cyberspace     security model     security capability     derivative risk    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract:

 Cyberspace is regarded as the fifth largest activity space following land, sea, air, and space. Protecting cyberspace security is a major issue related to national security, national sovereignty, and the legitimate rights and interests of the people. With the rapid development of artificial intelligence (AI) technology and its application in various fields, cyberspace security has been facing new challenges. This study analyzes the new risks of cyberspace security in the era of AI, such as more intelligent network attacks, more frequent large-scale network attacks, higher concealment of network attacks, stronger confrontation game of network attacks, and easier exposure to stealing of important data. AI technology has significant advantages in dealing with massive data, multi-source heterogeneous data, and real-time dynamic data, which can significantly improve the defense capability of cyberspace. This study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularly the construction of a cyberspace security knowledge brain and the detection of network attacks. Furthermore, we propose the corresponding countermeasures and suggestions from three aspects: the construction of a dynamic and scalable network security knowledge brain, the promotion of intelligent detection against network attacks, and the evaluation of AI technologies’ security.

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Cyberspace Security Competition and Talent Management

Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 49-52 doi: 10.15302/J-SSCAE-2016.06.010

Abstract:

Competition of talents is fundamental to international cyberspace security, and the discovery and tracking of talents is one of the key links. First, we investigate the development status of domestic and international cyberspace security competition. Then, we analyze the main problems of cyberspace security competition in discovering and tracking talents. Finally, we propose a long-term policy to discover and track talents based on cyberspace competitions.

Keywords: cyberspace security     competition     talent-discovery     talent-track    

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Strategic Study of CAE 2023, Volume 25, Issue 6,   Pages 136-149 doi: 10.15302/J-SSCAE-2023.06.005

Abstract:

The wide application of network technologies has meanwhile brought about increasingly complex challenges regarding network environment for the key infrastructure of the rail transit industry. Therefore, deepening the research on cyberspace security in the rail transit industry becomes increasingly important. This study expounds on the basic concept and major characteristics of cyberspace security in the rail transit industry and summarizes its macro situation from the perspectives of strategies in China and abroad as well as security system and standards. It sorts out the development status of cyberspace security protection systems in the rail transit industry from three aspects: basic, enhanced, and collaborative protection. Moreover, the study analyzes the corresponding security risks and causes, involving practical cases of traditional network threats and data attack threats, and concludes that internal and external risk factors become the double threats to the industry’s dedicated network and the traditional network architecture restricts network security and reliability in the rail transit industry. Furthermore, we propose the following suggestions: (1) strengthening the original basic research and systematic innovation of networks, (2) building an independent and controllable industrial chain of network security, (3) improving the operation and management of network security, and (4) enhancing talent cultivation for network security in the rail transit industry.

Keywords: rail transit     cyberspace security     network architecture     customized network     network attack    

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 44-48 doi: 10.15302/J-SSCAE-2016.06.009

Abstract:

Cyberspace security professional certification and vocational training is an important part of cyberspace security talent cultivation. It can quickly grow talents and continuously improve the technical level and practical ability of existing employees. First, we survey the current situation of cyberspace security professional certification and vocational training. Then, we analyze the main problems of cyberspace security professional certification and vocational training. Finally, we propose a policy proposal to establish the architecture of cyberspace security professional certification and vocational training.

Keywords: cyberspace security     workforce framework     professional certification     vocational training    

Construction of Strategic Early-Warning System in Cyberspace

Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai

Strategic Study of CAE 2021, Volume 23, Issue 2,   Pages 1-7 doi: 10.15302/J-SSCAE-2021.02.001

Abstract:

Cyberspace strategic early-warning is a monitoring and warning system that is established by a country or group for early detection, tracking, identification, and notification of incoming major cyber attacks or the spreading destruction of powerful viruses. It’s an important component of a national security defense system. The implementation of the national cyber development strategy in China requires high attentions to the construction of a cyberspace strategic early-warning system. This study analyzes the major characteristics and basic requirements of strategic early-warning in cyberspace, and studies four major warning styles: security vulnerabilities, security threats, intrusion attacks, and abnormal behaviors warning. It also emphasizes four key projects, namely cyberspace surveying and mapping system, vulnerability collection and early-warning platform, threat intelligence perception and push system, as well as security monitoring and comprehensive early-warning system, after summarizing the construction of strategic early-warning and monitoring systems in cyberspace in China and abroad. Furthermore, we propose several countermeasures and suggestions, including strengthening high-level coordination, focusing on multi-source data integration, establishing professional earlywarning agencies, conducting regular security assessments, and implementing threat and early-warning grading mechanisms.

Keywords: cyberspace security     strategic early warning     situation awareness     system construction    

Artificial intelligence algorithms for cyberspace security applications: a technological and status review Review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1117-1142 doi: 10.1631/FITEE.2200314

Abstract: Three technical problems should be solved urgently in : the timeliness and accuracy of network attack detection, the credibility assessment and prediction of the security situation, and the effectiveness of security defense strategy optimization. algorithms have become the core means to increase the chance of security and improve the network attack and defense ability in the application of . Recently, the breakthrough and application of AI technology have provided a series of advanced approaches for further enhancing network defense ability. This work presents a comprehensive review of AI technology articles for applications, mainly from 2017 to 2022. The papers are selected from a variety of journals and conferences: 52.68% are from Elsevier, Springer, and IEEE journals and 25% are from international conferences. With a specific focus on the latest approaches in , , and some popular s, the characteristics of the algorithmic models, performance results, datasets, potential benefits, and limitations are analyzed, and some of the existing challenges are highlighted. This work is intended to provide technical guidance for researchers who would like to obtain the potential of AI technical methods for and to provide tips for the later resolution of specific issues, and a mastery of the current development trends of technology and application and hot issues in the field of network security. It also indicates certain existing challenges and gives directions for addressing them effectively.

Keywords: Artificial intelligence (AI)     Machine learning (ML)     Deep learning (DL)     Optimization algorithm     Hybrid algorithm     Cyberspace security    

Security for cyberspace: challenges and opportunities Editorial

Jiang-xing WU, Jian-hua LI, Xin-sheng JI

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1459-1461 doi: 10.1631/FITEE.1840000

Abstract:

Keywords: None    

Research on the Construction of a Novel Cyberspace Security Ecosystem Article

Xiao-Niu Yang, Wei Wang, Xiao-Feng Xu, Guo-Rong Pang, Chun-Lei Zhang

Engineering 2018, Volume 4, Issue 1,   Pages 47-52 doi: 10.1016/j.eng.2018.01.003

Abstract:

Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are proposed for common public networks (C space), secure classified networks (S space), and key infrastructure networks (K space), based on their individual characteristics. The features and security requirements of these networks are then discussed. Taking C space as an example, we introduce the SMCRC (which stands for ‘‘situation awareness, monitoring and management, cooperative defense, response and recovery, and countermeasures and traceback”) loop for constructing a cyberspace security ecosystem. Following a discussion on its characteristics and information exchange, our analysis focuses on the critical technologies of the SMCRC loop. To obtain more insight into national cyberspace security, special attention should be paid to global sensing and precise mapping, continuous detection and active management, cross-domain cooperation and systematic defense, autonomous response and rapid processing, and accurate traceback and countermeasure deterrence.

Title Author Date Type Operation

Study on the Development of China’s Cyberspace Security Industry

An Da, Liang Zhihao, Xu Shouren

Journal Article

Research on the International Strategy for National Cyberspace Security

Fang Binxing,Du Aning and Zhang Xi,Wang Zhongru

Journal Article

Cyberspace Endogenous Safety and Security

Jiangxing Wu

Journal Article

Emergency and Response for Cyberspace Security

Yu Quan,Yang Lifeng and Gao Guijun、Kou Ziming、Zhai Lidong

Journal Article

Research on Cyberspace Sovereignty

Fang Binxing,Zou Peng and Zhu Shibing

Journal Article

A review on cyber security named entity recognition

Chen Gao, Xuan Zhang, Mengting Han, Hui Liu,zhxuan@ynu.edu.cn

Journal Article

Cyberspace Security Models and Systematic Development from Multiple Perspectives

Sun Shuai , Zhang Lei , Hu Chunhui , Fu Shouqing , Qing Yu , Cui Yong

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Cyberspace Security Competition and Talent Management

Yu Xiangzhan,Zhang Hongli and Yu Haining、Tian Zhihong、Zhai Jianhong、Pan Zhuting

Journal Article

Current Status and Future Development of Cyberspace Security in Rail Transit Industry

Peng Yihua, Liu Mingyuan, Gao Shuai, Su Wei, Zhang Hongke

Journal Article

Research on the Architecture of Cyberspace Security Professional Certification in China

Zhang Hongli,Yu Haining and Fang Binxing、Qin Yuhai、Yu Xiangzhan、Chu Chengyuan

Journal Article

Construction of Strategic Early-Warning System in Cyberspace

Zhuang Honglin, Yao Le, Wang Sheng, Gu Jiaxiang, Wu Ye, Xie Kai

Journal Article

Artificial intelligence algorithms for cyberspace security applications: a technological and status review

Jie CHEN, Dandan WU, Ruiyun XIE,chenjie1900@mail.nwpu.edu.cn,wudd@cetcsc.com

Journal Article

Security for cyberspace: challenges and opportunities

Jiang-xing WU, Jian-hua LI, Xin-sheng JI

Journal Article

Research on the Construction of a Novel Cyberspace Security Ecosystem

Xiao-Niu Yang, Wei Wang, Xiao-Feng Xu, Guo-Rong Pang, Chun-Lei Zhang

Journal Article