[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies
… for the Internet of Things (IoT) applications constitutes new vulnerabilities. At the corporate
level, the perceived importance of allocating resources for Cybersecurity is accentuated. The …
level, the perceived importance of allocating resources for Cybersecurity is accentuated. The …
[PDF][PDF] Downrange: A Survey of China's Cyber Ranges
D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… certainly [...] capable of launching cyber attacks that would disrupt critical infrastructure
services.” These ranges could allow rehearsals and testing of these types of attacks in the future.…
services.” These ranges could allow rehearsals and testing of these types of attacks in the future.…
[PDF][PDF] Testimony before the US-China Economic and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial …
EB Kania - Intelligentized” Warfare,” US-China Economic and …, 2017 - uscc.gov
The Chinese People’s Liberation Army (PLA) is actively advancing its unmanned weapons
systems, while capitalizing upon the military applications of artificial intelligence, in order to …
systems, while capitalizing upon the military applications of artificial intelligence, in order to …
[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age
J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
… analysis above, the scope of application of remote trial can include civil cases of first instance
in summary … Simple civil cases of first instance in summary procedure refer to those cases …
in summary … Simple civil cases of first instance in summary procedure refer to those cases …
[PDF][PDF] Safeguarding socialism
MD Johnson - Sinopsis. China in context and perspective, 2020 - sinopsis.cz
Summary The Chinese Communist Party’s concept of security is expanding to meet new
systemic challenges to continued one-party rule. Threats such as ideological change and …
systemic challenges to continued one-party rule. Threats such as ideological change and …
[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability
F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Her other research interest is within the field of geo-economics and cybersecurity. … This
paper introduces Chinese perspectives by annotating analyses drawn from Chinese academic …
paper introduces Chinese perspectives by annotating analyses drawn from Chinese academic …
[PDF][PDF] CAN bus, Ethernet, or FPD-Link: Which is best for automotive communications?
M Sauerwald - Analog Appl. J, 2014 - ti.com.cn
In 1915 Ford Motor Company introduced electric lights and an electric horn to its Model T
automobile. Since then, the dependence on electrical and electronic systems in automobiles …
automobile. Since then, the dependence on electrical and electronic systems in automobiles …
[PDF][PDF] 阁EasyChair Preprint
NEMM Threats - 2024 - easychair.org
… Rise of AI-Powered Malware: With the increasing integration of artificial intelligence (AI)
in cybersecurity, the future may witness the emergence of AI-powered mobile malware. …
in cybersecurity, the future may witness the emergence of AI-powered mobile malware. …
物联网设备固件安全分析现状研究综述
马晓成, 王允超, 于洪洋, 魏强 - 信息安全学报 - jcs.iie.ac.cn
… analysis, and provides a detailed analysis and comparison of existing firmware program
analysis techniques such as reverse anal-ysis, stain analysis… , and future research directions are …
analysis techniques such as reverse anal-ysis, stain analysis… , and future research directions are …
[PDF][PDF] 網路安全與頻寬控制閘道器之實作與研究
林盈達 - 2001 - ir.lib.nycu.edu.tw
… Next, this study internally and externally evaluates the performance of each component to
identify the problems for future research directions. We also propose a PostACK to shape TCP …
identify the problems for future research directions. We also propose a PostACK to shape TCP …