[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies

C Cheng, MCL Chau, ML Chan - Communications Association of Hong …, 2018 - cahk.hk
… for the Internet of Things (IoT) applications constitutes new vulnerabilities. At the corporate
level, the perceived importance of allocating resources for Cybersecurity is accentuated. The …

[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… certainly [...] capable of launching cyber attacks that would disrupt critical infrastructure
services.” These ranges could allow rehearsals and testing of these types of attacks in the future.…

[PDF][PDF] Testimony before the US-China Economic and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial …

EB Kania - Intelligentized” Warfare,” US-China Economic and …, 2017 - uscc.gov
The Chinese People’s Liberation Army (PLA) is actively advancing its unmanned weapons
systems, while capitalizing upon the military applications of artificial intelligence, in order to …

[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age

J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
analysis above, the scope of application of remote trial can include civil cases of first instance
in summary … Simple civil cases of first instance in summary procedure refer to those cases …

[PDF][PDF] Safeguarding socialism

MD Johnson - Sinopsis. China in context and perspective, 2020 - sinopsis.cz
Summary The Chinese Communist Party’s concept of security is expanding to meet new
systemic challenges to continued one-party rule. Threats such as ideological change and …

[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Her other research interest is within the field of geo-economics and cybersecurity. … This
paper introduces Chinese perspectives by annotating analyses drawn from Chinese academic …

[PDF][PDF] CAN bus, Ethernet, or FPD-Link: Which is best for automotive communications?

M Sauerwald - Analog Appl. J, 2014 - ti.com.cn
In 1915 Ford Motor Company introduced electric lights and an electric horn to its Model T
automobile. Since then, the dependence on electrical and electronic systems in automobiles …

[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
… Rise of AI-Powered Malware: With the increasing integration of artificial intelligence (AI)
in cybersecurity, the future may witness the emergence of AI-powered mobile malware. …

物联网设备固件安全分析现状研究综述

马晓成, 王允超, 于洪洋, 魏强 - 信息安全学报 - jcs.iie.ac.cn
analysis, and provides a detailed analysis and comparison of existing firmware program
analysis techniques such as reverse anal-ysis, stain analysis… , and future research directions are …

[PDF][PDF] 網路安全與頻寬控制閘道器之實作與研究

林盈達 - 2001 - ir.lib.nycu.edu.tw
… Next, this study internally and externally evaluates the performance of each component to
identify the problems for future research directions. We also propose a PostACK to shape TCP …