[PDF][PDF] Downrange: A Survey of China's Cyber Ranges
D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… This report examines five of these 19 facilities that have demonstrable ties to the military
or security services. China’s investment in these facilities is in line with what is known about …
or security services. China’s investment in these facilities is in line with what is known about …
[PDF][PDF] Review on cyber-physical system research and development
J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
Cyber physical system (CPS) is a complex system including computing, network and physical
entities, known as the next generation network technology. This paper introduces the …
entities, known as the next generation network technology. This paper introduces the …
[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies
… adopt effective approaches to security across all digital channels. The cybercriminals becomes
increasingly accustomed and has adapted to different internet platforms, extending from …
increasingly accustomed and has adapted to different internet platforms, extending from …
[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge
YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …
[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability
F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …
Analysis on abnormal behavior of insider threats based on accesslog mining
W Peichao, Z Yun, Z Cheng, H Jincai… - CAAI Trans. Intell …, 2017 - tis.hrbeu.edu.cn
Using an access control system is an important method of guarding key places, and it can
effectively prohibit the entry of unauthorized users. However, many recent cases indicate that …
effectively prohibit the entry of unauthorized users. However, many recent cases indicate that …
[PDF][PDF] [課題研究報告書] A Survey on Internet of Things for Smart Health Technologies
DT Le - 2018 - dspace02.jaist.ac.jp
Nowadays, accompanying with prolonged life expectancy, there is an increase of chronic
diseases which include obesity, diabetes, cardiovascular diseases, cancer, osteoporosis and …
diseases which include obesity, diabetes, cardiovascular diseases, cancer, osteoporosis and …
[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology
BK Mohanta, D Jena, U Satapathy - researchgate.net
… in this survey paper. Yang et al. [7] 2017 The paper has done a survey on security and
privacy … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …
privacy … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …