[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… This report examines five of these 19 facilities that have demonstrable ties to the military
or security services. China’s investment in these facilities is in line with what is known about …

[PDF][PDF] Review on cyber-physical system research and development

J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
Cyber physical system (CPS) is a complex system including computing, network and physical
entities, known as the next generation network technology. This paper introduces the …

[PDF][PDF] A social psychological analysis of the phenomenon of underreporting cybercrimes and the concomitant underlying factors: Three real local case studies

C Cheng, MCL Chau, ML Chan - Communications Association of Hong …, 2018 - cahk.hk
… adopt effective approaches to security across all digital channels. The cybercriminals becomes
increasingly accustomed and has adapted to different internet platforms, extending from …

[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge

YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …

[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …

Analysis on abnormal behavior of insider threats based on accesslog mining

W Peichao, Z Yun, Z Cheng, H Jincai… - CAAI Trans. Intell …, 2017 - tis.hrbeu.edu.cn
Using an access control system is an important method of guarding key places, and it can
effectively prohibit the entry of unauthorized users. However, many recent cases indicate that …

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

[引用][C] A new paradigm for personalized mashup recommendation based on dynamic contexts in mobile computing environments

W He, L Cui, G Ren, Q Li, T Li - Scientia Sinica Informationis, 2016

[PDF][PDF] [課題研究報告書] A Survey on Internet of Things for Smart Health Technologies

DT Le - 2018 - dspace02.jaist.ac.jp
Nowadays, accompanying with prolonged life expectancy, there is an increase of chronic
diseases which include obesity, diabetes, cardiovascular diseases, cancer, osteoporosis and …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… in this survey paper. Yang et al. [7] 2017 The paper has done a survey on security and
privacy … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …