[PDF][PDF] Downrange: A Survey of China's Cyber Ranges
D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… This survey analyzes five cyber ranges in China with ties to the PLA or security services; it
finds cyber ranges with military influence funded by provincial governments, large strategic …
finds cyber ranges with military influence funded by provincial governments, large strategic …
[PDF][PDF] Review on cyber-physical system research and development
J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
Cyber physical system (CPS) is a complex system including computing, network and physical
entities, known as the next generation network technology. This paper introduces the …
entities, known as the next generation network technology. This paper introduces the …
[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge
YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …
[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability
F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …
Analysis on abnormal behavior of insider threats based on accesslog mining
W Peichao, Z Yun, Z Cheng, H Jincai… - CAAI Trans. Intell …, 2017 - tis.hrbeu.edu.cn
… Design and implementation of security-focused intelligent household Internet of things[J].
Journal of Chongqing university of posts and telecommunications: natural science edition, 2016…
Journal of Chongqing university of posts and telecommunications: natural science edition, 2016…
[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology
BK Mohanta, D Jena, U Satapathy - researchgate.net
… in this survey paper. Yang et al. [7] 2017 The paper has done a survey on security and
privacy … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …
privacy … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …
基于AI 大数据的物联网安全监测平台
武进, 王聪, 叶张乐 - 信息安全研究, 2022 - sicris.cn
… asset identification, security detection, security auditing, and security operation, which …
security monitoring, cyberspace surveying and mapping, threat intrusion monitoring and security …
security monitoring, cyberspace surveying and mapping, threat intrusion monitoring and security …
[引用][C] 物联网通信协议的安全研究综述(Security for Communication Protocols in Internet of Things: A Survey).
W Yang, J He, Y Wan, Q Wang - 计算机科学, 2018