[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… This survey analyzes five cyber ranges in China with ties to the PLA or security services; it
finds cyber ranges with military influence funded by provincial governments, large strategic …

[PDF][PDF] Review on cyber-physical system research and development

J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
Cyber physical system (CPS) is a complex system including computing, network and physical
entities, known as the next generation network technology. This paper introduces the …

[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge

YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …

[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …

Analysis on abnormal behavior of insider threats based on accesslog mining

W Peichao, Z Yun, Z Cheng, H Jincai… - CAAI Trans. Intell …, 2017 - tis.hrbeu.edu.cn
… Design and implementation of security-focused intelligent household Internet of things[J].
Journal of Chongqing university of posts and telecommunications: natural science edition, 2016…

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… in this survey paper. Yang et al. [7] 2017 The paper has done a survey on security and
privacy … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …

基于AI 大数据的物联网安全监测平台

武进, 王聪, 叶张乐 - 信息安全研究, 2022 - sicris.cn
… asset identification, security detection, security auditing, and security operation, which …
security monitoring, cyberspace surveying and mapping, threat intrusion monitoring and security

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

[引用][C] A new paradigm for personalized mashup recommendation based on dynamic contexts in mobile computing environments

W He, L Cui, G Ren, Q Li, T Li - Scientia Sinica Informationis, 2016

[引用][C] 物联网通信协议的安全研究综述(Security for Communication Protocols in Internet of Things: A Survey).

W Yang, J He, Y Wan, Q Wang - 计算机科学, 2018