[PDF][PDF] Review on cyber-physical system research and development

J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
… system, Internet of things, and industrial control system, the paper discusses the existing
theory and technology that can be used in CPS, and focuses on the analysis of the safety, …

[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age

J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
… Civil Procedure Law , court trial about civil cases, except those involving … privacy, or as
otherwise stipulated by law, shall be heard in public. 43 According to Criminal Procedure Law , …

[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …

[PDF][PDF] The capability evaluation of GPT-4 and claude on financial domain with DIKWP+ TIF analysis

F Tang, Y Duan, E Dou, Y Yang - Apr-2023, 2023 - researchgate.net
… The existing AGI evaluation and testing methods mostly rely on subjective cognitive
experience, lacking a unified evaluation system and evaluation standards. This study aims to …

[PDF][PDF] The Xinjiang Papers: An Introduction

A Zenz - The Uyghur Tribunal, November, 2021 - uyghurtribunal.com
… to study religious policy and the “Sinicization of religion109 This document is unique in the
set in that “Xinjiang” is not even mentioned in the text. It is a general directive issued by the …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …
: a survey on applications and security privacy challenges, Internet Things (2019) 100107. …

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

物联网隐私与安全联合参考架构

M KAMAL, I RASHID, W IQBAL, MH SIDDIQUI, S KHAN… - Frontiers, 2023 - jzus.zju.edu.cn
… architecture in federation with privacy and security concerns. In this study, we examine and
… the basis of the requirements addressed in the standards. We propose an architecture, the …

[PDF][PDF] 物联网安全技术专栏序言(中英文)

武传坤 - 密码学报, 2020 - jcr.cacrnet.org.cn
… protocol can ensure the security of interactive information and data privacy in the process of
study on the OT security of IOT” introduces the concept of operational security (OT security

基于信息-物理-社会-思维融合空间的物联网科学技术体系研究

HS Ning, H Liu - Science China Information Sciences, 2015 - Springer
The Internet of Things (IoT) as an emerging network paradigm is bringing the next scientific
and technological revolution for ubiquitous things’ interactions in cyber-physical-social …