[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… This survey analyzes five cyber ranges in China with ties to the PLA or security services; it
finds cyber ranges with military influence funded by provincial governments, large strategic …

[PDF][PDF] Security Testing of Visual Perception Module in Autonomous Driving System

W Hao, W Hao, S Xing, L Minghao… - Journal of Computer …, 2021 - suxnju.github.io
… We also design a failure analyzer to profile the cause of security issues automatically. We …
-searched scenes, respectively, which cause security issues in the CIL and CILRS system's …

[PDF][PDF] Review on cyber-physical system research and development

J Jiang, XD Wang, P He, H Yang, PP Liu, YM Guo - Model. Simul, 2020 - pdf.hanspub.org
Cyber physical system (CPS) is a complex system including computing, network and physical
entities, known as the next generation network technology. This paper introduces the …

[HTML][HTML] Present situation and prospect of intelligent demolition technology for long-span prestressed concrete bridge

YJ Liu, ZW Tang, J Xiao, J LIU, B GONG… - J Archit Civil …, 2022 - jace.chd.edu.cn
In order to achieve the safety and controllability of the demolition of long-span prestressed
concrete bridges, the concept of intelligent bridge demolition based on digital twin technology …

[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … Testo disponibile al sito: https://www …, 2022 - europeanleadershipnetwork.org
… Fei’s research interests focus on regional security issues in East Asia with a special
interest in North Korea, China’s foreign and security policy, and maritime security. Her other …

[PDF][PDF] A Review of the Research on Recommendation Methods for Application Fields

S Ma, P He - Computer Science and Application, 2019 - pdf.hanspub.org
Recommendation method is a popular research technology to solve the problem of “information
overload”. Traditional recommendation methods have problems such as data sparse …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… in this survey investigated the state of art security issues in IoT applications. The threats
and … analysis of industrial internet of things, IEEE Internet Things J. 6 (4) (2019) 6822–6834. …

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

[引用][C] A new paradigm for personalized mashup recommendation based on dynamic contexts in mobile computing environments

W He, L Cui, G Ren, Q Li, T Li - Scientia Sinica Informationis, 2016

[引用][C] Analysis on abnormal behavior of insider threats based on accesslog mining

W Peichao, Z Yun, Z Cheng, H Jincai, Z Weiming - CAAI Trans. Intell. Syst., 2017