期刊文献+

美军赛博空间发展动向及启示 被引量:9

Development Trend of U.S.Military Cyberspace and Its Enlightenment
下载PDF
导出
摘要 鉴于美军赛博空间作战走在世界前列,为保护我国赛博空间的安全,分析了美军赛博空间的概念内涵、作战条令、未来构想、作战基础研究和训练演习等现状,揭示了其发展方向,最后提出了我国信息系统应对赛博威胁的措施和建议,对我国赛博空间安全研究具有参考作用。 As the U.S.military has taken the lead in the field of Cyberspace operations,latest development trends of the U.S.military in definition,connotation,doctrine,future vision,foundation and exercises for Cyberspace operations are studied to secure Cyberspace in China.Finally,the measures and advices for keeping information systems in China from Cyber threats are proposed,thus providing references for Cyberspace security in China.
出处 《指挥信息系统与技术》 2015年第1期1-5,共5页 Command Information System and Technology
关键词 赛博空间 赛博战 赛博安全 信息系统 Cyberspace Cyberwar Cybersecurity information systems
  • 相关文献

参考文献2

二级参考文献9

  • 1Mitchell Kapor.Civil Liberties in Cyberspace[].Scientific American.1991
  • 2John Arquila,David Ronefeldt.Cyberwar is Coming[].Comparative Strategy.1993
  • 3Gibson,William.Neuromancer[]..1984
  • 4.Cyberspace Policy Review:Assuring a Trusted and ResilientInformation and Communications Infrastructure[]..
  • 5Chairman of the Joint Chiefs of Staff.National Military Strategy to Combat Weapons of Mass Destruction[].February.132006
  • 6White House."The National Strategy to Secure Cyberspace"[]..2003
  • 7Air Force Cyber Command Strategic Vision. http:// www.af.mil/080303-afpn08.pdf。 .
  • 8徐伯权,王珩,周光霞.理解和研究Cyberspace[J].指挥信息系统与技术,2010,1(1):23-26. 被引量:13
  • 9周光霞,孙欣.赛博空间对抗[J].指挥信息系统与技术,2012,3(2):6-10. 被引量:25

共引文献16

同被引文献68

  • 1王越,赵静,杜冠瑶,万巍,龙春.网络空间安全日志关联分析的大数据应用[J].网络新媒体技术,2020(3):1-7. 被引量:2
  • 2张运凯,王长广,王方伟,马建峰.“震荡波”蠕虫分析与防范[J].计算机工程,2005,31(18):65-67. 被引量:8
  • 3卢昱,王宇,吴忠望.信息网络安全控制[M].北京:国防工业出版社,2011:15-17.
  • 4毛少杰,居真奇,李玉萍,等.C^4ISR系统仿真试验技术[M].北京:军事科学出版社,2011.
  • 5Karnouskos S, Colombo A W. Architecting the next generation of service-based SCADA/DCS system of systems[C//Proceedings of IEEE IECON 2011. Pis- cataway: IEEE, 2011.
  • 6Dumont D. Cyber security concerns of supervisory control and data acquisition (SCADA) systems[C]// Proceedings of IEEE HST 2010. Piscataway: IEEE,2010.
  • 7Alberts D S, Garstka J J, Hayes R E, et al. Under- standing information age warfare EM]. Washington D. C:. CCRP, 2001.
  • 8Alberts D S, Garstka J J, Stein F P. Network centric warfare: developing and leveraging information superi- ority[M]. Washington D. C. : CCRP, 2000.
  • 9Andress J, Winterfeld S. Cyber warfare: techniques, tactics and tools for security practitioners [M]. Waltham: Syngress, 2011.
  • 10佚名.《中国的军事战略》白皮书,2015.

引证文献9

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部