期刊文献+
共找到3,966篇文章
< 1 2 199 >
每页显示 20 50 100
Reviewing the Adjustment of Japan’s National Security Strategy
1
作者 Meng Xiaoxu 《China International Studies》 2023年第2期83-106,共24页
In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively re... In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements. 展开更多
关键词 strategy PRIME security
下载PDF
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
2
作者 Sina Ahmadi 《Journal of Information Security》 2024年第2期148-167,共20页
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company. 展开更多
关键词 Cloud security Threat Analysis Mitigation Strategies Emerging Trends Ethi-cal Considerations Data Analysis
下载PDF
A Security Enhancement Model Based on Switching Edge Strategy in Interdependent Heterogeneous Cyber-Physical Systems 被引量:1
3
作者 Dandan Zhao Can Liu +4 位作者 Guangquan Xu Zhiguo Ding Hao Peng Juan Yu Jianmin Han 《China Communications》 SCIE CSCD 2022年第2期158-173,共16页
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi... With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks. 展开更多
关键词 security enhancement switching edge strategy interdependent systems cyber-physical systems
下载PDF
Japan-UK Security Cooperation in the Context of the Convergence of the Indo-Pacific Strategy and Global Britain 被引量:1
4
作者 Meng Xiaoxu 《Contemporary International Relations》 2020年第3期75-103,共29页
Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countri... Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countries have close security interactions,high-level security consultations,numerous mechanisms on security cooperation,frequent defense cooperation and exchanges between forces,and cooperation geared at a response to the Korean nuclear issue.In particular,Japan and the UK regard Indo-Pacific security as the strategic focus of their cooperation,and this underscores the rules-based international order.There are multiple motivations for Japan and the UK to strengthen their security cooperation,and the deepening of their security cooperation in the Indo-Pacific region is to a great extent due to strategic factors,including responding to the US strategic adjustment,Japan and Britain’s respective proactive strategic demands,the improving strategic positions of the Indopacific region,their seeking to shape the regional order in the Indo-Pacific,and so on.Despite facing challenges,Japan-UK security cooperation is continuously strengthening against a background of deepening strategic convergence between the two countries and great power competition. 展开更多
关键词 Indo-Pacific strategy Global Britain Japan-UK relations security cooperation
下载PDF
Investment strategy analysis of information system security in consideration of attackers
5
作者 Pan Chongxia Zhong Weijun Mei Shu'e 《Journal of Southeast University(English Edition)》 EI CAS 2017年第3期377-381,共5页
In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security se... In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security service provider( MSSP) and cooperating with the MSSP, the firm 's optimal investment strategies are discussed by modeling and analyzing the maximum expected utility in the above cases under the condition that the firm plays games with an attacker.The results showthat the best choice for a firm is determined by the reasonable range of the cooperative development coefficient and applicable conditions. When the cooperative development coefficient is large, it is more rational for the firm to cooperate with the MSSP to develop the information system. When the cooperative development coefficient is small, it is more rational for the firm to develop the information system by its own efforts. It also shows that the attacker's maximum expected utility increases with the increase in the attacker 's breach probability and cost coefficient when the cooperative development coefficient is small. On the contrary, it decreases when the cooperative development coefficient is large. 展开更多
关键词 information security ECONOMICS informationsecurity INVESTMENT INVESTMENT strategy GAME theory
下载PDF
Trump’s “America First” Security Strategy: Impact on China-US Relations
6
作者 Teng Jianqun 《国际问题研究》 CSSCI 北大核心 2018年第3期244-259,共16页
关键词 Trump's "America First" security strategy IMPACT on China-US RELATIONS
下载PDF
A fault injection model-oriented testing strategy for component security
7
作者 陈锦富 卢炎生 +1 位作者 张卫 谢晓东 《Journal of Central South University》 SCIE EI CAS 2009年第2期258-264,共7页
A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault inje... A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components. 展开更多
关键词 component testing component security fault injection model testing strategy detecting algorithm
下载PDF
Evolution and impacts of the United States’Arctic strategy and China’s responses 被引量:1
8
作者 LIAO Junjie PAN Min 《Advances in Polar Science》 CSCD 2023年第2期144-152,共9页
On 7 October,2022,the Biden administration released an updated version of the National Strategy for the Arctic Region based on new developments in the Arctic region and global affairs.This strategy emphasizes traditio... On 7 October,2022,the Biden administration released an updated version of the National Strategy for the Arctic Region based on new developments in the Arctic region and global affairs.This strategy emphasizes traditional security issues in the Arctic,attaches great importance to climate governance in the region,and advocates for restoring American leadership through international cooperation.In view of the strong influence of the United States(U.S.)in the Arctic region,the changes of the U.S.Arctic strategy will inevitably have an impact on China’s scientific researchrights,economic interests,and governance rights in the Arctic region.To respond to the new situation brought about by the changes in the U.S.Arctic strategy,China should take the initiative to maintain positive relationships with all Arctic countries,and continue its active participation in Arctic affairs. 展开更多
关键词 the United States’Arctic strategy Arctic security Arctic governance
下载PDF
India's “Link West” Strategy: Origin, Progress and Prospects
9
作者 Lan Jianxue 《China International Studies》 2019年第4期131-154,共24页
The "Link West" strategy is the inevitable result of India’s continuous improvement of its comprehensive national strength, representing an important tool to enhance its status as a major power. While its c... The "Link West" strategy is the inevitable result of India’s continuous improvement of its comprehensive national strength, representing an important tool to enhance its status as a major power. While its connotation and regional extension continues to develop, its overall effectiveness remains in question and requires further observation. 展开更多
关键词 india's“Link West”strategy ORIGIN PROGRESS and PROSPECTS
下载PDF
The Security Strategy of the European Union: Origin, Evolution, and Policy Direction
10
作者 Zhang Jian 《Contemporary International Relations》 2022年第5期1-32,共32页
With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of secur... With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy. 展开更多
关键词 European Union security strategy European integration EU-Russia relations
下载PDF
India’s National Security Strategy:Pursuits,Origins,and Practice
11
作者 Hu Shisheng Wang Jun 《Contemporary International Relations》 2022年第6期118-145,共28页
India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of ... India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy. 展开更多
关键词 INDIA national security strategy strategic autonomy
下载PDF
Strategic Direction of Russia Interpreted from Its New National Security Strategy
12
作者 Chen Yu 《Contemporary International Relations》 2022年第1期46-70,共25页
In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that secu... In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries. 展开更多
关键词 RUSSIA national security strategy strategic introversion major country relations
下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
13
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK security DATA ENCRYPTION technology application strategy
下载PDF
The Impact of E-commerce on the Development of Regional Economy and Its Analysis of Security Strategy
14
作者 Pengfei GAO 《International Journal of Technology Management》 2015年第5期59-62,共4页
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis... The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role. 展开更多
关键词 Network shopping E-commerce system Regional economy security strategy
下载PDF
RECENT DEVELOPMENTS OF US ASIA-PACIFIC SECURITY STRATEGY AND CHINA'S COUNTERMEASURES
15
作者 ZHANG JINGQUAN 《Contemporary World》 2017年第2期14-17,共4页
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi... The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald 展开更多
关键词 US in IS on WILL that RECENT DEVELOPMENTS OF US ASIA-PACIFIC security strategy AND CHINA’S COUNTERMEASURES ROK of
下载PDF
CHINA'S POST-COLD WAR SECURITY STRATEGY
16
作者 Yan Xuetong Deputy Director,Center for China’s Foreign Policy Studies,China Institute of Contemporary International Relations 《Contemporary International Relations》 1995年第5期1-16,共16页
Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether ... Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year, 展开更多
关键词 CHINA’S POST-COLD WAR security strategy
下载PDF
Suggestions on China's Petroleum Security Strategy and Policies
17
《China Oil & Gas》 CAS 2001年第1期23-27,共5页
关键词 security Suggestions on China’s Petroleum security strategy and Policies
下载PDF
A New Model for Network Security Situation Assessment of the Industrial Internet
18
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 Industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
针对自动驾驶智能模型的攻击与防御 被引量:1
19
作者 马晨 沈超 +4 位作者 蔺琛皓 李前 王骞 李琦 管晓宏 《计算机学报》 EI CAS CSCD 北大核心 2024年第6期1431-1452,共22页
近年来,以深度学习算法为代表的人工智能技术为人类生产生活的方方面面带来了巨大的革新,尤其是在自动驾驶领域,部署着自动驾驶系统的智能汽车已经走进入们的生活,成为了重要的生产力工具.然而,自动驾驶系统中的人工智能模型面临着潜在... 近年来,以深度学习算法为代表的人工智能技术为人类生产生活的方方面面带来了巨大的革新,尤其是在自动驾驶领域,部署着自动驾驶系统的智能汽车已经走进入们的生活,成为了重要的生产力工具.然而,自动驾驶系统中的人工智能模型面临着潜在的安全隐患和风险,这给人民群众生命财产安全带来了严重威胁.本文通过回顾自动驾驶智能模型攻击和防御的相关研究工作,揭示自动驾驶系统在物理世界下面临的安全风险并归纳总结了相应的防御对策.具体来说,本文首先介绍了包含攻击面、攻击能力和攻击目标的自动驾驶系统安全风险模型.其次,面向自动驾驶系统的三个关键功能层——传感器层、感知层和决策层,本文依据受攻击的智能模型和攻击手段归纳、分析了对应的攻击方法以及防御对策,并探讨了现有方法的局限性.最后,本文讨论和展望了自动驾驶智能模型攻击与防御技术面临的难题与挑战,并指出了未来潜在的研究方向和发展趋势. 展开更多
关键词 自动驾驶安全 人工智能安全 信息物理系统安全 物理对抗攻击 防御策略
下载PDF
新能源崛起对中国新能源产业战略的影响 被引量:4
20
作者 张娜 米倩玉 +1 位作者 邓嘉纬 赵晓军 《中国软科学》 CSCD 北大核心 2024年第2期1-8,共8页
全球新能源加速发展的时代已经来到,传统能源消费的绝对量、占比和成本将开始下降,围绕能源而开展的竞争将逐步转移到新能源领域。新能源的崛起将导致能源生产国与消费国之间、发达国家与发展中国家之间、发达国家和发展中国家内部出现... 全球新能源加速发展的时代已经来到,传统能源消费的绝对量、占比和成本将开始下降,围绕能源而开展的竞争将逐步转移到新能源领域。新能源的崛起将导致能源生产国与消费国之间、发达国家与发展中国家之间、发达国家和发展中国家内部出现利益分化和政治关系重组。中国要利用在新能源设备制造业领域的绝对优势,选择适合的产业战略,促进新能源产业发展,积极推动全球碳减排,帮助包括中国在内的发展中国家实现能源自给和能源清洁化,并降低工业化和现代化的成本。 展开更多
关键词 新能源 地缘政治 产业安全 产业战略
下载PDF
上一页 1 2 199 下一页 到第
使用帮助 返回顶部