期刊文献+
共找到3,950篇文章
< 1 2 198 >
每页显示 20 50 100
Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies
1
作者 Sina Ahmadi 《Journal of Information Security》 2024年第2期148-167,共20页
Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for ... Cloud computing plays a significant role in modern information technology, providing organizations with numerous benefits, including flexibility, scalability, and cost-efficiency. However, it has become essential for organizations to ensure the security of their applications, data, and cloud-based networks to use cloud services effectively. This systematic literature review aims to determine the latest information regarding cloud computing security, with a specific emphasis on threats and mitigation strategies. Additionally, it highlights some common threats related to cloud computing security, such as distributed denial-of-service (DDoS) attacks, account hijacking, malware attacks, and data breaches. This research also explores some mitigation strategies, including security awareness training, vulnerability management, security information and event management (SIEM), identity and access management (IAM), and encryption techniques. It discusses emerging trends in cloud security, such as integrating artificial intelligence (AI) and machine learning (ML), serverless computing, and containerization, as well as the effectiveness of the shared responsibility model and its related challenges. The importance of user awareness and the impact of emerging technologies on cloud security have also been discussed in detail to mitigate security risks. A literature review of previous research and scholarly articles has also been conducted to provide insights regarding cloud computing security. It shows the need for continuous research and innovation to address emerging threats and maintain a security-conscious culture in the company. 展开更多
关键词 Cloud security Threat Analysis Mitigation Strategies Emerging Trends Ethi-cal Considerations Data Analysis
下载PDF
Reviewing the Adjustment of Japan’s National Security Strategy
2
作者 Meng Xiaoxu 《China International Studies》 2023年第2期83-106,共24页
In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively re... In December 2022,the government of Japan’s Prime Minister,Fumio Kishida,adopted the National Security Strategy(NSS),the National Defense Strategy(NDS),and the Defense Buildup Program.The documents are collectively referred to as the“three security documents,”and their formulation is based on Japan’s national interests and security requirements. 展开更多
关键词 strategy PRIME security
下载PDF
Strategic Direction of Russia Interpreted from Its New National Security Strategy
3
作者 Chen Yu 《Contemporary International Relations》 2022年第1期46-70,共25页
In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that secu... In July 2021,Russia unveiled its new National Security Strategy,which is a considerably updated version compared with the previous one and hence presents several new features.For instance,it further stresses that security should be prioritized over other aspects;it gives more attention to the chaotic aspects of order change in its assessment of the international situation;it highlights the threats from the West;and it places increased emphasis on domestic capacity building as a means for safeguarding national security.From the content of the new Strategy as well as Russia’s policies in recent years,the strategy of Russia for the foreseeable future can be generally characterized as inward-looking.Domestically,its policies will become more conservative;diplomatically,it will take up a defensive position;and economically,it will increasingly emphasize security and selfreliance.In other words,several issues that were previously overlooked will be given attention.However,strategic introversion does not mean that Russia will invest all its energy in defense.Instead,Russia will build up strength for changes that lie ahead.With the expected strategic introversion,Russia will fnd difculty in making breakthroughs in terms of its relations with the West;the China-Russia relations will continue on the path of steady development;and Russia will place greater importance to the balance of power among major countries. 展开更多
关键词 RUSSIA national security strategy strategic introversion major country relations
下载PDF
Rethinking National Security Strategies in Africa 被引量:2
4
作者 Luka Kuol Joel Amegboh 《International Relations and Diplomacy》 2021年第1期1-17,共17页
The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in ... The delivery of security to state and citizens will continue to be the daunting task facing nation states in Africa.Many African countries are becoming increasingly unable to deliver security to their citizens and in some instances;states themselves have become sources of insecurity.This is attributed less to the evolving security threats exacerbated by megatrends but more to the governance deficit manifested in weak social contract and strategic leadership that are short supply in many African countries.Despite a well-articulated security and defense policy of the African Union with a call for its member states to do the same,there is a dearth of national security strategies in most African states.This is largely attributed not only to the lack of effective implementation mechanisms of such policy but importantly to the absence of tools to help member states to craft and implement their national security strategies.There is a convincing wealth of evidence that shows a well-designed and inclusive process of developing national security strategies enables decision-makers to better confront the security threats and improve effective delivery of security to all citizens and state.Such a process provides an invaluable opportunity as well for forging a new social contract between state and its people.This article is an attempt to contribute to rethinking of how security could be perceived,planned,and delivered to the citizens in Africa. 展开更多
关键词 AFRICA security POLICY strategy Human security State security security Threats
下载PDF
A New Model for Network Security Situation Assessment of the Industrial Internet
5
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 Industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
A Security Enhancement Model Based on Switching Edge Strategy in Interdependent Heterogeneous Cyber-Physical Systems 被引量:1
6
作者 Dandan Zhao Can Liu +4 位作者 Guangquan Xu Zhiguo Ding Hao Peng Juan Yu Jianmin Han 《China Communications》 SCIE CSCD 2022年第2期158-173,共16页
With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physi... With the advent of cross-domain interconnection,large-scale sensor network systems such as smart grids,smart homes,and intelligent transportation have emerged.These complex network systems often have a CPS(Cyber-Physical System)architecture and are usually composed of multiple interdependent systems.Minimal faults between interdependent networks may cause serious cascading failures between the entire system.Therefore,in this paper,we will explore the robustness detection schemes for interdependent networks.Firstly,by calculating the largest giant connected component in the entire system,the security of interdependent network systems under different attack models is analyzed.Secondly,a comparative analysis of the cascade failure mechanism between interdependent networks under the edge enhancement strategy is carried out.Finally,the simulation results verify the impact of system reliability under different handover edge strategies and show how to choose a better handover strategy to enhance its robustness.The further research work in this paper can also help design how to reduce the interdependence between systems,thereby further optimizing the interdependent network system’s structure to provide practical support for reducing the cascading failures.In the later work,we hope to explore our proposed strategies in the network model of real-world or close to real networks. 展开更多
关键词 security enhancement switching edge strategy interdependent systems cyber-physical systems
下载PDF
Japan-UK Security Cooperation in the Context of the Convergence of the Indo-Pacific Strategy and Global Britain 被引量:1
7
作者 Meng Xiaoxu 《Contemporary International Relations》 2020年第3期75-103,共29页
Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countri... Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countries have close security interactions,high-level security consultations,numerous mechanisms on security cooperation,frequent defense cooperation and exchanges between forces,and cooperation geared at a response to the Korean nuclear issue.In particular,Japan and the UK regard Indo-Pacific security as the strategic focus of their cooperation,and this underscores the rules-based international order.There are multiple motivations for Japan and the UK to strengthen their security cooperation,and the deepening of their security cooperation in the Indo-Pacific region is to a great extent due to strategic factors,including responding to the US strategic adjustment,Japan and Britain’s respective proactive strategic demands,the improving strategic positions of the Indopacific region,their seeking to shape the regional order in the Indo-Pacific,and so on.Despite facing challenges,Japan-UK security cooperation is continuously strengthening against a background of deepening strategic convergence between the two countries and great power competition. 展开更多
关键词 Indo-Pacific strategy Global Britain Japan-UK relations security cooperation
下载PDF
Present Situation and Strategies for State Foodstuff Security 被引量:2
8
作者 Jiayong Song Jun Yin 《Chinese Business Review》 2005年第2期52-55,共4页
The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstu... The system of State Foodstuff Security is a comprehensively systematical framework, which needs concerted support and energetic cooperation from all walks of lives. This paper analyzes the strategies for State Foodstuff Security: integrating new biological techniques with traditional methods, full utilization of soil with its protection, policies leading with market regulation, steady high yield with promoting additional value through further processing, general foodstuff production with substitute food seeking, domestic self-supply with international trade complementarities as well as short-term exploiting with long-term development on the basis of the increase of general foodstuff production capability. 展开更多
关键词 foodstuff security strategy
下载PDF
Investment strategy analysis of information system security in consideration of attackers
9
作者 Pan Chongxia Zhong Weijun Mei Shu'e 《Journal of Southeast University(English Edition)》 EI CAS 2017年第3期377-381,共5页
In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security se... In order to solve the problem of howa firm makes an optimal choice in developing information systems when faced with the following three modes: development by its own efforts, outsourcing them to a managed security service provider( MSSP) and cooperating with the MSSP, the firm 's optimal investment strategies are discussed by modeling and analyzing the maximum expected utility in the above cases under the condition that the firm plays games with an attacker.The results showthat the best choice for a firm is determined by the reasonable range of the cooperative development coefficient and applicable conditions. When the cooperative development coefficient is large, it is more rational for the firm to cooperate with the MSSP to develop the information system. When the cooperative development coefficient is small, it is more rational for the firm to develop the information system by its own efforts. It also shows that the attacker's maximum expected utility increases with the increase in the attacker 's breach probability and cost coefficient when the cooperative development coefficient is small. On the contrary, it decreases when the cooperative development coefficient is large. 展开更多
关键词 information security ECONOMICS informationsecurity INVESTMENT INVESTMENT strategy GAME theory
下载PDF
A systematic review of climate change impacts,adaptation strategies,and policy development in West Africa
10
作者 Camillus Abawiera WONGNAA Alex Amoah SEYRAM Suresh BABU 《Regional Sustainability》 2024年第2期13-25,共13页
Climate change studies are diverse with no single study giving a comprehensive review of climate change impacts,adaptation strategies,and policy development in West Africa.The unavailability of an all-inclusive study ... Climate change studies are diverse with no single study giving a comprehensive review of climate change impacts,adaptation strategies,and policy development in West Africa.The unavailability of an all-inclusive study to serve as a guide for practitioners affects the effectiveness of climate change adaptation strategies proposed and adopted in the West African sub-region.The purpose of this study was to review the impacts of climate change risks on the crop,fishery,and livestock sectors,as well as the climate change adaptation strategies and climate-related policies aimed at helping to build resilient agricultural production systems in West Africa.The review process followed a series of rigorous stages until the final selection of 56 articles published from 2009 to 2023.Generally,the results highlighted the adverse effects of climate change risks on food security.We found a continuous decline in food crop production.Additionally,the livestock sector experienced morbidity and mortality,as well as reduction in meat and milk production.The fishery sector recorded loss of fingerlings,reduction in fish stocks,and destruction of mariculture and aquaculture.In West Africa,climate-smart agriculture technologies,physical protection of fishing,and inclusion of gender perspectives in programs appear to be the major adaptation strategies.The study therefore recommends the inclusion of ecosystem and biodiversity restoration,weather insurance,replacement of unsafe vessels,and strengthening gender equality in all climate change mitigation programs,as these will help to secure enough food for present and future generations. 展开更多
关键词 Climate change Climate extreme events Food security Adaptation strategies Climate-smart AGRICULTURE West Africa
下载PDF
Trump’s “America First” Security Strategy: Impact on China-US Relations
11
作者 Teng Jianqun 《国际问题研究》 CSSCI 北大核心 2018年第3期244-259,共16页
关键词 Trump's "America First" security strategy IMPACT on China-US RELATIONS
下载PDF
Fruit Production Distribution and Adjustment Strategies under the Constraint of Grain Security
12
作者 Bingbing MEI 《Asian Agricultural Research》 2016年第4期82-86,共5页
Grain security is the foundation of national security,and guaranteeing the grain security by every possible means is a development priority for the whole country.Rapid development of the fruit industry satisfies incre... Grain security is the foundation of national security,and guaranteeing the grain security by every possible means is a development priority for the whole country.Rapid development of the fruit industry satisfies increasing demands of people for fruits,but also presents certain competition for grain production.From the perspective of limited resources and comparative income,this paper analyzed potential threats of fruit production distribution to grain production in farmland and labor resources,and came up with pertinent adjustment strategies. 展开更多
关键词 GRAIN security FRUIT Production DISTRIBUTION Adjustment STRATEGIES
下载PDF
A fault injection model-oriented testing strategy for component security
13
作者 陈锦富 卢炎生 +1 位作者 张卫 谢晓东 《Journal of Central South University》 SCIE EI CAS 2009年第2期258-264,共7页
A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault inje... A fault injection model-oriented testing strategy was proposed for detecting component vulnerabilities.A fault injection model was defined,and the faults were injected into the tested component based on the fault injection model to trigger security exceptions.The testing process could be recorded by the monitoring mechanism of the strategy,and the monitoring information was written into the security log.The component vulnerabilities could be detected by the detecting algorithm through analyzing the security log.Lastly,some experiments were done in an integration testing platform to verify the applicability of the strategy.The experimental results show that the strategy is effective and operable.The detecting rate is more than 90%for vulnerability components. 展开更多
关键词 component testing component security fault injection model testing strategy detecting algorithm
下载PDF
The Security Strategy of the European Union: Origin, Evolution, and Policy Direction
14
作者 Zhang Jian 《Contemporary International Relations》 2022年第5期1-32,共32页
With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of secur... With the deepening development of European integration and the change of international situation, member states of the European Union(EU) have gradually strengthened consultation and coordination in the field of security and established corresponding mechanisms. In this process,the EU has also formed and developed its National Security Strategy and issued four versions of security strategy reports in 2003, 2008, 2016, and 2022. The 2022 version of the EU security strategy(hereafter referred to as the New Security Strategy), for the first time, has identified Russia as a long-term and direct threat. Furthermore, it has paid increased attention to traditional security, especially the upgrading of military capabilities and has become more reliant on the United States and the North Atlantic Treaty Organization. In the future, the EU will accelerate the militarization process, exert all-out efforts to contain Russia, scrutinize neighborhood security, and increase its swing on China policy. 展开更多
关键词 European Union security strategy European integration EU-Russia relations
下载PDF
India’s National Security Strategy:Pursuits,Origins,and Practice
15
作者 Hu Shisheng Wang Jun 《Contemporary International Relations》 2022年第6期118-145,共28页
India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of ... India has upheld extremely rich practices of national security since its founding as a republic because of its unique geo-environmental features, historical legacies, and traditional cultures, which reflect a type of national security strategy that has distinct Indian characteristics. Generally, successive governments in India have followed the basic principles articulated in Kautilya’s Arthasastra and various security practices adopted during the British Raj. India’s national security strategies are based on an internal logic of geopolitical rivalry and changes in international scenarios, and they are strongly influenced by Hindu traditions and the “Sad-Dharma” purported by King Ashoka. The objective is to create an India-dominated security order in the South Asian subcontinent, which persistently builds its capacity and system as a “net security provider” in the Indian Ocean Rim. Moreover, India is vigorously expanding its network of influence in the Pacific region in an effort to become a world leading power that enjoys a high level of strategic autonomy. 展开更多
关键词 INDIA national security strategy strategic autonomy
下载PDF
Strategic Thinking on the Path of National Security with Chinese Characteristics
16
作者 Yuan Peng 《Contemporary International Relations》 2022年第3期1-26,共26页
General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,whi... General Secretary of the Communist Party of China(CPC)Central Committee Xi Jinping has creatively put forward a holistic approach to national security and the path of national security with Chinese characteristics,which are synergistic and inseparable.Compared with other major global powers,China is embarking on a path of national security that incorporates distinctive Chinese characteristics.Unlike the United States,which seeks international expansion and hegemony while pursuing national security,China is dedicated to maintaining global security and building a community with a shared future for humanity.Unlike Russia,which prioritizes national security over everything else,China places greater emphasis on balancing development and security.Unlike Europe and Japan,which entrust their national security to other countries,China has always adhered to the principle of independence and self-reliance.An essential feature of the path of national security with Chinese characteristics is that it upholds the unity of the people’s security,political security,and the supremacy of national interests.Moreover,China will remain committed to peaceful development while defending its interests.China will continue to balance development and security imperatives,maintaining an independent foreign policy while building a community with a shared future for humanity.To make solid strides on the path of national security with Chinese characteristics,the fundamental task will be pursuing a holistic approach to national security and implementing the Ten Upholds. 展开更多
关键词 holistic approach to national security path of national security with Chinese characteristics national security strategy
下载PDF
Application Strategy of Data Encryption Technology in Computer Network Security
17
作者 Yuantian Zhang Wei Yang Zhongxi Zhang 《Journal of Electronic Research and Application》 2018年第5期7-10,共4页
In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network... In the context of the information age,on the basis of the convenience of computer networks,security issues have gradually emerged.The data encryption technology is reasonably applied in the process of computer network security practice,which promotes the safe and reliable operation of the computer network to a certain extent.Based on this,our article regards data encryption technology as the main research object,focusing on its specific application in computer network security. 展开更多
关键词 COMPUTER NETWORK security DATA ENCRYPTION technology application strategy
下载PDF
The Impact of E-commerce on the Development of Regional Economy and Its Analysis of Security Strategy
18
作者 Pengfei GAO 《International Journal of Technology Management》 2015年第5期59-62,共4页
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis... The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role. 展开更多
关键词 Network shopping E-commerce system Regional economy security strategy
下载PDF
RECENT DEVELOPMENTS OF US ASIA-PACIFIC SECURITY STRATEGY AND CHINA'S COUNTERMEASURES
19
作者 ZHANG JINGQUAN 《Contemporary World》 2017年第2期14-17,共4页
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi... The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald 展开更多
关键词 US in IS on WILL that RECENT DEVELOPMENTS OF US ASIA-PACIFIC security strategy AND CHINA’S COUNTERMEASURES ROK of
下载PDF
CHINA'S POST-COLD WAR SECURITY STRATEGY
20
作者 Yan Xuetong Deputy Director,Center for China’s Foreign Policy Studies,China Institute of Contemporary International Relations 《Contemporary International Relations》 1995年第5期1-16,共16页
Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether ... Rapid growth of China’s overall national strength after the end of the ColdWar has attracted worldwide attention. As a consequence, political scien-tists of various countries begin to ponder over a question: whether will Chi-na seek external expansion when it becomes powerful? In 1992, there began to ap-pear a myth of so-called "China threat". In its November 28 issue of that year, 展开更多
关键词 CHINA’S POST-COLD WAR security strategy
下载PDF
上一页 1 2 198 下一页 到第
使用帮助 返回顶部