期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Creating Strategic Opportunities:The Concept and Practice of China-ASEAN Security Cooperation 被引量:2
1
作者 Wei Ling 《Social Sciences in China》 2021年第3期188-208,共21页
The cooperation between China and the Association of Southeast Asian Nations(ASEAN)began with the establishment of dialogue relations between the two sides after the ending of the Cold War.In 1994,when the ASEAN Regio... The cooperation between China and the Association of Southeast Asian Nations(ASEAN)began with the establishment of dialogue relations between the two sides after the ending of the Cold War.In 1994,when the ASEAN Regional Forum was established,China was one of the founding members,marking the beginning of formal security cooperation between China and ASEAN.The decision to shift to cooperation/enhance willingness to cooperate was made by the two parties after taking stock of the international and regional situation and their respective interests in the wake of the collapse of the bipolar system.Security cooperation was driven by a consensus on seizing,creating and maintaining strategic opportunities;or more specifically,by taking advantage of development opportunities and striving to maintain regional stability in difficult situations,thus creating a peaceful and amicable strategic regional context for sustainable development.The core concept of China-ASEAN security cooperation is developmental peace,with the norms of cooperation being the ASEAN way,cooperative security,the new security concept and the Asian security concept.In practice,China-ASEAN security cooperation covers three dimensions-strategic stability,management and control of high tension issues,and practical cooperation.New opportunities and challenges are emerging in the new era for China-ASEAN security cooperation.Fundamentally speaking,the two sides need to strive for the goal of building an ASEAN community and a China-ASEAN community with a shared future and to properly coordinate the strategic positioning of the long-term core interests of both parties. 展开更多
关键词 China-ASEAN relations strategic opportunities developmental peace security cooperation ASEAN community China-ASEAN community with a shared future
原文传递
China-Turkey Security Cooperation Under the Background of the ‘Belt and Road’ and the ‘Middle Corridor’ Initiatives 被引量:1
2
作者 Ahmet Faruk Isik Zhiqiang Zou 《Asian Journal of Middle Eastern and Islamic Studies》 2019年第2期278-293,共16页
This article focuses on the security cooperation between China and Turkey and the impact of the‘Belt and Road’and the‘Middle Corridor’Initiatives on bilateral cooperation.The‘Belt and Road’Initiative and Turkey... This article focuses on the security cooperation between China and Turkey and the impact of the‘Belt and Road’and the‘Middle Corridor’Initiatives on bilateral cooperation.The‘Belt and Road’Initiative and Turkey’s‘Middle Corridor’Initiative have promoted economic cooperation and enhanced communication and mutual understanding between the two countries.We examine this cooperation from a security perspective;with deep analysis on security cooperation between China and Turkey published by the governments,academia and social media,the impact of the‘Belt and Road’and‘Middle Corridor’Initiatives on the growing bilateral relationship has been clearly highlighted.Additionally,this article focuses on the challenges of bilateral security and counterterrorism cooperation,and the positive impact of security cooperation on Sino-Turkish relations in the wake of the‘Belt and Road’and the‘Middle Corridor’initiatives.This article shows that economic cooperation has a significant impact on security cooperation and the‘Belt and Road’and the‘Middle Corridor’Initiatives may build closer ties between the two countries. 展开更多
关键词 China Turkey ‘Belt and Road’Initiative ‘Middle Corridor’Initiative security cooperation counterterrorism cooperation
原文传递
Bolster Confidence and Cooperation Seek Common Security
3
《International Understanding》 2002年第1期7-9,共3页
关键词 Bolster Confidence and cooperation Seek Common security
下载PDF
Security Situation in Central Asia and its Vicinity and Shanghai Cooperation Organization after “9. 11” Incident
4
《International Understanding》 2002年第1期18-20,共3页
关键词 ORGANIZATION INCIDENT security Situation in Central Asia and its Vicinity and Shanghai cooperation Organization after ASIA
下载PDF
“印太战略”与“全球英国”战略交汇下的日英安全合作 被引量:1
5
作者 孟晓旭 《Contemporary International Relations》 2020年第3期75-103,共29页
Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countri... Japan-UK security cooperation has been deepening as the Indo-Pacific Strategy has converged with Global Britain,which has become strongly Indo-Pacific-oriented.In terms of their cooperation on security,the two countries have close security interactions,high-level security consultations,numerous mechanisms on security cooperation,frequent defense cooperation and exchanges between forces,and cooperation geared at a response to the Korean nuclear issue.In particular,Japan and the UK regard Indo-Pacific security as the strategic focus of their cooperation,and this underscores the rules-based international order.There are multiple motivations for Japan and the UK to strengthen their security cooperation,and the deepening of their security cooperation in the Indo-Pacific region is to a great extent due to strategic factors,including responding to the US strategic adjustment,Japan and Britain’s respective proactive strategic demands,the improving strategic positions of the Indopacific region,their seeking to shape the regional order in the Indo-Pacific,and so on.Despite facing challenges,Japan-UK security cooperation is continuously strengthening against a background of deepening strategic convergence between the two countries and great power competition. 展开更多
关键词 Indo-Pacific Strategy Global Britain Japan-UK relations security cooperation
下载PDF
Relay Selection Strategy in the Secure Cooperative Communications System
6
作者 Hsin-Ying Liang Cheng-Ying Yang Wei-Liang Wu 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期271-276,共6页
With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in ... With the low cost and low hardware complex considerations,cooperative systems are a tendency in the future communications.This work considers the secure cooperative communications systems.For a practical situation in the system,the scenario includes multiple source stations,multiple relay stations,multiple destination stations,and eavesdroppers.To analyze the optimal relay selection in the system,we begin with the performance analysis for a single source station and a single destination station.By applying two cooperative models,the amplify-andforward(AF) mode and decode-and-forward(DF)mode,the secrecy capacity is derived.Then,we apply the derived results to the considered environment to find the optimal relay assignment.By the way,the relay selection can be obtained by the exhaustive search algorithm.However,there are a lot of steps needed if the number of source stations is large.Hence,applying the characters of the cooperative modes in the relay selection,the pre-selection step is proposed with a mathematical derivation.It could be used for the practical situation without a long-time calculation. 展开更多
关键词 Index Terms--Amplify-and-forward (AF) mode exhaustive search method fixed decode-and-forward(DF) mode mutual information relay selection secrecycapacity secure cooperative communications.
下载PDF
Improving the secrecy rate by turning foes to allies:An auction scheme
7
作者 马亚燕 王保云 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期80-90,共11页
Security against eavesdroppers is a critical issue in cognitive radio networks(CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters(... Security against eavesdroppers is a critical issue in cognitive radio networks(CRNs). In this paper, a scenario consisting of one primary pair and multiple secondary pairs is considered. The secondary transmitters(STs) work in half-duplex mode and they are potential eavesdroppers on the primary transmission unless they are allowed to simultaneously transmit with the primary transmitter(PT). A modified second-price sealed-bid auction scheme is employed to model the interaction between the PT and STs. With the proposed auction scheme, the hostile relationship between the PT and STs is transformed into a cooperative relationship. An iterative algorithm based on the max–min criteria is proposed to find the optimal bidding power of the STs for an access chance in the presence of multiple eavesdroppers. Numerical results show that the proposed auction scheme not only improves the PT's security but also increases the access opportunities of the STs. 展开更多
关键词 security auction cooperation cognitive radio networks
下载PDF
NOT A MILITARY ALLIANCE——The SCO should continue to implement its founding principles,based on security and economic cooperation,rather than expanding its membership
8
作者 WANG HAIYUN is a senior consultant of the Center for Shanghai Cooperation Organization Studies of the Shanghai Academy of Social Sciences 《Beijing Review》 2006年第24期12-13,共2页
In reinventing itself, the Shanghai Cooperation Organization should stick to being a regional cooperative organization guided by a new concept and prioritizing security and economic cooperation. Meanwhile, brash expan... In reinventing itself, the Shanghai Cooperation Organization should stick to being a regional cooperative organization guided by a new concept and prioritizing security and economic cooperation. Meanwhile, brash expansion of the organization will cause a lot of problems. 展开更多
关键词 SCO NOT A MILITARY ALLIANCE The SCO should continue to implement its founding principles based on security and economic cooperation rather than expanding its membership
原文传递
The US Military Bases in the Gulf Cooperation Council States:Dynamics of Readjustment
9
作者 SUN Degang 《Asian Journal of Middle Eastern and Islamic Studies》 2010年第4期44-63,I0003,共21页
Since the end of the Gulf War in 1991,the US military bases in the GCC states have evolved functionally from the dual containment of Iran and Iraq to the consolidation of its predominance in the Gulf region.Since the ... Since the end of the Gulf War in 1991,the US military bases in the GCC states have evolved functionally from the dual containment of Iran and Iraq to the consolidation of its predominance in the Gulf region.Since the 9/11 terrorist attacks,the US readjustment of its military bases in the GCC states features two attributes.First,the task of the bases has transformed from fighting the Iraq War to the more complex and enduring tasks of maintaining the Gulf security,countering terrorists and containing Iran.Second,the major military base deployment has shifted from Saudi Arabia to Qatar,Bahrain and other GCC states,so a multi-faceted security mechanism under the US leadership has taken shape,which has overshadowed the Iranian-proposed collective security appeal.In Obama’s presidency,the deployment of the US military bases in the GCC states has revealed five new and distinct features,i.e.the bases are extending geographically,diminishing in size,increasingly approaching the potential enemies,strong in mobility and being gradually interlinked with other bases in Central Asia,Turkey and Djibouti. 展开更多
关键词 GCC States Military Bases security cooperation Military Presence US Middle East Policy
原文传递
Adaptive cooperative secure control of networked multiple unmanned systems under FDI attacks 被引量:1
10
作者 Yanhui Zhang Di Mei +1 位作者 Yong Xu Lihua Dou 《Security and Safety》 2023年第4期102-117,共16页
With the expanding applications of multiple unmanned systems in various fields,more and more research attention has been paid to their security.The aim is to enhance the anti-interference ability,ensure their reliabil... With the expanding applications of multiple unmanned systems in various fields,more and more research attention has been paid to their security.The aim is to enhance the anti-interference ability,ensure their reliability and stability,and better serve human society.This article conducts adaptive cooperative secure tracking consensus of networked multiple unmanned systems subjected to false data injection attacks.From a practical perspective,each unmanned system is modeled using high-order unknown nonlinear discrete-time systems.To reduce the communication bandwidth between agents,a quantizer-based codec mechanism is constructed.This quantizer uses a uniform logarithmic quantizer,combining the advantages of both quantizers.Because the transmission information attached to the false data can affect the accuracy of the decoder,a new adaptive law is added to the decoder to overcome this difficulty.A distributed controller is devised in the backstepping framework.Rigorous mathematical analysis shows that our proposed control algorithms ensure that all signals of the resultant systems remain bounded.Finally,simulation examples reveal the practical utility of the theoretical analysis. 展开更多
关键词 Secure cooperative control networked multiple unmanned systems false data injection attacks encoding-decoding strategy
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部