supported by the Major Science and Technology Programs in Henan Province(No.241100210100);The Project of Science and Technology in Henan Province(No.242102211068,No.232102210078);The Key Field Special Project of Guangdong Province(No.2021ZDZX1098);The China University Research Innovation Fund(No.2021FNB3001,No.2022IT020);Shenzhen Science and Technology Innovation Commission Stable Support Plan(No.20231128083944001)。
Existing researches on cyber attackdefense analysis have typically adopted stochastic game theory to model the problem for solutions,but the assumption of complete rationality is used in modeling,ignoring the informat...
supported by National Natural Science Foundation of China (No. U1736218);National Key R&D Program of China (No. 2018YFB0804704);partially supported by CNCERT/CC
To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in ne...
financially supported by the National Natural Science Foundation of China (No. 62106060);in part by the Beijing Natural Science Foundation (No. 4214061)
Powered by the Internet and the ever-increasing level of informatization, the cyberspace has become increasingly complex and its security situation has become increasingly grim, which requires new adaptive and collabo...
This work was supported by the National Key R&D Program under Grant No.2018YFA0701604;the Natural Science Foundation of Liaoning Province under Grant No.2019-MS-149.
Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a ...
This work was supported by the National Science and Technology Major Project of China(No.2018ZX03002002);the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(No.61521003).
In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha...
supported in part by the Basic Public Welfare Research Program of Zhejiang Province under Grant LGF20G030001.
The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation...
1.Deepening the network infrastructure and business systems security.Seriously implement the"communications network security management approach"(MIIT Order No.11)and communication network security series of standards...
Our world becomes more and more dependent on communications infrastructure such as computer resources,network connections and devices for communications.However,current security techniques do not provide adequate prot...