CYBER

作品数:706被引量:724H指数:10
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:朴俊杰巩汉顺曲宝林徐慧军徐寿平更多>>
相关机构:中国人民解放军总医院武汉大学四川大学国防科学技术大学更多>>
相关期刊:更多>>
相关基金:国家自然科学基金中国博士后科学基金国家重点基础研究发展计划国家高技术研究发展计划更多>>
-

检索结果分析

结果分析中...
选择条件:
  • 期刊=China Communicationsx
条 记 录,以下是1-8
视图:
排序:
Network Defense Decision-Making Based on Deep Reinforcement Learning and Dynamic Game Theory
《China Communications》2024年第9期262-275,共14页Huang Wanwei Yuan Bo Wang Sunan Ding Yi Li Yuhua 
supported by the Major Science and Technology Programs in Henan Province(No.241100210100);The Project of Science and Technology in Henan Province(No.242102211068,No.232102210078);The Key Field Special Project of Guangdong Province(No.2021ZDZX1098);The China University Research Innovation Fund(No.2021FNB3001,No.2022IT020);Shenzhen Science and Technology Innovation Commission Stable Support Plan(No.20231128083944001)。
Existing researches on cyber attackdefense analysis have typically adopted stochastic game theory to model the problem for solutions,but the assumption of complete rationality is used in modeling,ignoring the informat...
关键词:A3C cyber attack-defense analysis deep reinforcement learning stochastic game theory 
TDLens:Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
《China Communications》2022年第10期102-115,共14页Rui Mei Hanbing Yan Qinqin Wang Zhihui Han Zhuohang Lyu 
supported by National Natural Science Foundation of China (No. U1736218);National Key R&D Program of China (No. 2018YFB0804704);partially supported by CNCERT/CC
To combat increasingly sophisticated cyber attacks,the security community has proposed and deployed a large body of threat detection approaches to discover malicious behaviors on host systems and attack payloads in ne...
关键词:cyber threat detection causality dependency graph data provenance 
Modeling and Analysis of the Decentralized Interactive Cyber Defense Approach
《China Communications》2022年第10期116-128,共13页Ming Liu Ruiguang Li Weiling Chang Jieming Gu Shouying Bai Jia Cui Lu Ma 
financially supported by the National Natural Science Foundation of China (No. 62106060);in part by the Beijing Natural Science Foundation (No. 4214061)
Powered by the Internet and the ever-increasing level of informatization, the cyberspace has become increasingly complex and its security situation has become increasingly grim, which requires new adaptive and collabo...
关键词:cyber defense multi-agent coordination evolutionary game heuristic decision algorithm 
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms被引量:4
《China Communications》2021年第1期130-150,共21页Ming Wan Jiawei Li Ying Liu Jianming Zhao Jiushuang Wang 
This work was supported by the National Key R&D Program under Grant No.2018YFA0701604;the Natural Science Foundation of Liaoning Province under Grant No.2019-MS-149.
Due to the deep integration of information technology and operational technology,networked control systems are experiencing an increasing risk of international cyber attacks.In practice,industrial cyber security is a ...
关键词:industrial cyber threats industrial characteristics VULNERABILITIES security mechanisms and viewpoints 
MimicCloudSim:An Environment for Modeling and Simulation of Mimic Cloud Service被引量:2
《China Communications》2021年第1期212-221,共10页Liming Pu Jiangxing Wu Hailong Ma Yuhang Zhu Yingle Li 
This work was supported by the National Science and Technology Major Project of China(No.2018ZX03002002);the Foundation for Innovative Research Groups of the National Natural Science Foundation of China(No.61521003).
In recent years,an increasing number of application services are deployed in the cloud.However,the cloud platform faces unknown security threats brought by its unknown vulnerabilities and backdoors.Many researchers ha...
关键词:cyber mimic defense mimic cloud service SIMULATION dynamic heterogeneous redundancy 
Monitoring and Early Warning of New Cyber-Telecom Crime Platform Based on BERT Migration Learning被引量:6
《China Communications》2020年第3期140-148,共9页Shengli Zhou Xin Wang Zerui Yang 
supported in part by the Basic Public Welfare Research Program of Zhejiang Province under Grant LGF20G030001.
The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation...
关键词:NEW cyber-telecom CRIME BERT model deep LEARNING monitoring and WARNING text analysis 
MIIT Issued Guidance on Strengthening Cybersecurity Work in the Telecommunications and Internet Industries
《China Communications》2014年第10期159-160,共2页MIIT 
1.Deepening the network infrastructure and business systems security.Seriously implement the"communications network security management approach"(MIIT Order No.11)and communication network security series of standards...
关键词:网络基础设施 互联网行业 安全工作 通信网络安全 电信 安全管理办法 风险评估 业务系统 
PROTECTING COMMUNICATIONS INFRASTRUCTURE AGAINST CYBER ATTACKS
《China Communications》2014年第8期I0002-I0003,共2页谷大武 蒋旭宪 薛一波 邹维 郭莉 
Our world becomes more and more dependent on communications infrastructure such as computer resources,network connections and devices for communications.However,current security techniques do not provide adequate prot...
关键词:通信基础设施 网络攻击 保障 计算机资源 网络连接 安全技术 设备 
检索报告 对象比较 聚类工具 使用帮助 返回顶部