[PDF][PDF] The rise of smart courts in China: opportunities and challenges to the judiciary in a digital age

J Peng, W Xiang - Nordic J Law Soc Res (NNJLSR), 2019 - tidsskrift.dk
cases of first instance in summary procedure, cases of second instance only dealing with
legal issues and cases … Simple civil cases of first instance in summary procedure refer to those …

[PDF][PDF] The Xinjiang Papers: An Introduction

A Zenz - The Uyghur Tribunal, November, 2021 - uyghurtribunal.com
… series of important speeches, arrange and deploy current and future key tasks.”In late 2016,
these “future key tasks” would have referred to the internment campaign, which began in …

[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
… share insights and develop effective countermeasures. By adopting these … privacy is a
challenging task. This section explores privacy-preserving techniques for mobile malware analysis

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… The paper also reviewed the countermeasure to address the … The security and privacy
issues survey in detail. The edge/… analysis of industrial internet of things, IEEE Internet Things J…

物联网隐私与安全联合参考架构

M KAMAL, I RASHID, W IQBAL, MH SIDDIQUI, S KHAN… - Frontiers, 2023 - jzus.zju.edu.cn
… To counter these issues, we need to implement privacy and security right from the building
… Systematic review of existing IoT architectures security and privacy issues and concerns. Int …

区块链技术专刊序言(中英文)

冯登国, 欧阳永贵 - Journal of Cryptologic Research, 2018 - search.proquest.com
… , and 11 papers are selected into this special issue after the peer review process. Three
review articles are included in this special issue. “Survey on Security of Blockchain” by Si Xue-…

[HTML][HTML] 於軟體定義網路環境中基於信任度演算法實現可信工控物聯網之建置

TW Wang - 2022 - ir.lib.ncu.edu.tw
… , and the existing information security products are not directly applicable to industrial control
system, so the relative information security strategy should be designed according to the …

复杂物联网联盟链系统通信机制研究

乔蕊, 刘敖迪, 陈迪, 王清贤 - 自动化学报, 2022 - aas.net.cn
… State-of-the-art, challenges, and open issues in the integration of internet of things and …
in usage-based automotive insurance: Attacks and countermeasures. IEEE Transactions on …

[PDF][PDF] Security Trade 丁off Ontological Approach

B Andrzej - academia.edu
… application domain remains a challenge. Sampling and analyzing … The Section 2 of this
chapter presents an overview of the … the cost of the applied countermeasures on the other hand. …

[HTML][HTML] 雷达像智能识别对抗研究进展

高勋章, 张志伟, 刘梅, 龚政辉, 黎湘 - 雷达学报, 2023 - radars.ac.cn
… on intelligent radar image recognition countermeasures. Then it … Finally, it discusses five
open questions worthy of in-depth … AI security for geoscience and remote sensing: Challenges