[PDF][PDF] China and Its Hybrid Warfare Spectrum

L Saalman - Hybrid Warfare: Security and Asymmetric Conflict in … - scholar.archive.org
While the Chinese term for ‘hybrid warfare’(混合战争) is a derivation of English, its strategic
utility against adversaries can be as traced as early as The Art of War (孙子兵法) of the fifth …

[PDF][PDF] The Enigma of Su Xuelin and Lu Xun

JE Von Kowallis - Literature & Philosophy, 2010 - chinese.nsysu.edu.tw
… But her sudden and vitriolic attack on Lu Xun shortly after his death turned into what she …
For this reason, the question of what motivated these attacks has become a puzzle both to …

[PDF][PDF] A survey on location privacy preserving techniques

X Lu, L Zhang, P Xiong - Comput. Sci. Appl., 2016 - pdf.hanspub.org
… This paper surveys the state of the art of location privacy preserving techniques. Firstly, we
introduce the general framework of LBS system as well as the potential threats to LBS user. …

[PDF][PDF] Revolution, love and discourse: On Yan Lianke's “Hard as water”

Y Cao, T He, W Yi - International Journal of Languages, Literature and …, 2020 - ijlll.org
This study aims to investigate the relationship between ‘Revolution’,‘Love’and ‘Discourse’in
‘Hard as Water’by means of close reading. It is found that ‘Hard as Water’, different from …

The Agony of Learning: The PLA's Transformation in Military Affairs

D Lai - Learning by Doing: The PLA Trains at Home and …, 2012 - JSTOR
This chapter examines Chinese learning from other peoples’ wars and military transformation
and the impact of this learning on China’s military thoughts, traditions, and the overall PLA …

China's National Defense Mobilization System: Foundation for Military Logistics

E Richter, B Rosen - PLA Logistics and Sustainment: PLA Conference 2022, 2023 - JSTOR
The People’s Republic of China’s (PRC’s) national defense mobilization system is a vital
component of its national defense strategy. The national defense mobilization system touches …

[HTML][HTML] 從惡意電子郵件攻擊樣本探討未來我國政府機關社交工程演練之方向–以A 機關為例

W Lin - 2012 - ir.lib.ncu.edu.tw
engineering attacks. Facing such attacks, this study suggested A agency should improve
its drill program for preventing malicious electronic social engineering attacks; In addition, the …

[HTML][HTML] 基于社交网络服务的社会工程学实践与反思——以某大学本科生社交账户安全为例

刘峰, 黄祺熠, 张松洋, 吴坤凯, 孙钰 - Computer Science and …, 2020 - hanspub.org
social engineering frameworks are more oriented towards real social applications. Frequent
… 根据Christopher Hadnagy [1] 的社会工程学框架,我们可以知道社会工程学(Social Engineering

[PDF][PDF] 社工概念演化分析

王作广, 朱红松, 孙利民 - 信息安全学报, 2021 - jcs.iie.ac.cn
… of the social engineering. These phenomena impede the security research and defense
on social engineering. This paper studies the concept evolution of social engineering, and …

基植管理循環為基礎之社交工程事件鑑識分析研究

高大宇, 曾俊傑, 王旭正 - 前瞻科技與管理, 2011 - airitilibrary.com
… A Social Engineering drill of 5-phase testing analysis is exhibited to strengthen computer …
In response to the study in Social Engineering, the incident responders can have effective …