[PDF][PDF] Testimony before the US-China Economic and Security Review Commission: Chinese Advances in Unmanned Systems and the Military Applications of Artificial …

EB Kania - … ” Warfare,” US-China Economic and Security Review …, 2017 - uscc.gov
… Similarly, recent research has focused on mitigating the vulnerability of unmanned weapons
systems to electronic countermeasures, which is reflected in publications and procurement …

[图书][B] “一带一路”: 新型全球化的新长征Belt and Road Initiative: Exploring a New Mode of Globalization

赵白鸽, 蔡昉, 欧晓理, 王镭, 王灵桂, 智宇琛副… - 2017 - books.google.com
… This requires profound reflections and practical countermeasures from us and pushing
globalization to a new height through technological advancements.The BRI,which is rooted in the …

[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
attacks. Furthermore, the abstract discusses the significance of collaboration between security
… to share insights and develop effective countermeasures. By adopting these advanced …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… The paper also reviewed the countermeasure to address the possible solutions. Lin et al.
[6] 2017 The paper initially described the IoT and Cyber-Physical Systems (CPS) integration. …

物联网隐私与安全联合参考架构

M KAMAL, I RASHID, W IQBAL, MH SIDDIQUI, S KHAN… - Frontiers, 2023 - jzus.zju.edu.cn
… with the privacy and security of systems. Security issues and cyber attacks on IoT devices may
… To counter these issues, we need to implement privacy and security right from the building …

强物理不可克隆函数的侧信道混合攻击

刘威, 蒋烈辉, 常瑞 - 电子学报, 2019 - ejournal.org.cn
… existing side channel attack methods on strong PUFs,… attack methods are elaborated and
analyzed. In the end, the temporary predicaments and countermeasures of side channel attack

如何正确和安全地开展后量子密码算法的相关实现(英文)

张帆, 杨博麟 - Journal of Cryptologic Research, 2023 - search.proquest.com
… several shares (protection known as “… countermeasures, such as masking. This paper shows
that proper implementation of PQC requires knowledge of security evaluation and of secure

区块链技术专刊序言(中英文)

冯登国, 欧阳永贵 - Journal of Cryptologic Research, 2018 - search.proquest.com
… et al. elaborates the common attacks on Bitcoin mining, analyzes the basic approach,
threats and damages of the attacks, and describes some known countermeasures. Research of …

新型二阶SQL 注入技术研究

乐德广, 李鑫, 龚声蓉, 郑力新 - 通信学报, 2015 - infocomm-journal.com
… order SQL injection attacks the operating system … vulnerabilities exist widely in Web
applications, and the proposed new second-order injection techniques can effectively commit attacks

[HTML][HTML] 边缘计算安全技术综述

凌捷, 陈家辉, 罗玉, 张思亮 - 大数据, 2019 - infocomm-journal.com
… model of edge computing in the Internet of things were introduced,the vulnerabilities of edge
devices and the … Routing attacks and countermeasures in the RPL-based Internet of things