[PDF][PDF] Emerging and disruptive technologies, nuclear risk, and strategic stability

F Su, J Yuan - … -stability-chinese-literature-review …, 2022 - europeanleadershipnetwork.org
… communication is that it subverts the traditional encryption and hacker technology so that
military communication can, in principle, achieve absolute security and confidentiality. In the …

[引用][C] Architecture and key technologies of cyberspace security

JZ Luo, M Yang, Z Ling, WJ Wu, XD Gu - SCIENTIA SINICA Information, 2016

面向无线感知模型的用户隐私保护方法研究

姜禹, 施祺, 丛洋, 胡爱群 - 信息安全学报 - jcs.iie.ac.cn
… state information has emerged as a pivotal tool with vast potential and extensive research
and … This paper quantitatively analyzes the user privacy protection issues of wireless sensing …

[引用][C] Fully privacy-preserving determination of point-range relationship

Z Chen, S Li, L Chen, Q Huang, W Zhang - Scientia Sinica Informationis, 2018

[引用][C] A threat perception method for inter-domain routing system based on weighted similarity (in Chinese)

Y Guo, HX Duan, LC Zhang - Sci Sin Inform, 2017

[引用][C] Framework of the new generation of smart highway

Y Du, C Liu, D Wu, C Zhao - China Journal of Highway and Transport, 2022

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… Some research work addressing security and privacy issue … An extensive survey on similar
technologies like machine … Blockchain technology integration with loT security are performed. …

[PDF][PDF] 闽EasyChair Preprint

K Karuppusamy, P Madhavan - 2020 - easychair.org
… In this paper, an extensive survey about the mobile edge … life incorporate with wireless
technology and virtual storage management such as mobile, IOT devices, Wireless devices, etc. …

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击INSTITUTE OF SCIENCE AND TECHNOLOGY

BONS CRYPTOGRAPHY - 2012 - itu.edu.tr
Security and Privacy demonstrates that designing a privacy … First, this work includes a
comprehensive analysis of privacy-… security properties that we investigated include user privacy

面向网络空间防御的对抗机器学习研究综述

余正飞, 闫巧, 周鋆 - 自动化学报, 2022 - aas.net.cn
… is an interdisciplinary research field. In this paper, we provide a comprehensive review of
works … in the training phase, and launching privacy violation in the whole phase for cyberspace …