Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Engineering Science
1009-1742
2016 Issue 6
Research on Cyberspace Sovereignty
Fang Binxing;,Zou Peng;,Zhu Shibing;
..............page:1-7
Research on the Issue of a Cyber Sovereignty Guarantee
Zou Peng;,He Jun;,Zou Hongxia;,Liu Yunjie;
..............page:8-12
Research on the International Strategy for National Cyberspace Security
Fang Binxing;,Du Aning;,Zhang Xi;,Wang Zhongru;
..............page:13-16
On the Monitoring, Analysis, and Management of Network Public Opinion:Current Status and Challenges
Yang Shanlin;,Zhou Bin;,Jia Yan;,Huang Jiuming;
..............page:17-22
A Study on the Policies and Regulations of Network Electronic Identity Management
Zou Xiang;,Hu Chuanping;,Fang Binxing;,Chen Bing;
..............page:23-27
A Study on the Improvement of the Cybersecurity Legal System in China
Li Yuxiao;,Wu Hequan;,Xie Yongjiang;,Jiang Shuli;,Cui Congcong;,Mi Tienan;
..............page:28-33
Research on a Cybersecurity Review System with Suggestions
Chen Xiaohua;,He Dequan;,Wang Hailong;,Shang Yanmin;,Xu Kefu;
..............page:39-43
Research on the Architecture of Cyberspace Security Professional Certiifcation in China
Zhang Hongli;,Yu Haining;,Fang Binxing;,Qin Yuhai;,Yu Xiangzhan;,Chu Chengyuan;
..............page:44-48
Cyberspace Security Competition and Talent Management
Yu Xiangzhan;,Zhang Hongli;,Yu Haining;,Tian Zhihong;,Zhai Jianhong;,Pan Zhuting;
..............page:49-52
The Strategy of TC 3.0:A Revolutionary Evolution in Trusted Computing
Shen Changxiang;,Zhang Dawei;,Liu Jiqiang;,Ye Heng;,Qiu Shuo;
..............page:53-57
TC Assurance Architecture for Cybersecurity Infrastructure Based on Active Defense
Zhang Dawei;,Shen Changxiang;,Liu Jiqiang;,Zhang Feifei;,Li Lun;,Cheng Lichen;
..............page:58-61
A Review of the Basic Theory of Mimic Defense
Si Xueming;,Wang Wei;,Zeng Junjie;,Yang Benchao;,Li Guangsong;,Yuan Chao;,Zhang Fan;
..............page:62-68
Mimic Defense Technology
Luo Xingguo;,Tong Qing;,Zhang Zheng;,Wu Jiangxing;
..............page:69-73
Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry
Pang Jianmin;,Zhang Yujia;,Zhang Zheng;,Wu Jiangxing;
..............page:74-78
Emergency and Response for Cyberspace Security
Yu Quan;,Yang Lifeng;,Gao Guijun;,Kou Ziming;,Zhai Lidong;
..............page:79-82
The Current Network Security Situation and Emergency Network Response
Liu Xinran;,Li Baisong;,Chang Anqi;,Lu Hui;,Tian Zhihong;
..............page:83-88
A Review of Major Viewpoints on Cyber Sovereignty around the World
Zhu Shibing;,Zhang Xuebo;,Wang Yu;,Liu Yunjie;
..............page:89-93
Trends and Management of Harmful Information around the World
Jia Yan;,Li Aiping;,Li Yuxiao;,Li Shudong;,Tian Zhihong;,Han Yi;,Shi Jinqiao;,Lin Bin;
..............page:94-98
Development and Application of Network Electronic Identity Management in Major Countries and Regions around the World
Hu Chuanping;,Chen Bing;,Fang Binxing;,Zou Xiang;
..............page:99-103
Research on Foreign ICT Supply Chain Security Management with Suggestions
Ni Guangnan;,Chen Xiaohua;,Shang Yanmin;,Wang Hailong;,Xu Kefu;
..............page:104-109