2006
DOI: 10.1007/s11390-006-0740-2
|View full text |Cite
|
Sign up to set email alerts
|

Progress and Prospect of Some Fundamental Research on Information Security in China

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 161 publications
0
6
0
Order By: Relevance
“…In the case of the U.S' experience of suburbanization, some of the scholars call for attention from the public and scholars alike that we should learn lessons from western countries, resisting the massive sprawl in the fringe areas of cities which would lead to the decline of the city center (Jin & Gong, 1998;Silu Li & Tang, 1998). Others believe that China has gone through the process of suburbanization but in a unique Chinese way (Zhou & Ma, 2000) and they even suggesting suburbanization to solve the crowded city center problem (Feng, 2001;Zhou, 1995).…”
Section: Suburbanization In Chinamentioning
confidence: 99%
See 1 more Smart Citation
“…In the case of the U.S' experience of suburbanization, some of the scholars call for attention from the public and scholars alike that we should learn lessons from western countries, resisting the massive sprawl in the fringe areas of cities which would lead to the decline of the city center (Jin & Gong, 1998;Silu Li & Tang, 1998). Others believe that China has gone through the process of suburbanization but in a unique Chinese way (Zhou & Ma, 2000) and they even suggesting suburbanization to solve the crowded city center problem (Feng, 2001;Zhou, 1995).…”
Section: Suburbanization In Chinamentioning
confidence: 99%
“…Since the 1978 economic reforms (Note 1) in China, some metropolises, along with on-going urbanization, show a trend of suburbanization. Due to its prominent and inevitable impact on urban structure and social and economic development, this suburbanization has aroused wide concern among scholars, planners, and politicians, and also generated a rich body of literature (Feng, 2001;Fleisher, 2010;Silu Li & Tang, 1998;Wang & Zhou, 1999b;Wenyu Wu, 2010;T. Zhang, 2000b;Zhou, 1995;Zhou & Logan, 2008).The views on suburbanization of Chinese cities vary; however, most of them draw conclusions based on the western theories, especially those of the United States.…”
Section: Introductionmentioning
confidence: 99%
“…The key technologies include data fusion, data visualization and real-time vulnerability analysis, etc. What is more, some related work has been done by many research faculties [1,2] , who mainly focused on the active real time evaluation technologies and awareness technologies of network security situation, and the adopted methods include multi-sensor data fusion [10] , hierarchical analysis [11] , flow analysis [12] , etc.…”
Section: Related Workmentioning
confidence: 99%
“…But the research on it is still in its infancy, and there are few related work in this field [1,2] . Though some researches [3−5] have been done in the prediction of individual attacks and intrusions, in which some of the proposed methods could predict single or some complex intrusion attack behaviors to a certain extent, they still do not meet the demand of predicting the global security situation in a whole network.…”
Section: Introductionmentioning
confidence: 99%
“…Large numbers of network security products have been released, developing into a rising industry. It is anticipated that security technology based on network will become the major trend in respect of development of information security technology [111,112] . This chapter summarizes the current research situation and development trend of network security, including Public Key Infrastructure, Intrusion Detection System, network emergency response, network survivability and trusted network.…”
Section: Research and Development Of Network Securitymentioning
confidence: 99%