2020
DOI: 10.14801/jkiit.2020.18.4.129
|View full text |Cite
|
Sign up to set email alerts
|

Smart City Cyber Security Based on Information Security Industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The construction of a smart city is based on new information technologies such as big data, Internet of Things and mobile Internet as the core application, which reflects the intelligence and smart of the city. Smart cities are different from traditional cities [ 18 ].…”
Section: The Impact Of Smart City Information Technology On Accountin...mentioning
confidence: 99%
“…The construction of a smart city is based on new information technologies such as big data, Internet of Things and mobile Internet as the core application, which reflects the intelligence and smart of the city. Smart cities are different from traditional cities [ 18 ].…”
Section: The Impact Of Smart City Information Technology On Accountin...mentioning
confidence: 99%
“…. , w m } T be the individual attribute weights, w j ≥ 0, n j=1 w j = 1, and the attribute values under different scenarios are a ij , then the multi-attribute decision matrix formed is shown in Equation (1).…”
Section: Grey Correlation Analysis Combined With Bp Neural Network Al...mentioning
confidence: 99%
“…Since the information age, with the rapid development of smart city construction in China, the issue of network information security in smart cities has surfaced as a core issue [1]. To ensure the healthy and sustainable development of smart cities, it is necessary to comprehensively strengthen the construction of information security assurance system, enhance the top-level design of structured and systematic information security, and independently conduct research and equipment development of safe and controllable key technologies to meet their actual information security needs [2].…”
Section: Introductionmentioning
confidence: 99%