Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (3): 4-18.doi: 10.11959/j.issn.2096-109x.2019021
• Papers • Previous Articles Next Articles
ZHANG Huanguo1,2(),DU Ruiying1,2
Revised:
2019-04-26
Online:
2019-06-15
Published:
2019-06-13
Supported by:
CLC Number:
ZHANG Huanguo,DU Ruiying. Introduction to cyberspace security discipline[J]. Chinese Journal of Network and Information Security, 2019, 5(3): 4-18.
[1] | 中国科学院信息领域战略研究组.《中国至2050年信息科技发展路线图》[M]. 北京: 科学出版社, 2009. |
Strategic research group in the field of information.Chinese academy of sciences. Information science & technology in China:a Roadmap to 2050[M]. Beijing: Science PressPress, 2009. | |
[2] | 李国杰 . 信息科学技术的长期发展趋势和我国的战略取向[J]. 中国科学:信息科学, 2010,40(1): 128-138. |
LI G J . The strategic orientation of 21 century development of science and technology information[J]. Scientia Sinica Informations, 2010,40(1): 128-138. | |
[3] | GIBSOB W . Burning chrome[M]. Harper Crollins UK, 1982. |
[4] | 张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164. |
ZHANG H G , HAN W B , LAI X J ,et al. Survey on cyberspace security[J]. Scientia Sincia Informations, 2016,46(2): 125-164. | |
[5] | ZHANG H G , HAN W B , LAI X J ,et al. Survey of Syberspace Security[J]. Science China:Information Sciences, 2015,58(11):43. |
[6] | 沈昌祥, 张焕国, 冯登国 ,等. 信息安全综述[J]. 中国科学(E 集:信息科学), 2007,37(2): 129-150. |
SHEN C X , ZHANG H G , FENG D G ,et al. Information security review[J]. Science in China(Series E:Information Sciences), 2007,37(2): 129-150. | |
[7] | SHEN C X , ZHANG H G , FENG D G ,et al. Survey of information security[J]. Science in China Series F, 2007,50(3): 273-298. |
[8] | 张焕国, 王后珍, 杨昌 ,等. 抗量子计算密码[M]. 北京: 清华大学出版社, 2015. |
ZHANG H G , WANG H Z , YANG C ,et al. Post quantum cryptography[M]. Beijing:Tsinghua University Press, 2015. | |
[9] | 信息安全类专业教学指导委员会信息安全专业规范项目组.信息安全专业指导性专业规范[M]. 北京: 清华大学出版社, 2014. |
Information security professional instruction committee information security professional speciation project group. Information security majority instructive specication[M]. Beijing: Tsinghua University PressPress, 2014. | |
[10] | 张焕国, 王丽娜, 杜瑞颖 ,等. 信息安全学科体系结构研究[J]. 武汉大学学报理学版, 2010,56: 614-620. |
ZHANG H G , WANG L N , DU R Y ,et al. Information security discipline system structure research[J]. Journal Wuhan University, 2010,56: 614-620. | |
[11] | 张焕国, 杜瑞颖, 傅建明 ,等. 论信息安全学科[J]. 网络安全, 2014,56: 619-620. |
ZHANG H G , WANG L N , DU R Y ,et al. Information security discipline system structure research[J]. Network Security, 2010,56: 614-620 | |
[12] | 张焕国, 赵波, 王骞 ,等. 可信云计算基础设施关键技术[M]. 北京: 机械工业出版社, 2019. |
ZHANG H G , ZHAO B , WANG Q ,et al. Trusted cloud computing infrastructure[M]. Beijing: China Machine PressPress, 2019. | |
[13] | SHANNON C E . A mathematical theory of communication[J]. Bell System Technical Journal, 1948,27(4): 623-656. |
[14] | SHANNON C E . Communication theory of secrecy system[J]. Bell System Technical Journal, 1949,28(4): 656-715. |
[15] | 张焕国, 唐明 . 密码学引论(第三版)[M]. 武汉: 武汉大学出版社, 2009. |
ZHANG H G , TANG M . Introduction to cryptography(third edition)[M]. Wuhan: Wuhan University PressPress, 2009. | |
[16] | 刘建伟, 王育民 . 网络安全??技术与实践(第三版)[M]. 北京: 清华大学出版社, 2017. |
LIU J W , WANG Y M . Network security technology and practice (third edition)[M]. Beijing: Tsinghua University PressPress, 2017. | |
[17] | 石文昌, 梁朝晖 . 信息系统安全概论[M]. 北京: 电子工业出版社, 2008. |
SHI W C , LIANG Z H . Introduction to information system security[M]. Beijing: Publishing House of Electronic IndustryPress, 2008. | |
[18] | 周学广, 任延珍 . 信息内容安全[M]. 武汉: 武汉大学出版社, 2012. |
ZHOU X G , REN Y Z . Information content security[M]. Wuhan: Wuhan University PressPress, 2012. | |
[19] | 覃中平, 张焕国, 乔秦宝 ,等. 信息安全数学基础[M]. 北京: 清华大学出版社, 2006. |
QIN Z P , ZHANG H G , QIAO Q B ,et al. Mathematical basis of information security[M]. Beijing: Tsinghua University PressPress, 2006. | |
[20] | 张维迎 . 博弈论与信息经济学[M]. 上海: 上海人民出版社, 2004. |
ZHANG W Y . Game theory and information economics[M]. Shanghai: Shanghai People's Publishing housePress, 2004. | |
[21] | 王育民, 李晖, 梁传甲 . 信息论与编码理论[M]. 北京: 高等教育出版社, 2005. |
WANG Y M , LI H , LIANG C J . Information theory and coding theory[M]. Beijing: Higher Education PressPress, 2005. | |
[22] | 王育民, 张彤, 黄继武 . 信息隐藏──理论与技术[M]. 北京: 清华大学出版社, 2006. |
WANGY M , ZHANG T , HUAN J W . Information hiding ──theory and technology[M]. Beijing: Tsinghua University PressPress, 2006. | |
[23] | WIENER N . Cybernetics or control and communication in the animal and the machine[M]. New York: WileyPress, 1948. |
[24] | 维纳 . 控制论(或关于在动物和机器中控制和通信的科学)(第二版)[M]. 北京: 科学出版社, 2009. |
WIENER .Cybernetics (or the science of control and communication in animals and machines) (2nd edition)[M]. Beijing: Science PressPress, 2009. | |
[25] | 李喜先 . 工程系统论[M]. 北京: 科学出版社, 2007. |
LI X X . Engineering systems theory[M]. Beijing: Science PressPress, 2007. | |
[26] | 杨东屏 . 可计算理论[M]. 北京: 科学出版社, 1999. |
YANG D P . Computability theory[M]. Beijing: Science PressPress, 1999. | |
[27] | 陈志东, 徐宗本 . 计算数学-计算复杂性理论与 NPC/NP 难问题求解[M]. 北京: 科学出版社, 2001. |
CHEN Z D , XU Z B . Computational mathematics-computational complexity theory and solving NPC/NP hard problems[M]. Beijing: Science PressPress, 2001. | |
[28] | 周锡龄 . 计算机数据安全原理[M]. 上海: 上海交通大学出版社, 1987. |
ZHOU X L . Principles of computer data security[M]. Shanghai: Shanghai Jiaotong University PressPress, 1987. | |
[29] | 张伟刚 . 科研方法论[M]. 天津: 天津大学出版社, 2006. |
ZHANG W G . Research methodology[M]. Tianjin: Tianjin University PressPress, 2006. | |
[30] | 金观涛 . 控制论与科学方法论[M]. 北京: 新星出版社, 2005. |
JIN G T . Cybernetics and scientific methodology[M]. Beijing: Xinxing PressPress, 2005. |
[1] | Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU. Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 15-38. |
[2] | Guyue LI, Aiqun HU. Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty [J]. Chinese Journal of Network and Information Security, 2022, 8(2): 183-189. |
[3] | Jie QIU, Rui HAN, Zhifeng WEI, Zhiyang WANG. Research of public infrastructure system and security policy in cyberspace [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 56-67. |
[4] | Fu XIAO, Haiping HUANG, Sujun HU, Lijuan SUN. Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province [J]. Chinese Journal of Network and Information Security, 2021, 7(2): 1-9. |
[5] | Fenghua LI,Hui LI. Construction of academic discipline of science and engineering and orientation for their ranking under the new situation [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 1-10. |
[6] | XU Tongge,LIU Lianzhong,LIU Jianwei,MAO Jian. Preliminary study on the cultivation mode of innovative talents in the first-class cyber security college [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 19-24. |
[7] | HU Aiqun,LI Guyue,PENG Linning,LI Tao. Exploration of teaching method incorporating ideological elements for the cutting-edge technology of cyberspace security [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 54-66. |
[8] | CHEN Kai,FU Cai,ZOU Deqing,QIANG Weizhong,CUI Yongquan,HAN Lansheng. Construction of cyberspace security course system of comprehensive practice and graded customs clearance [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 67-74. |
[9] | QIN Yuhai,LIU Luyuan,GAO Haohang,LIU Shengqiao,DONG Han. Innovative professional skills competition to create a police practice talents [J]. Chinese Journal of Network and Information Security, 2019, 5(3): 75-80. |
[10] | Qiang QU, Hongtao YU, Ruiyang HUANG. Spammer detection technology of social network based on graph convolution network [J]. Chinese Journal of Network and Information Security, 2018, 4(5): 39-46. |
[11] | Quan REN,Lei HE,Jiangxing WU. Analysis of different anti-interference system models based on discrete time Markov chain [J]. Chinese Journal of Network and Information Security, 2018, 4(4): 30-37. |
[12] | Binxing FANG. Define cyberspace security [J]. Chinese Journal of Network and Information Security, 2018, 4(1): 1-5. |
[13] | Ning WU. Reflections on China’s participation in the global governance of cyberspace [J]. Chinese Journal of Network and Information Security, 2017, 3(7): 1-6. |
[14] | De-yu YUAN,Xiao-juan WANG,Jian-chao WAN. Influence of Internet plus on cyberspace security and the technology development trend in Internet plus era [J]. Chinese Journal of Network and Information Security, 2017, 3(5): 1-9. |
[15] | Fan ZHAO,Xiang-yang LUO,Fen-lin LIU. Research on cyberspace surveying and mapping technology [J]. Chinese Journal of Network and Information Security, 2016, 2(9): 1-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|