期刊文献+

国外网络电磁空间攻防技术发展 被引量:5

Development of Cyber-electromagnetic space attack and defense technology
在线阅读 下载PDF
导出
摘要 目前,美国、俄罗斯、德国、韩国等国均成立了网络电磁空间作战部队,保证己方网络电磁空间安全,同时具备杀伤别国网络电磁空间的能力,网电作战研究已经展开。尤其是最近,韩国和朝鲜之间的网络战,引发各国的强烈关注。在分析网络电磁空间概念与内涵的基础上,阐述了网络电磁空间与其他空间的关系,并分析了国外网络电磁空间技术的发展,为相关技术的研究提供参考。 Nowadays many countries, including America, Russia,Germany,Korea, have established Cyberelectromagnetic space force to insure their network security and damage other countries' network. Cyber-electromagnetic space combat has developed. The network combat between North-Korea and South-Korea, especially, have arose intense attention recently. Based on the analysis of Cyber-electromagnetic space concept, the relationship between Cyber-electromagnetic space and other spaces is explored. Moreover, the overseas development of Cyber-eleetromagnetic space is analyzed. Overall, this contribution provides references for the development of correlative technology.
出处 《航天电子对抗》 2014年第1期5-8,共4页 Aerospace Electronic Warfare
关键词 网络电磁空间 对抗技术 防御技术 Cyber-eleetromagnetic space countermeasures technology defense technology
  • 相关文献

参考文献11

二级参考文献34

  • 1诸葛建伟,叶志远,邹维.攻击技术分类研究[J].计算机工程,2005,31(21):121-123. 被引量:23
  • 2翁凌雯,侯德亭,牛忠霞,林竟羽,周旺.定向能武器及其应用[J].航天电子对抗,2005,21(5):14-16. 被引量:12
  • 3TECHNOLYTICS. Cyber Commander's Handbook[ Z].
  • 4THE WHITE HOUSE. Cyberspace Policy Review-Assuring a Trusted and Resilient Information and Communications Infrastructure[ R]. Washington D C, 2009.
  • 5CHAIRMAN OF THE JOINT CHIEFS OF STAFF. National Military Strategy for Cyberspace Operations (NMSCO) [R]. Washington D C, 2006.
  • 6AIR FORCE CYBER COMMAND. Air Force Cyber Command Strategic Vision[ R]. Barksdale AFB, LA:, 2008.
  • 7SHANE P COURVILLE. Air Force and the Cyberspace Mission Defending The Air Force's Computer Network in the Furture [ R]. 2007.
  • 8DARPA-BAA-08-43, National Cyber Range[ R]. 2008.
  • 9乔榕 编译.赛博空问的发展.国际电子战,2009,:25-25.
  • 10THE WHITE HOUSE. Cyberspace Policy Review-Assur-ing a Trusted and Resilient Information and Communications Infrastructure[ R]. Washington D C, 2009.

共引文献29

同被引文献38

  • 1周保太,张贤明,侯丹.美国网络电磁司令部已具备完全作战能力[J].国防,2011(1):70-70. 被引量:2
  • 2刘欣然.一种新型网络攻击分类体系[J].通信学报,2006,27(2):160-167. 被引量:14
  • 3滕哲,张永刚.美军电子战定义的演变与未来发展[J].舰船电子工程,2007,27(6):34-37. 被引量:7
  • 4Landwehr C E, Bull A R, McDermott J P, et al. A Taxonomy of Com- puter Program Security Flaws, with Examples[ J ]. ACM Computing Surveys,1994, 26(3) : 211 -254.
  • 5Weaver N, Paxson V, Stani' ord S, et al. A taxonomy of computer worms [ M ]. The First Workshop on Rapid Malcode ( WORM ) , Washington, DC, ACM Press. 2003 : 11 - 18.
  • 6Wood A D,Stankovic J A. A taxonomy for DeniM-of-Service Attacks in Wireless Sensor Networks [ M ]. Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, CRC Press, 2004.
  • 7John D Howard. An analysis of security incidents on the Internet 1989 - 1995 [ D ]. PhD thesis. Carnegie Mellon University, 1997.
  • 8Simpson G G. The principles of classification and a classification of mammals[J]. Bulletin of the American Museum of Natural Histo- ry,1945 (85) :1 -350.
  • 9Edward G. Amoroso, Fundamentals of Computer Security Techno- logy[M]. Prentice-Hall PTR,Upper Saddle River, NJ, 1994.
  • 10Bishop M. Vulnerabilities analysis[ C]. Second International Sym- posium on Recent Advances in Intrusion Detection, USA, 1999: 125 - 136.

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部