共查询到19条相似文献,搜索用时 72 毫秒
1.
北疆 《信息安全与通信保密》2001,(11)
美国“911”事件发生后,国际社会同声谴责恐怖主义。恐怖主义有多种形式,网络恐怖主义是近些年随着因特网的迅猛发展颇为引人注目的话题。2001年10月出版的《信息时代战争新著译丛》(陈伯江主编),大量篇幅谈到网络恐怖主义。以下内容摘自该译丛《下一次世界大战—计算机是武器,处处是前线》一书,作者为美国著名预测学家詹姆斯·亚当斯。本刊发表北疆摘编此书的一些论点,以供读者参考。 相似文献
2.
恐怖组织及其支持者使用网络作为信息传播工具,已成为网络恐怖主义的常态。随着国际上加大打击恐怖主义,网络恐怖主义转向暗网环境,给国际社会和国家安全带来新的风险。对此,应从网络技术、社会舆论、执法监管、国际合作4个方面提升对暗网恐怖主义的治理能力,应对网络恐怖主义的新威胁。 相似文献
3.
提出以射频光纤传输RFoG为下一代广播电视网络的观点,以睡眠激活放大器BCDA为基础的渐进建设下一代广播电视网络的方案。 相似文献
4.
王卫国 《电子产品维修与制作》2009,(20):44-47
伴随着信息技术发展的日新月异,很多单位为了迎合信息发展潮流,纷纷组建了属于自己单位的内部网络,单位员工在日常的办公过程中充分利用内网网络,进行共享资源传输、网络打印操作、访问内部站点等,这大大提高了员工们日常的办公效率。 相似文献
5.
6.
7.
8.
9.
10.
听说大唐生产网络信息安全产品,我有点诧异,也激起了我的兴趣。因为网络信息安全问题一直是国际竞争中的敏感问题,也是关系国家主权和国家安全的重要问题。尤其是近几年来,随着全球经济一体化进程的加快和Internet的迅猛发展,网络信息安全问题也显得越来越突出。为了解这方面的详细情况,大唐电信安排兴唐通信科技股份有限公司(其前身为数据通信科学技术研究所,属电信科学技术研究院管理)商务安全部副总经理杨方明接受了记者的采访。听完介绍之后,我才感觉到我的孤陋寡闻。 据介绍,从20世纪70年代开始,数据通信科学… 相似文献
11.
《Spectrum, IEEE》2002,39(9):35-36
The 11th day of September 2001 began with a tragedy beyond comprehension. It ended in a cacophony of outrage, blame, and urgent questions. How could so few terrorists create death and destruction on so massive a scale? How could US intelligence services have been caught so off guard? Can technology help prevent such attacks in the future, or at least respond to them more effectively if they do occur? A year after the strikes, answers to these questions are finally starting to take shape. The focus here is on the use of technology as a pillar of future counter-terrorism-from the advanced screening equipment now being installed at airports around the world to the robust emergency communications systems that will link workers and officials after any future calamities. Although the attacks prompted a broad array of technology initiatives, some of the most significant have been in intelligence, airport baggage screening, postal monitoring, biometric identification, radio and television broadcasting, hardened emergency communications, and personal security. 相似文献
12.
13.
《Spectrum, IEEE》2004,41(1)
Developers of antiterrorism tools have little to worry about, thanks to a provision of the U.S. Homeland Security Act. 相似文献
14.
《Spectrum, IEEE》2003,40(1):63-64
Political machinations notwithstanding, nuclear and biological terrorism still pose very real threats. This article is an abridged version of an interview with Richard L. Garwin. A longtime advisor to the US government on national security, and a respected public critic of technology policy, including, most recently, efforts to contain biological and nuclear terrorism. He outlines three types of nuclear threat and one biological threat. He outlines what needs to be done to prepare the public for nuclear and biological attacks. 相似文献
15.
16.
It is easy to argue that real signals must be bandlimited. It is also easy to argue that they cannot be so. This paper presents one possible resolution of this seeming paradox. A philosophical discussion of the role of mathematical models in the exact sciences is given and a new formulation of the 2 WT theorem is presented. The paper is a written version of the second Shannon Lecture given at the 1974 International Symposium on Information Theory. An appendix giving proof of the 2 WT theorem has been added. 相似文献
17.
18.
Circularity is an assumption that was originally introduced for the definition of the probability distribution function of complex normal vectors. However, this concept can be extended in various ways for nonnormal vectors. The first purpose of the paper is to introduce and compare some possible definitions of circularity. From these definitions, it is also possible to introduce the concept of circular signals and to study whether or not the spectral representation of stationary signals introduces circular components. Therefore, the relationships between circularity and stationarity are analyzed in detail. Finally, the theory of linear mean square estimation for complex signals exhibits some connections with circularity, and it is shown that without this assumption, the estimation theory must be reformulated 相似文献
19.
Studies the consistency properties of a method recently proposed for temporal or spatial frequency estimation from noisy data. The method in question is a MUSIC technique that makes use of a linear prediction algorithm to determine the signal subspace. It is shown that the signal subspace determined by the subject linear prediction-MUSIC (LP-MUSIC) algorithm can collapse in certain scenarios and. Hence, that the LP-MUSIC frequency estimates are not always consistent. The difficulties LP-MUSIC may encounter in some cases are illustrated by means of numerical examples 相似文献