JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (11): 1-6.doi: 10.6040/j.issn.1671-9352.0.2016.404
WU Zhi-jun, SHEN Dan-dan
CLC Number:
[1] ICAO. Multidisciplinary meeting regarding global tracking[EB/OL].[2016-08-23].http://www.icao.int/meetings/GTM/Pages/default.aspx. [2] 国际民航组织. 全球航空安全计划:2014—2016[R].蒙特利尔:国际民航组织,2013年. [3] 国际电联. 实时监测包括黑匣子在内的飞行数据专家对话——云计算和大数据时代对国际标准的需求[EB/OL]. [2016-08-15]. http://www.itu.int/en/ITU-T/Workshops-and-Seminars/ccsg/expdial/Pages/default.aspx, 2014-7-30. [4] International Civil Aviation Organization. Second high-level safety conference 2015(HLSC 2015)planning for global aviation safety improvement[EB/OL].[2016-07-14]. http://www.icao.int/Meetings/HLSC2015/Documents/IP/ip006_en.pdf. [5] International Civil Aviation Organization. Global aeronautical distress & safety system(gadss)concept of operations made by the adhoc working group on aircraft tracking[EB/OL].[2016-08-05].http://www.icao.int/safety/globaltracking/Pages/Homepage.aspx. [6] 吴志军,王慧. 信息安全中Safety 与Security 的比较研究[J].信息网络安全,2013(8):84-86. WU Zhijun, WANG Hui. The difference between Security and Safety[J]. Netinfo Security, 2013(8):84-86. [7] 吴志军,胡涛涛. 空中交通管理信息安全研究[J]. 信息安全研究, 2015, 1(2):155-162. WU Zhijun, HU Taotao. Brief introduction to information security in air traffic management[J].Journal of Information Security Reserach, 2015, 1(2):155-162. [8] ICAO. Global tracking initiatives [EB/OL]. [2016-07-29].http://www.icao.int/safety/globaltracking/Pages/Homepage.aspx. [9] 吴志军,赵婷,雷缙. 广域信息管理SWIM信息安全技术标准研究[J]. 信息网络安全, 2014(1):1-4. WU Zhijun, ZHAO Ting, LEI Jin. Research on SWIM security technology standards[J]. Netinfo Security, 2014(1):1-4. |
[1] | DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110. |
[2] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[3] | DENG Song. Web data source selection for humanities information integration of tourism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 70-76. |
[4] | ZHANG Jing, XUE Leng, CUI Yi, RONG Hui, WANG Jian-ping. Modeling and evaluation of a dual chaotic encryption algorithm for WSN [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(03): 1-5. |
[5] | KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149. |
[6] | HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49. |
|