This work is licensed under the Creative Commons Attribution 4.0 International License.
Wu, J. (2022). Cyberspace endogenous safety and security. Engineering, 15, 179-185.WuJ. (2022). Cyberspace endogenous safety and security. Engineering, 15, 179-185.Search in Google Scholar
Liu, X., Wang, H., & Li, C. (2024). A Review of Endogenous Security Research. Electronics, 13(11), 2185.LiuX.WangH.LiC. (2024). A Review of Endogenous Security Research. Electronics, 13(11), 2185.Search in Google Scholar
Jin, L., Hu, X., Lou, Y., Zhong, Z., Sun, X., Wang, H., & Wu, J. (2021). Introduction to wireless endogenous security and safety: Problems, attributes, structures and functions. China Communications, 18(9), 88-99.JinL.HuX.LouY.ZhongZ.SunX.WangH.WuJ. (2021). Introduction to wireless endogenous security and safety: Problems, attributes, structures and functions. China Communications, 18(9), 88-99.Search in Google Scholar
Zhiwen, J., Tao, L., & Aiqun, H. (2020, December). Research on endogenous security methods of embedded system. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 1946-1950). IEEE.ZhiwenJ.TaoL.AiqunH. (2020, December). Research on endogenous security methods of embedded system. In 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (pp. 1946-1950). IEEE.Search in Google Scholar
Wu, J. (2024). The Principle and Structure of Cyberspace Endogenous Security and Safety. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 111-202). Singapore: Springer Nature Singapore.WuJ. (2024). The Principle and Structure of Cyberspace Endogenous Security and Safety. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 111-202). Singapore: Springer Nature Singapore.Search in Google Scholar
Norman, T. L. (2011). Integrated security systems design: concepts, specifications, and implementation. Elsevier.NormanT. L. (2011). Integrated security systems design: concepts, specifications, and implementation. Elsevier.Search in Google Scholar
Sahu, D. R., & Tomar, D. S. (2017). Analysis of web application code vulnerabilities using secure coding standards. Arabian Journal for Science and Engineering, 42, 885-895.SahuD. R.TomarD. S. (2017). Analysis of web application code vulnerabilities using secure coding standards. Arabian Journal for Science and Engineering, 42, 885-895.Search in Google Scholar
Gasiba, T. E., Lechner, U., Pinto-Albuquerque, M., & Fernandez, D. M. (2020, December). Awareness of Secure Coding Guidelines in the Industry-A first data analysis. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 345-352). IEEE.GasibaT. E.LechnerU.Pinto-AlbuquerqueM.FernandezD. M. (2020, December). Awareness of Secure Coding Guidelines in the Industry-A first data analysis. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (pp. 345-352). IEEE.Search in Google Scholar
Vincoli, J. W. (2024). Basic guide to system safety. John Wiley & Sons.VincoliJ. W. (2024). Basic guide to system safety. John Wiley & Sons.Search in Google Scholar
Wu, J. (2024). Cyberspace Endogenous Security and Safety Problems. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 1-73). Singapore: Springer Nature Singapore.WuJ. (2024). Cyberspace Endogenous Security and Safety Problems. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 1-73). Singapore: Springer Nature Singapore.Search in Google Scholar
Yu, F., Wei, Q., Geng, Y., & Wang, Y. (2021, June). Research on key technology of industrial network boundary protection based on endogenous security. In 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (Vol. 4, pp. 112-121). IEEE.YuF.WeiQ.GengY.WangY. (2021, June). Research on key technology of industrial network boundary protection based on endogenous security. In 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) (Vol. 4, pp. 112-121). IEEE.Search in Google Scholar
Wu, J. (2024). Cyberspace Endogenous Security and Safety Defense Vision. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 75-109). Singapore: Springer Nature Singapore.WuJ. (2024). Cyberspace Endogenous Security and Safety Defense Vision. In Cyber Resilience System Engineering Empowered by Endogenous Security and Safety (pp. 75-109). Singapore: Springer Nature Singapore.Search in Google Scholar
Meng, H., Ou, Q., Jing, Y., Song, J., Qiao, C., & Zhang, J. (2022). Research on the Endogenous Security Technology of Polymorphic Smart Network. In Proceedings of the 11th International Conference on Computer Engineering and Networks (pp. 813-822). Springer Singapore.MengH.OuQ.JingY.SongJ.QiaoC.ZhangJ. (2022). Research on the Endogenous Security Technology of Polymorphic Smart Network. In Proceedings of the 11th International Conference on Computer Engineering and Networks (pp. 813-822). Springer Singapore.Search in Google Scholar
Guo, W., Hang, F., Xie, L., Lv, Y., & Chen, H. (2021, November). Endogenous Security Protection Method Suitable for the Full Life Cycle of Docker. In ISCTT 2021; 6th International Conference on Information Science, Computer Technology and Transportation (pp. 1-4). VDE.GuoW.HangF.XieL.LvY.ChenH. (2021, November). Endogenous Security Protection Method Suitable for the Full Life Cycle of Docker. In ISCTT 2021; 6th International Conference on Information Science, Computer Technology and Transportation (pp. 1-4). VDE.Search in Google Scholar
Ji, X., Wu, J., Jin, L., Huang, K., Chen, Y., Sun, X., … & Yang, J. (2022). Discussion on a new paradigm of endogenous security towards 6G networks. Frontiers of Information Technology & Electronic Engineering, 23(10), 1421-1450.JiX.WuJ.JinL.HuangK.ChenY.SunX.YangJ. (2022). Discussion on a new paradigm of endogenous security towards 6G networks. Frontiers of Information Technology & Electronic Engineering, 23(10), 1421-1450.Search in Google Scholar
Hu, H., Ling, Z., Wang, Y., Li, Q., Jin, L., & Wu, J. (2021). Advanced computing and endogenous security. China Communications, 18(8), iii-v.HuH.LingZ.WangY.LiQ.JinL.WuJ. (2021). Advanced computing and endogenous security. China Communications, 18(8), iii-v.Search in Google Scholar
Cai, N., & He, G. (2024). Multi-cloud resource scheduling intelligent system with endogenous security. Electronic Research Archive, 32(2), 1380-1405.CaiN.HeG. (2024). Multi-cloud resource scheduling intelligent system with endogenous security. Electronic Research Archive, 32(2), 1380-1405.Search in Google Scholar
Yao Zhong Min, Liu Xi Guang & Wang Ya Zhen. (2011). Design of Building PV Power Station Data Transmission and Monitoring System Based on ZigBee. Applied Mechanics and Materials(121-126), 1259-1263.MinYao ZhongGuangLiu XiZhenWang Ya (2011). Design of Building PV Power Station Data Transmission and Monitoring System Based on ZigBee. Applied Mechanics and Materials(121-126), 1259-1263.Search in Google Scholar
Ruchi Agrawal, Saurabh Singhal & Ashish Sharma. (2024). Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Computing(6),8015-8030.AgrawalRuchiSinghalSaurabhSharmaAshish (2024). Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. Cluster Computing(6),8015-8030.Search in Google Scholar
Yuanliang Fan, Zewen Li, Xinghua Huang, Dongtao Luo, Jianli Lin, Weiming Chen… & Ling Yang. (2024). An Energy Management System for Distributed Energy Storage System Considering Time-Varying Linear Resistance. Electronics(21),4327-4327.FanYuanliangLiZewenHuangXinghuaLuoDongtaoLinJianliChenWeimingYangLing (2024). An Energy Management System for Distributed Energy Storage System Considering Time-Varying Linear Resistance. Electronics(21),4327-4327.Search in Google Scholar
Zhao Xuesong, Fan Xiaofei & Hou Jing. (2022). Security architecture and technology of power Internet of things for energy interconnection. Journal of Physics: Conference Series(1).XuesongZhaoXiaofeiFanJingHou (2022). Security architecture and technology of power Internet of things for energy interconnection. Journal of Physics: Conference Series(1).Search in Google Scholar
Xu Lei & Zhou Haocheng. (2022). An Automated Data Desensitisation System Based on the Middle Platform. Security and Communication Networks.LeiXuHaochengZhou (2022). An Automated Data Desensitisation System Based on the Middle Platform. Security and Communication Networks.Search in Google Scholar