[1] |
The White House. Executive Order on Improving the Nation's Cybersecurity[EB/OL]. (2021-05-12)[2022-07-20]. http://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/ accessed 10 June 2021.
|
[2] |
National Internet Emergency Response Center (CNCERT). Overview of China's Internet Network Security Situation in 2020[EB/OL]. (2021-05-26)[2022-07-20]. http://www.cac.gov.cn/2021-05/26/c_1623610314656045.htm.
|
|
国家互联网应急中心(CNCERT). 2020年我国互联网网络安全态势综述[EB/OL]. (2021-05-26)[2022-07-20]. http://www.cac.gov.cn/2021-05/26/c_1623610314656045.htm.
|
[3] |
DUVENAGE P, VON Solms. Cyber Counter Intelligence: Back to the Future[J]. Journal of Information Warfare, 2014, 13(4): 42-56.
|
[4] |
JAQUIRE V. A Framework for a Cyber Counter Intelligence Maturity Model[D]. Johannesburg: University of Johannesburg, 2018.
|
[5] |
QIN Tiehui, LUO Chao. Construction of Enterprise Counter Competitive Intelligence System Based on Information Security[J]. Information Science, 2006, 24 (10): 1441-1445.
|
|
秦铁辉, 罗超. 基于信息安全的企业反竞争情报体系构建[J]. 情报科学, 2006, 24(10):1441-1445.
|
[6] |
ZHU Lilong. Study on the Mechanism of Supply Chain Information Leakage from the Perspective of Counter Competitive Intelligence Technology System[J]. Modern Information, 2017, 37 (3): 28-33.
|
|
朱礼龙. 反竞争情报技术系统视角的供应链情报泄密机理的研究[J]. 现代情报, 2017, 37(3): 28-33.
|
[7] |
ZHOU Haiwei, WANG Hongliang, HAO Yunjian. Construction of Competitive Intelligence Security Model for SMES under Cloud Computing Environment[J]. Library Theory & Practice, 2013(11): 44-47.
|
|
周海炜, 王洪亮, 郝云剑. 云计算环境下中小企业竞争情报安全模型构建[J]. 图书馆理论与实践, 2013(11): 44-47.
|
[8] |
GAO Jinhu. Integration of Counter Intelligence and Security Work — Based on the Analysis of the Strategic Plan of the National Counter Intelligence and Security Center[J]. Confidential Work, 2021(1): 65-68.
|
|
高金虎. 反情报工作与安全工作一体化——基于美国《国家反情报与安全中心战略计划》的分析[J]. 保密工作, 2021(1): 65-68.
|
[9] |
YU Jie, LI Lin. Security Protection of Critical Information Infrastructure Based on Intelligence Perception[J]. Information Theory & Practice, 2019, 42(4): 1-5.
|
|
于洁, 栗琳. 基于情报感知的关键信息基础设施安全保护[J]. 情报理论与实践, 2019, 42(4): 1-5.
|
[10] |
Lin Xin, Liu Yuejin, Yang Jianying. Some Thoughts on the National Intelligence Law of People's Republic of China[J]. Journal of Intelligence, 2022, 41(1): 24-30.
|
|
林鑫, 刘跃进, 杨建英. 关于《中华人民共和国国家情报法》的若干思考[J]. 情报杂志, 2022, 41(1): 24-30.
|
[11] |
LI Yiyu. Mechanism Theory: Meaning, Principle and Design[J]. Journal of Sichuan Institute of Engineering And Technology, 2006(4): 56-59.
|
|
李以渝. 机制论:涵义、原理与设计[J]. 四川工程职业技术学院学报, 2006 (4): 56-59.
|
[12] |
LI Ruiguang, SHEN Meng, YU Hao, et al. A Survey on Cyberspace Search Engines[C]// Springer. China Cyber Security Annual Conference. Berlin:Springer, 2020: 206-214.
|
[13] |
HULNICK A S. What's Wrong with the Intelligence Cycle[J]. Intelligence and National Security, 2006, 21(6): 959-979.
|
[14] |
JELEN G F. The Defensive Disciplines of Intelligence[J]. International Journal of Intelligence and Counter Intelligence, 1991, 5(4): 381-399.
|
[15] |
RIEHLE K P. A Counter Intelligence Analysis Typology[J]. American Intelligence Journal, 2015, 32(1): 55-60.
|
[16] |
PRUNCKUN H. Counter Intelligence Theory and Practice[M]. Maryland: Rowman & Littlefield Publishing Group, 2019.
|
[17] |
HAO Min. The U. S. Intelligence Community for China's Three Big Trends[EB/OL]. (2021-10-12)[2022-07-20]. https://m.thepaper.cn/baijiahao_14864237.
|
|
郝敏. 美国情报界针对中国的三大动向[EB/OL]. (2021-10-12)[2022-07-20]. https://m.thepaper.cn/baijiahao_14864237.
|
[18] |
Office of Director of National Intelligence. Intelligence Community Information Environment(ICIE)Data Strategy[EB/OL]. (2021-04-22)[2022-07-20]. https://www.dni.gov/files/documents/CIO/Data-Strategy_2017-2021_Final.pdf.
|
[19] |
SCOTT S. Deceive the Enemy with Emerging Technologies[EB/OL]. (2021-02-04)[2022-07-20]. https://www.rand.org/pubs/external_publications/EP68494.html.
|
[20] |
SITHOLE T, DUVENAGE P, VON S. Eating the Elephant-A Structural Outline of Cyber Counter Intelligence Awareness and Training[C]// Stellenbosch University. 14th International Conference on Cyber Warfare and Security. Stellenbosch: Stellenbosch University, 2019: 396-404.
|
[21] |
LIU Zhiwei, ZHOU Qingshan. Preliminary Study on Defense Science and Technology Information Working Mode Based on Qian Xuesen's Dacheng Wisdom[J]. Information Theory & Practice, 2021, 44(9): 55-60.
|
|
刘芝玮, 周庆山. 基于钱学森大成智慧思想的国防科技情报工作模式初探[J]. 情报理论与实践, 2021, 44(9): 55-60.
|