Accès libre

Study on Japan’s Cybersecurity Strategy and Regional Cybersecurity Construction in the Face of Global Competition

  
04 oct. 2024
À propos de cet article

Citez
Télécharger la couverture

Yamada, R. (2024). Impact of Cybersecurity Regulations on Corporate Compliance Practices in Japan. International Journal of Law and Policy, 9(2), 28-38. Search in Google Scholar

Akimoto, D. (2021). Japan’s Multi-Domain Defense Force: The Space, Cyber, and Electromagnetic Domains. Institute for Security & Development Policy, Stockholm, Sweden. Search in Google Scholar

Kim, N., & Lee, S. (2021). Cybersecurity breach and crisis response: An analysis of organizations’ official statements in the United States and South Korea. International Journal of Business Communication, 58(4), 560-581. Search in Google Scholar

Beuran, R., Tang, D., Pham, C., Chinen, K. I., Tan, Y., & Shinoda, Y. (2018). Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security, 78, 43-59. Search in Google Scholar

Harold, S. W., Nakagawa, Y., Fukuda, J., Davis, J. A., Kono, K., Cheng, D., & Suzuki, K. (2017). The US-Japan alliance and deterring gray zone coercion in the maritime, cyber, and space domains. Santa Monica: Rand Corporation. Search in Google Scholar

Mohamed Mizan, N. S., Ma’arif, M. Y., Mohd Satar, N. S., & Shahar, S. M. (2019). CNDS-cybersecurity: issues and challenges in ASEAN countries. International Journal of Advanced Trends in Computer Science and Engineering, 8(1.4). Search in Google Scholar

Teoh, C. S., & Mahmood, A. K. (2017, July). National cyber security strategies for digital economy. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. Search in Google Scholar

Beuran, R., Pham, C., Tang, D., Chinen, K. I., Tan, Y., & Shinoda, Y. (2018). Cybersecurity education and training support system: CyRIS. IEICE TRANSACTIONS on Information and Systems, 101(3), 740-749. Search in Google Scholar

Matsuda, W., Fujimoto, M., Aoyama, T., & Mitsunaga, T. (2019, November). Cyber security risk assessment on industry 4.0 using ics testbed with ai and cloud. In 2019 IEEE conference on application, information and network security (AINS) (pp. 54-59). IEEE. Search in Google Scholar

Kim, E., & Beuran, R. (2018, October). On designing a cybersecurity educational program for higher education. In Proceedings of the 10th International Conference on Education Technology and Computers (pp. 195-200). Search in Google Scholar

Vosse, W. (2023). A conceptional broadening of the security order in the Indo-Pacific: The role of EU-Japan cooperation in ICT and cybersecurity. In Alliances in Asia and Europe (pp. 163-184). Routledge. Search in Google Scholar

Osawa, J. (2017). The escalation of state sponsored cyberattack and national cyber security affairs: Is strategic cyber deterrence the key to solving the problem?. Asia-Pacific Review, 24(2), 113-131. Search in Google Scholar

Panneerselvam, P., & Mohan, V. (2023). India-Japan Emerging Cooperation in Cybersecurity. In Seventy Years of India-Japan Diplomatic Relations (pp. 140-153). Routledge. Search in Google Scholar

Douha, N. G. Y. R., Renaud, K., Taenaka, Y., & Kadobayashi, Y. (2023). Smart home cybersecurity awareness and behavioral incentives. Information & Computer Security, 31(5), 545-575. Search in Google Scholar

Kallender, P., & Hughes, C. W. (2017). Japan’s emerging trajectory as a ‘cyber power’: from securitization to militarization of cyberspace. Journal of Strategic Studies, 40(1-2), 118-145. Search in Google Scholar

Jun Osawa.(2023).Direction of Japan’s New Cybersecurity Policy.Asia-Pacific Review(3),63-78. Search in Google Scholar

Dahanayaka Thilini,Ginige Yasod,Huang Yi,Jourjon Guillaume & Seneviratne Suranga.(2023).Robust open-set classification for encrypted traffic fingerprinting.Computer Networks Search in Google Scholar

Miyamoto Henrique K.,Meneghetti Fábio C. C. & Costa Sueli I. R..(2022).The Fisher–Rao loss for learning under label noise.Information Geometry(1),107-126. Search in Google Scholar

Niu Lu,Li Zhenping & Li Shaobo.(2024).MMD Fence GAN Unsupervised Anomaly Detection Model Based on Maximum Mean Discrepancy.International Journal of Cognitive Informatics and Natural Intelligence (IJCINI)(1),1-13. Search in Google Scholar

Nihat Daldal,Kemal Polat & Yanhui Guo.(2019).Classification of multi-carrier digital modulation signals using NCM clustering based feature-weighting method.Computers in Industry45-58. Search in Google Scholar