会议专题

The Study of Information Equipments Security under HPM Threats

With gradual deployment of HPM weapons, information equipments become vulnerable to HPM attack. This maybe result in catastrophe in the modern society someday. This paper presents an analysis of HPM attack mechanism, investigates possible current HPM weapons and potential targets, looks for the developing direction of HPM weapons and offers countermeasures for information equipments rival HPM. Reviewing this paper, we can find that: HPM technology is integrating with current operation systems, HPM weapons is Proliferating all over the world, it offer a dramatically new method of warfare and terrorist attack. Future war will be a competition of HPM weapons versus information equipments.

HPM weapons Information equipments information security countermeasure

Feng Yangbin Li Guolin Li Chunrong Zhang Ying

Naval Aeronautical Engineering Institute Yantai 264001, China

国际会议

2010 International Conference on Information Security and Artificial Intelligence(2010年信息安全与人工智能国际会议 ISAI 2010)

成都

英文

1309-1313

2010-12-17(万方平台首次上网日期,不代表论文的发表时间)