A comprehensive evaluation of diversity systems based on mimic defense

被引:0
|
作者
Qing Tong
Yunfei Guo
机构
[1] National Digital Switching System Engineering and Technological R&D Center,
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A comprehensive evaluation of diversity systems based on mimic defense
    Qing TONG
    Yunfei GUO
    Science China(Information Sciences), 2021, 64 (12) : 258 - 259
  • [2] A comprehensive evaluation of diversity systems based on mimic defense
    Tong, Qing
    Guo, Yunfei
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (12)
  • [3] Evaluation of mimic defense strategy based on M-FlipIt game model
    Ding S.
    Qi N.
    Guo Y.
    1600, Editorial Board of Journal on Communications (41): : 186 - 194
  • [4] A Comprehensive Quality of Service Evaluation in Mimic System
    Zhao, Yufeng
    Wang, Junchao
    Zhang, Jiexin
    PROCEEDINGS OF 2019 IEEE 8TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC 2019), 2019, : 986 - 991
  • [5] Heterogeneous Executors Scheduling Algorithm for Mimic Defense Systems
    Wu, Zhaoqi
    Wei, Jin
    2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 279 - 284
  • [6] A DNS Architecture Based on Mimic Security Defense
    Wang Z.-P.
    Hu H.-C.
    Cheng G.-Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (11): : 2705 - 2714
  • [7] Analysis of Mimic Defense and Defense Capabilities based on Four-Executor
    OuYang, Ling
    Song, Ke
    Lu, XiangYang
    Li, XiaoQuan
    2018 INTERNATIONAL CONFERENCE ON ADVANCED MECHATRONIC SYSTEMS (ICAMECHS), 2018, : 137 - 142
  • [8] A Comprehensive Survey of TPM for Defense Systems
    Ryu, Cheol
    Lee, Jae-Ho
    Kim, Do-Hyung
    Lee, Hyung-Seok
    Kim, Young-Sae
    Han, Jin-Hee
    Kim, Jeong-nyeo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2024, 18 (07): : 1953 - 1967
  • [9] A Diversity Defense for Cloud Computing Systems
    Pasupulati, Renuka Prasad
    Shropshire, Jordan
    SOUTHEASTCON 2016, 2016,
  • [10] A New Method of Image Encryption Based on Mimic Defense
    Fan, Yongwen
    Zhu, Weijun
    Ban, Shaohuan
    Wang, Junfeng
    2018 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS (ICCCAS 2018), 2018, : 418 - 421