Heterogeneous redundancies scheduling algorithm for mimic security defense
The scheduling of heterogeneous redundancies is one of the key lines of mimic security defense,but the existing scheduling strategies are lack of consideration about the similarity among redundancies and the scheduling algorithms are incomprehensive.A new scheduling algorithm called random seed &amp...
Saved in:
Main Authors: | Qinrang LIU, Senjie LIN, Zeyu GU |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-07-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018124/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Heterogeneous executor scheduling algorithm for mimic cloud service
by: Liming PU, et al.
Published: (2020-03-01) -
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
by: Ting WU, et al.
Published: (2021-03-01)