Research on distributed multi-access edge computing based on mimic defense theory

The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computi...

Full description

Saved in:
Bibliographic Details
Main Authors: Hongyi ZHU, Xiaoyuan LU, Yi LI
Format: Article
Language:zho
Published: China InfoCom Media Group 2019-09-01
Series:物联网学报
Subjects:
Online Access:http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/
Tags: Add Tag
No Tags, Be the first to tag this record!