Research on distributed multi-access edge computing based on mimic defense theory
The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computi...
Saved in:
Main Authors: | Hongyi ZHU, Xiaoyuan LU, Yi LI |
---|---|
Format: | Article |
Language: | zho |
Published: |
China InfoCom Media Group
2019-09-01
|
Series: | 物联网学报 |
Subjects: | |
Online Access: | http://www.wlwxb.com.cn/zh/article/doi/10.11959/j.issn.2096-3750.2019.00122/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01)