Mining and utilization of network protocol’s stealth attack behavior
The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to imp...
Saved in:
Main Authors: | Yan-jing HU, Qing-qi PEI |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017244/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Clustering perception mining of network protocol’s stealth attack behavior
by: Yan-jing HU, et al.
Published: (2017-06-01) -
Design Method of Infrared Stealth Film Based on Deep Reinforcement Learning
by: Kunyuan Zhang, et al.
Published: (2025-01-01) -
A hyperspectral stealth material design method based on the composition and mixing spectral feature of desert soil
by: Xiaodong Ma, et al.
Published: (2025-01-01) -
Research progress in high-temperature infrared stealth materials
by: GUO Jincheng, et al.
Published: (2025-01-01) -
Stealth conflicts: Unpacking the causes of underreported and invisible wars
by: Konečná Lucie
Published: (2024-01-01)