Meaning and Vision of Mimic Computing and Mimic Security Defense
To facilitate high-performance and high-security computing, a technology system based on mimic computing(MC)and mimic security defense(MSD)was proposed. The proposed system focused on both the multi-dimensional reconfigurable and functional architecture and the dynamic varied mechanism. An overview...
Saved in:
Main Author: | Jiangxing Wu |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.001/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01) -
Research on distributed multi-access edge computing based on mimic defense theory
by: Hongyi ZHU, et al.
Published: (2019-09-01) -
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Method against process control-flow hijacking based on mimic defense
by: Chuanxing PAN, et al.
Published: (2021-01-01)