Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were re...
Saved in:
Main Authors: | Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022018 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01) -
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
by: Chuanhuang LI, et al.
Published: (2022-04-01)