-
1
Design, implementation and formal verification of BGP proxy for mimic router
Published 2023-03-01Subjects: “…mimic defense…”
Get full text
Article -
2
-
3
Mimic defense authentication method for physical access control
Published 2020-06-01Subjects: Get full text
Article -
4
A differential feedback scheduling decision algorithm based on mimic defense
Published 2020-05-01Subjects: “…mimic defense…”
Get full text
Article -
5
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Published 2021-03-01Subjects: “…mimic defense…”
Get full text
Article -
6
Timeout threshold estimation algorithm in mimic multiple executors architecture
Published 2018-10-01Subjects: “…mimic defense…”
Get full text
Article -
7
Method of quantitative assessment for diversified software system
Published 2020-03-01Subjects: “…mimic defense…”
Get full text
Article -
8
Network function heterogeneous redundancy deployment method based on immune algorithm
Published 2021-02-01Subjects: Get full text
Article -
9
Research progress of mimic multi-execution scheduling algorithm
Published 2021-05-01Subjects: “…mimic defense…”
Get full text
Article -
10
Endogenous security architecture of Ethernet switch based on mimic defense
Published 2020-05-01Subjects: Get full text
Article -
11
Method against process control-flow hijacking based on mimic defense
Published 2021-01-01Subjects: Get full text
Article -
12
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01Subjects: “…mimic defense…”
Get full text
Article -
13
Modeling of the mimic defense based on heterogeneous redundancy
Published 2020-05-01Subjects: Get full text
Article -
14
Evaluation of mimic defense strategy based on M-FlipIt game model
Published 2020-07-01Subjects: “…cyberspace mimic defense…”
Get full text
Article -
15
Design and implementation of adaptive mimic voting device oriented to persistent connection
Published 2022-06-01Subjects: “…mimic defense…”
Get full text
Article -
16
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
Published 2022-04-01Subjects: Get full text
Article -
17
New thoughts on security technologies for space-ground integration information network
Published 2017-12-01Subjects: Get full text
Article -
18
Executive dynamic scheduling algorithm based on high-order heterogeneity
Published 2022-03-01Subjects: “…mimic defense…”
Get full text
Article -
19
Analysis of different anti-interference system models based on discrete time Markov chain
Published 2018-04-01Subjects: Get full text
Article -
20
Research on mimic decision method based on deep learning
Published 2024-02-01Subjects: “…mimic defense…”
Get full text
Article