-
1
-
2
Les rapports Europe-Maghreb en matière de sécurité et de défense
Published 2008-10-01Get full text
Article -
3
-
4
Site selection of equipment and military equipment based on natural factors Case Study: Oman Sea Shores
Published 2021-06-01Get full text
Article -
5
Improve the robustness of algorithm under adversarial environment by moving target defense
Published 2020-08-01Get full text
Article -
6
A differential feedback scheduling decision algorithm based on mimic defense
Published 2020-05-01Get full text
Article -
7
Survey on cyber deception
Published 2017-12-01“…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
Get full text
Article -
8
-
9
COMPUTER MODELING OF STRAINS ON PHASE BOUNDARIES IN DUCTILE CAST IRON AT HOT EXTRUSION
Published 2017-03-01Get full text
Article -
10
The uniqueness of limit cycles in a predator-prey system with Ivlev-type group defense
Published 2024-11-01Get full text
Article -
11
-
12
-
13
System of subjects ensuring national security and defence of Ukraine
Published 2020-06-01Get full text
Article -
14
Associations between skeletal muscle phenotype, positional role, and on‐ice performance in elite male ice hockey players
Published 2024-11-01“…Sixteen players (10 forwards, six defensemen) participated in a game with activity tracking. …”
Get full text
Article -
15
A Comparative Study of Mulla Sadra and Plantinga’s Views on the Issue of Evil
Published 2024-05-01“…He believes that a real justification for evils cannot be found, thus he tries to prove the possibility or probability of rational justification by God for the existence of evils.Plantinga’s solutions to the issue of evil include explaining possible worlds and free will defense.In some of the new terms that form the basis of Plantinga’s arguments, there are fallacies or errors, which include pervasive evil and the critique of the realization of possible worlds and not their actuality.Similarities between Mulla Sadra’s and Plantinga’s views include belief in the existence of God, the absolute and unlimited knowledge of God, and belief in God’s absolute power and benevolence.Differences between Mulla Sadra’s and Plantinga’s views include the difference in the type of approach and the predominance of a logical view of the issue of evil by Plantinga as opposed to Mulla Sadra, the inherent nature of sin and pervasive evil, and Mulla Sadra’s defense of the theory of divine justice and Plantinga’s lack of defense in this regard. …”
Get full text
Article -
16
Analysis of cyberspace security based on game theory
Published 2015-12-01“…Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.…”
Get full text
Article -
17
Optimal strategy selection approach of moving target defense based on Markov time game
Published 2020-01-01“…For the problem that the existed game model was challenging to model the dynamic continuous characteristics of network attack and defense confrontation effectively,a method based on Markov time game was proposed to select the optimal strategy for moving target defense.Based on the analysis of the attack and defense confrontation process of moving targets,the set of moving target attack and defense strategies was constructed.The dynamics of the single-stage moving target defense process was described by time game.The randomness of multi-stage moving target defense state transformation was described by Markov decision process.At the same time,by abstracting the use of resource vulnerability by attack-defense participants as the alternation of the control of the attack surface,the versatility of the game model was effectively guaranteed.On this basis,the existence of equilibrium was analyzed and proved,and the optimal strategy selection algorithm was designed.Finally,the practicality of the constructed model and the effectiveness of the algorithm are verified by an application example.…”
Get full text
Article -
18
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
Published 2021-03-01Get full text
Article -
19
Research progress of mimic multi-execution scheduling algorithm
Published 2021-05-01Get full text
Article -
20
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01Get full text
Article