Author:
Xu WanShan,Zhang JianBiao,Zhang YaHao
Publisher
Springer International Publishing
Reference10 articles.
1. Wang, Y., Yi, X., Li, K., et al.: Formal verification of trusted connection architecture. Comput. Sci. 39(s3), 230–233 (2012)
2. Xiao, Y.L., Wang, Y.M., Pang, L.J.: Security analysis and improvement of TNC IF-T protocol binding to TLS. China Commun. (Engl. Ed.) 10(7), 85–92 (2013)
3. Vidal, J.M., Orozco, A.L.S., Villalba, L.J.G.: Adaptive artificial immune networks for mitigating DoS flooding attacks. Swarm Evol. Comput. 38 (2017)
4. Luo, Y.B., Wang, B.S., Wang, X.F., et al.: RPAH: a moving target network defense mechanism naturally resists reconnaissances and attacks. IEICE Trans. Inf. Syst. 100(3), 496–510 (2017)
5. Liu, W.W., Han, Z., Shen, C.X.: Trusted network connection control scheme based on terminal behavior. J. Commun. 30(11), 127–134 (2009)