Author:
Shao Sisi,Ji Yimu,Zhang Weili,Liu Shangdong,Jiang Fei,Cao Zhigang,Wu Fei,Zeng Fukang,Zuo Jun,Zhou Longfei
Publisher
Springer Science and Business Media LLC
Reference22 articles.
1. Wu Z, Wei J. Heterogeneous executors scheduling algorithm for mimic defense systems. In: Proceedings of the 2nd International Conference on Computer and Communication Engineering Technology (CCET), 2019. 279–284
2. Song K, Liu Q R, Wei S, et al. Endogenous security architecture of Ethernet switch based on mimic defense. J Commun, 2020, 41: 18–26
3. Ren Q, Wu J X, He L. Performance modeling based on GSPN for cyberspace mimic DNS. Chin J Electron, 2020, 29: 738–749
4. Wu J X. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Berlin: Springer Science & Business Media, 2011
5. Wu J X. Research on cyber mimic defense. J Cyber Secur, 2016, 1: 1–10