Funder
National Natural Science Foundation of China
Publisher
Public Library of Science (PLoS)
Reference46 articles.
1. Kewley D, Fink R, Lowry J, Dean M. Dynamic approaches to thwart adversary intelligence gathering. DARPA Information Survivability Conference & Exposition II, 2001 DISCEX '01 Proceedings. 2001; 1: 176–185.
2. National cyber leap year summit 2009 co-chairs report. Networking and information technology research and development. 2009; Available from: http://www.ncbi.nlm.nih.gov/docs/.
3. Cai G, Wang B, Wang X, Yuan Y, Li S. An introduction to network address shuffling. 2016 18th International Conference on Advanced Communication Technology (ICACT). Jan. 31 2016-Feb. 3 2016; 185–190.
4. Dunlop M, Groat S, Urbanski W, Marchany R, Tront J. Mt6d: A moving target ipv6 defense. 2011 Military Communications Conference. November 2011; 1321–1326.
5. The Blind Man's Bluff Approach to Security Using IPv6;M Dunlop;IEEE Security & Privacy,2012
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献