Author:
Sun Jia,Zhang Jianhui,Bu Youjun,Chen Bo,Lu Xiangyu,Zhang Surong
Reference14 articles.
1. Provenance cloud security auditing system based on log analysis
2. DieHard: Probabilistic Memory Safety for Unsafe Languages;Berger,2006
3. Mimic Security Defence Strategy Based on Software Diversity;Zhang;Computer Science,2018
4. Management information system based on mimic defense;Chang;Computer Science,2019