Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints

Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the...

Full description

Saved in:
Bibliographic Details
Main Authors: Ruyun ZHANG, Heyuan LI, Shunbin LI
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2021-03-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2021047/
Tags: Add Tag
No Tags, Be the first to tag this record!