Heterogeneous redundancies scheduling algorithm for mimic security defense
The scheduling of heterogeneous redundancies is one of the key lines of mimic security defense,but the existing scheduling strategies are lack of consideration about the similarity among redundancies and the scheduling algorithms are incomprehensive.A new scheduling algorithm called random seed &amp...
Saved in:
| Main Authors: | Qinrang LIU, Senjie LIN, Zeyu GU |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2018-07-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2018124 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01) -
Executive dynamic scheduling algorithm based on high-order heterogeneity
by: Hongyong JIA, et al.
Published: (2022-03-01) -
Executive dynamic scheduling algorithm based on high-order heterogeneity
by: Hongyong JIA, et al.
Published: (2022-03-01) -
Dynamic scheduling method of service function chain executors based on the mimic defense architecture
by: Chuanhuang LI, et al.
Published: (2022-04-01)