Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However, in the field of industrial control, the...
Saved in:
| Main Authors: | Ruyun ZHANG, Heyuan LI, Shunbin LI |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2021-03-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/thesisDetails#10.11959/j.issn.1000-0801.2021047 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
by: Ruyun ZHANG, et al.
Published: (2021-03-01) -
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01) -
Differential Game‑based Mimic Defense Scheduling Strategy in Power Systems
by: GU Liang, et al.
Published: (2025-05-01)