-
1
Meaning and Vision of Mimic Computing and Mimic Security Defense
Published 2014-07-01Subjects: Get full text
Article -
2
Heterogeneous redundancies scheduling algorithm for mimic security defense
Published 2018-07-01Subjects: “…mimic security defense…”
Get full text
Article -
3
Implementation architecture of mimic security defense based on SDN
Published 2017-10-01Subjects: “…mimic security defense…”
Get full text
Article -
4
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01Subjects: Get full text
Article