| |
| The Active Defense Technology Based on the Software/Hardware Diversity |
| TONG Qing, ZHANG Zheng and WU Jiangxing |
| 2017,2(1):1-12 [Abstract] [View PDF(627.28 K)] |
| |
| The Test and Analysis of Prototype of Mimic Defense in Web Servers |
| ZHANG Zheng, MA Bolin and WU Jiangxing |
| 2017,2(1):13-28 [Abstract] [View PDF(3.78 M)] |
| |
| Dynamic Heterogeneous Redundancy based Router Architecture with Mimic Defenses |
| MA Hailong, YI Peng, JIANG Yiming and HE Lei |
| 2017,2(1):29-42 [Abstract] [View PDF(3.12 M)] |
| |
| Tests and Analyses for Mimic Defense Ability of Routers |
| MA Hailong, JIANG Yiming, BAI Bing and ZHANG Jianhui |
| 2017,2(1):43-53 [Abstract] [View PDF(3.32 M)] |
| |
| Architecture of Mimic Security Processor for Industry Control System |
| WEI Shuai, YU Hong, GU Zeyu and ZHANG Xingming |
| 2017,2(1):54-73 [Abstract] [View PDF(2.00 M)] |
| |
| A Survey on the studies of Hardware Trojan |
| ZHAO Jianfeng and SHI Gang |
| 2017,2(1):74-90 [Abstract] [View PDF(1.68 M)] |
| |
| A Survey of DoS Attack in Content Centric Networking |
| LI Yang, XIN Yonghui, HAN Yanni, LI Weiyuan and Xu Zhen |
| 2017,2(1):91-108 [Abstract] [View PDF(1.08 M)] |
| |