Volume 2,Issue 1,2017 Table of Contents

Other Issues:  


The Active Defense Technology Based on the Software/Hardware Diversity
  TONG Qing, ZHANG Zheng and WU Jiangxing
  2017,2(1):1-12 [Abstract]  [View PDF(627.28 K)]
The Test and Analysis of Prototype of Mimic Defense in Web Servers
  ZHANG Zheng, MA Bolin and WU Jiangxing
  2017,2(1):13-28 [Abstract]  [View PDF(3.78 M)]
Dynamic Heterogeneous Redundancy based Router Architecture with Mimic Defenses
  MA Hailong, YI Peng, JIANG Yiming and HE Lei
  2017,2(1):29-42 [Abstract]  [View PDF(3.12 M)]
Tests and Analyses for Mimic Defense Ability of Routers
  MA Hailong, JIANG Yiming, BAI Bing and ZHANG Jianhui
  2017,2(1):43-53 [Abstract]  [View PDF(3.32 M)]
Architecture of Mimic Security Processor for Industry Control System
  WEI Shuai, YU Hong, GU Zeyu and ZHANG Xingming
  2017,2(1):54-73 [Abstract]  [View PDF(2.00 M)]
A Survey on the studies of Hardware Trojan
  ZHAO Jianfeng and SHI Gang
  2017,2(1):74-90 [Abstract]  [View PDF(1.68 M)]
A Survey of DoS Attack in Content Centric Networking
  LI Yang, XIN Yonghui, HAN Yanni, LI Weiyuan and Xu Zhen
  2017,2(1):91-108 [Abstract]  [View PDF(1.08 M)]