Linked e-resources
Details
Table of Contents
1 Security Risks from Vulnerabilities and Backdoors
2 Formal Description of Cyber Attacks
3 Conventional Defense Technologies
4 New Approaches to Cyber Defense
5 Analysis of diversity, randomness and dynamicity
6 Revelation of Heterogeneous Redundancy Architecture
7 DHR Architecture
8 Original Meaning and Vision of Mimic Defense
9 Theory of Cyberspace Mimic Defense
10 Engineering & Implementation of Mimic Defense
11 Foundation and Cost of Mimic Defense
12 Examples of Mimic Defense Application
13 Testing and Evaluation of the Mimic Defense Principle Verification System
14 Application Demonstration and Current Network Testing of Mimic Defense.
2 Formal Description of Cyber Attacks
3 Conventional Defense Technologies
4 New Approaches to Cyber Defense
5 Analysis of diversity, randomness and dynamicity
6 Revelation of Heterogeneous Redundancy Architecture
7 DHR Architecture
8 Original Meaning and Vision of Mimic Defense
9 Theory of Cyberspace Mimic Defense
10 Engineering & Implementation of Mimic Defense
11 Foundation and Cost of Mimic Defense
12 Examples of Mimic Defense Application
13 Testing and Evaluation of the Mimic Defense Principle Verification System
14 Application Demonstration and Current Network Testing of Mimic Defense.