Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Moving target defense techniques: A survey
C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …
moving target defense research has become one of the hot spots. In order to gain better …
A systematic survey of self-protecting software systems
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …
Architecture-based self-protecting software systems
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
statically deployed, they are no longer sufficient against today's sophisticated and evolving …
Multi-agent reinforcement learning for intrusion detection
A Servin, D Kudenko - European Symposium on Adaptive Agents and …, 2005 - Springer
Abstract Intrusion Detection Systems (IDS) have been investigated for many years and the
field has matured. Nevertheless, there are still important challenges, eg, how an IDS can …
field has matured. Nevertheless, there are still important challenges, eg, how an IDS can …
Architecture-based self-protection: composing and reasoning about denial-of-service mitigations
Security features are often hardwired into software applications, making it difficult to adapt
security responses to reflect changes in runtime context and new attacks. In prior work, we …
security responses to reflect changes in runtime context and new attacks. In prior work, we …
Autonomous agents and multi–agent systems (AAMAS) for the military–issues and challenges
P Beautement, D Allsopp, M Greaves… - … Workshop on Defence …, 2005 - Springer
The military domain is a very challenging environment and human endeavour in this domain
is characterized by uncertainty and the need to be able to deal with significant and disruptive …
is characterized by uncertainty and the need to be able to deal with significant and disruptive …
Research on trustworthy networks.
C Lin, X Peng - Jisuanji Xuebao(Chin. J. Comput.), 2005 - cjc.ict.ac.cn
Background As networks have grown in size and complexity, the existing isolated and add-
on secure systems of internet are confronting some serious challenges, with frequent …
on secure systems of internet are confronting some serious challenges, with frequent …
[หนังสือ][B] Information assurance: dependability and security in networked systems
In today's fast paced, infocentric environment, professionals increasingly rely on networked
information technology to do business. Unfortunately, with the advent of such technology …
information technology to do business. Unfortunately, with the advent of such technology …
Multi-agent framework for simulation of adaptive cooperative defense against internet attacks
The paper proposes the framework for investigation of prospective adaptive and cooperative
defense mechanisms against the Internet attacks. The approach suggested is based on the …
defense mechanisms against the Internet attacks. The approach suggested is based on the …
Closing cluster attack windows through server redundancy and rotations
Y Huang, D Arsenault, A Sood - Sixth IEEE International …, 2006 - ieeexplore.ieee.org
It is well-understood that increasing redundancy in a system generally improves the
availability and dependability of the system. In server clusters, one important form of …
availability and dependability of the system. In server clusters, one important form of …