您当前的位置:
首页 >
文章列表页 >
Heterogeneous redundancies scheduling algorithm for mimic security defense
Correspondences | 更新时间:2024-06-05
    • Heterogeneous redundancies scheduling algorithm for mimic security defense

    • Journal on Communications   Vol. 39, Issue 7, Pages: 188-198(2018)
    • DOI:10.11959/j.issn.1000-436x.2018124    

      CLC: TP309
    • Online First:2018-07

      Published:25 July 2018

    移动端阅览

  • Qinrang LIU, Senjie LIN, Zeyu GU. Heterogeneous redundancies scheduling algorithm for mimic security defense[J]. Journal on Communications, 2018, 39(7): 188-198. DOI: 10.11959/j.issn.1000-436x.2018124.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2284

下载量

12

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Heterogeneous executor scheduling algorithm for mimic cloud service
Analysis of super-long and sparse feature in pseudo-random sequence based on similarity
Dynamic P2P trust model based on time-window feedback mechanism
Botnets’ similarity analysis based on communication features and D-S evidence theory

Related Author

Kai WANG
Ruihao DING
Shuxin LIU
Liming PU
Jing-zhang SUN
Meng-xing HUANG
Long-juan WANG
Zhi-qiang ZHANG

Related Institution

Information Engineering University
State Key Laboratory of Marine Resource Utilization in the South China Sea,Hainan University
College of Information Science&Technology,Hainan University
School of Information Engineering,University of Science and Technology
College of Computer Science and Technology, Harbin Engineering University
0