共 24 条
[1]
Moving Target Defense. Jajodia,S.et al. Creating Asymmetric Uncertainty for Cyber Threats . 2011
[2]
From protocol stack to protocol heap[J] . Robert Braden,Ted Faber,Mark Handley.  ACM SIGCOMM Computer Communication Review . 2003 (1)
[4]
信息共享理论与网络体系结构[M]. 科学出版社 , 邢玲, 2011
[5]
MOVING TOWARD TRUSTWORTHY SYSTEMS: R&D ESSENTIALS. Frederick T. Sheldon,Claire Vishik. Computer . 2010
[6]
Fingerprint minutiae matching based on the local and global structures. Jiang X D,Yau W Y. Proceeding of the 15th International Conference on Pattern Recognition . 2000
[8]
From information security to cyber security[J] . Rossouw von Solms,Johan van Niekerk.  Computers & Security . 2013
[9]
Networking named content. Jacobson V,Smetters D K,Thornton J D, et al. Proceedings of the5th international conference on Emerging networking experiments and technologies (CoNext) . 2009
[10]
From quantum cheating to quantum security. Gottesman D,Lo H K. Physics Today . 2000