Found: 21
Select item for more details and to access through your institution.
SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3246, doi. 10.3390/electronics13163246
- By:
- Publication type:
- Article
MNOS: a mimic network operating system for software defined networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 6, p. 345, doi. 10.1049/iet-ifs.2017.0085
- By:
- Publication type:
- Article
Cushion: A proactive resource provisioning method to mitigate SLO violations for containerized microservices.
- Published in:
- IET Communications (Wiley-Blackwell), 2022, v. 16, n. 17, p. 2105, doi. 10.1049/cmu2.12464
- By:
- Publication type:
- Article
Research on mimic decision method based on deep learning.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 2, p. 79, doi. 10.11959/j.issn.1000-436x.2024047
- By:
- Publication type:
- Article
A Mechanism for Configurable Network Service Chaining and Its Implementation.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 8, p. 3701, doi. 10.3837/tiis.2016.08.016
- By:
- Publication type:
- Article
Software diversity evaluating method based on gadget feature analysis.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 161, doi. 10.11959/j.issn.2096-109x.2023047
- By:
- Publication type:
- Article
Research progress on dynamic hopping technology for network layer.
- Published in:
- Chinese Journal of Network & Information Security, 2021, v. 7, n. 6, p. 44, doi. 10.11959/j.issn.2096-109x.2021104
- By:
- Publication type:
- Article
Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 3, p. 487, doi. 10.3390/electronics13030487
- By:
- Publication type:
- Article
Optimal Deception Asset Deployment in Cybersecurity: A Nash Q-Learning Approach in Multi-Agent Stochastic Games.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 1, p. 357, doi. 10.3390/app14010357
- By:
- Publication type:
- Article
GP-Net: Image Manipulation Detection and Localization via Long-Range Modeling and Transformers.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 21, p. 12053, doi. 10.3390/app132112053
- By:
- Publication type:
- Article
A Fabric Defect Segmentation Model Based on Improved Swin-Unet with Gabor Filter.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 20, p. 11386, doi. 10.3390/app132011386
- By:
- Publication type:
- Article
Dynamic-scheduling mechanism of controllers based on security policy in software-defined network.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 23, p. 1918, doi. 10.1049/el.2016.2670
- By:
- Publication type:
- Article
Dynamic‐scheduling mechanism of controllers based on security policy in software‐defined network.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2016, v. 52, n. 23, p. 1918, doi. 10.1049/el.2016.2670
- By:
- Publication type:
- Article
Game model for switch migrations in software-defined network.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2014, v. 50, n. 23, p. 1699, doi. 10.1049/el.2014.2086
- By:
- Publication type:
- Article
Game model for switch migrations in software‐defined network.
- Published in:
- Electronics Letters (Wiley-Blackwell), 2014, v. 50, n. 23, p. 1699, doi. 10.1049/el.2014.2086
- By:
- Publication type:
- Article
Security Analysis of Dynamic SDN Architectures Based on Game Theory.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/4123736
- By:
- Publication type:
- Article
SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction.
- Published in:
- Security & Communication Networks, 2018, p. 1, doi. 10.1155/2018/7545079
- By:
- Publication type:
- Article
SA-MDRAD: sample-adaptive multi-teacher dynamic rectification adversarial distillation.
- Published in:
- Multimedia Systems, 2024, v. 30, n. 4, p. 1, doi. 10.1007/s00530-024-01416-7
- By:
- Publication type:
- Article
ReDoS Defense Method Based on Moving Target Defense in Cloud-native Environment.
- Published in:
- Journal of Zhengzhou University: Engineering Science, 2024, v. 45, n. 2, p. 72, doi. 10.13705/j.issn.1671-6833.2023.05.009
- By:
- Publication type:
- Article
Dynamic switch migration towards a scalable SDN control plane.
- Published in:
- International Journal of Communication Systems, 2016, v. 29, n. 9, p. 1482, doi. 10.1002/dac.3101
- By:
- Publication type:
- Article
LDAS&ET-AD: Learnable Distillation Attack Strategies and Evolvable Teachers Adversarial Distillation.
- Published in:
- Computers, Materials & Continua, 2024, v. 79, n. 2, p. 2331, doi. 10.32604/cmc.2024.047275
- By:
- Publication type:
- Article