Resource Type

Journal Article 33

Year

2023 4

2022 3

2021 3

2020 1

2019 3

2018 3

2017 3

2016 7

2015 1

2007 1

2005 1

2002 1

2000 1

1999 1

open ︾

Keywords

active defense 3

mimic defense 3

Moving target defense 2

Network security 2

active immunity 2

Puccinia striiformis f. sp. tritici 1

Trifolium repens 1

Adversarial attack 1

Adversarial defense 1

Adversarial samples 1

Black-box attack 1

Characteristics 1

Cloud security 1

Deep neural network Adversarial example 1

Defense mechanism 1

Defense model 1

Deployment optimization 1

Differential manifold 1

Fault classification system 1

open ︾

Search scope:

排序: Display mode:

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 69-73 doi: 10.15302/J-SSCAE-2016.06.014

Abstract: Active defense technology is a new direction in cybersecurity research that has attracted more and moreThis paper summarizes the development of active defense via the introduction of intrusion tolerance technologyand moving target defense technology.We then introduce the theory, implementation, and testing of mimic defense.By comparing mimic defense with intrusion tolerance and moving target defense, we propose a research

Keywords: mimic defense     active defense technology     cybersecurity rebalance    

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 62-68 doi: 10.15302/J-SSCAE-2016.06.013

Abstract: Next, it introduces the technology of mimic defense, including mimic defense systems, related scientificproblems, and the theoretical framework of mimicry defense.The effectiveness of a mimic defense system is also analyzed in comparison with a traditional networkdefense technology.Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Keywords: mimic defense     cyberspace     moving target defense     mimicry transformation    

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 74-78 doi: 10.15302/J-SSCAE-2016.06.015

Abstract: This paper proposes a scheme of combining software diversity with mimic defense in the software security

Keywords: software diversity     mimic defense     software security product    

Scientific workflow execution system based on mimic defense in the cloud environment Research Article

Ya-wen WANG, Jiang-xing WU, Yun-fei GUO, Hong-chao HU, Wen-yan LIU, Guo-zhen CHENG

Frontiers of Information Technology & Electronic Engineering 2018, Volume 19, Issue 12,   Pages 1522-1536 doi: 10.1631/FITEE.1800621

Abstract: To strengthen the security of cloud workflows, a mimic cloud computing task execution system for scientificThe idea of mimic defense contains mainly three aspects: heterogeneity, redundancy, and dynamics.

Keywords: Scientific workflow     Mimic defense     Cloud security     Intrusion tolerance    

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Frontiers of Agricultural Science and Engineering 2018, Volume 5, Issue 1,   Pages 129-138 doi: 10.15302/J-FASE-2017197

Abstract: Physiological responses to low temperature were analyzed in a chilling-tolerant centipedegrass ( ) accession, Shao Guan (SG), in comparison to the commercial cultivar, Common. Lower levels of ion leakage and higher chlorophyll (Chl) concentration were observed in SG than in Common during chilling stress. The maximum photochemical efficiency, the actual photosystem II (PSII) efficiency, photochemical quenching efficiency, and net photosynthetic rate were decreased during chilling stress in both genotypes, with higher levels of these parameters shown by SG than Common. In addition, higher activities of superoxide dismutase (SOD), catalase (CAT), ascorbate-peroxidase (APX) and glutathione reductase (GR), and higher concentrations of ascorbic acid (AsA) and glutathione (GSH) were observed in SG than in Common. Moreover, higher concentrations of putrescine (Put), spermidine (Spd), and spermine (Spm) were observed in SG than in Common. Correlation analysis indicated that SOD, CAT, APX and GR activities, and AsA and GSH concentrations showed high correlation to Put, while APX, GR, and AsA concentrations were correlated to Spd. Exogenous Put or Spd increased antioxidant enzyme activities and chilling tolerance. The results suggested that polyamine-regulated antioxidants are important for chilling tolerance in centipedegrass and protect plants against chilling induced oxidative damage.

Keywords: antioxidants     centipedegrass     chilling     photosynthesis     polyamines    

Gametheoretic analysis for themechanism of moving target defense Article

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 12,   Pages 2017-2034 doi: 10.1631/FITEE.1601797

Abstract: Moving target defense (MTD) is a novel way to alter the asymmetric situation of attacks and defenses,However, relevant analysis for the defense mechanism of the MTD technology is still absent.In this paper, we analyze the defense mechanism of MTD technology in two dimensions.First, we present a new defense model named MP2R to describe the proactivity and effect of MTD technologyThis work gives theoretical support for understanding the defense process and defense mechanism of MTD

Keywords: Network security     Moving target defense (MTD)     Defense mechanism     Defense model     Game theory    

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Strategic Study of CAE 2019, Volume 21, Issue 6,   Pages 71-79 doi: 10.15302/J-SSCAE-2019.06.014

Abstract:

As an important development direction of naval warfare, the underwater attack–defense confrontationsystem integrates underwater warning, scout, detection, attack, defense and a series of other operationsanalyzes the functional composition and typical combat styles of the future underwater attack–defenseconfrontation system, and proposes corresponding suggestions for the development of the underwater attack–defense

Keywords: underwater attack and defense     confrontation system     coordinated combat     unmanned system    

Moving target defense: state of the art and characteristics Review

Gui-lin CAI,Bao-sheng WANG,Wei HU,Tian-zuo WANG

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 11,   Pages 1122-1153 doi: 10.1631/FITEE.1601321

Abstract: Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situationFirst, a new security model is introduced to describe the changes in the traditional defense paradigm

Keywords: Moving target defense     Security model     Function-and-movement model     Characteristics    

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional None

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 2,   Pages 238-252 doi: 10.1631/FITEE.1800516

Abstract: ., an “isolating and dynamic” cyber defense, which cuts these potential chains to reduce the cumulativeSecond, we propose a software-defined proactive cyber defense solution (SPD) for enterprise networks

Keywords: Intranet defense     Software-defined network     Multi-dimensional maneuvering    

Development Trends of Chemical and Biological Weapons and Defense Technology in the 21st Century

Chen Jisheng

Strategic Study of CAE 2000, Volume 2, Issue 11,   Pages 25-28

Abstract: In this paper, the status of CB weapons, CB disarmament and trends in CB defense technology are introduced, and discussions on the key concerns of CB defense and medical protection in the future are presented

Keywords: chemical and biological weapon     chemical and biological defense     medical protection     chemical and biological    

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Strategic Study of CAE 2021, Volume 23, Issue 3,   Pages 98-105 doi: 10.15302/J-SSCAE-2021.03.003

Abstract: data, multi-source heterogeneous data, and real-time dynamic data, which can significantly improve the defenseThis study introduces some key problems and technologies of AI-enabled cyberspace security defense, particularly

Keywords: artificial intelligence (AI),cyberspace security,cyber attacks,cyber defense    

Impact of Recent Regional Wars on Requirements of Ground based Air Defense Radars

Peng Jiating

Strategic Study of CAE 1999, Volume 1, Issue 2,   Pages 19-23

Abstract:

In light of tasks creating before ground based air defense radar in recent regional conflicts, thisradars, and analyzes briefly the position and function of ground based mid and low altitude defensesystems in modem air defense.The author believes that these air defense systems can play an important role in modem air defense andThe article concludes the new requirement of ground based mid and low altitude defense radars, mainly

Keywords: low altitude     air defense radar     anti-stealth     anti-cruise missile     anti-antiradiation missile    

DART Mission Shows Potential for Planetary Defense by Smashing Asteroid into New Orbit

Chris Palmer

Engineering 2023, Volume 24, Issue 5,   Pages 7-9 doi: 10.1016/j.eng.2023.03.002

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Strategic Study of CAE 2016, Volume 18, Issue 6,   Pages 8-12 doi: 10.15302/J-SSCAE-2016.06.002

Abstract: sovereignty guarantee, including the implications of the cyber rights of independence, equality, self-defense

Keywords: cyber sovereignty     cyber right of independence     cyber right of equality     cyber right of self-defense     cyber right of jurisdiction     cyber border defense    

APPLICATION AND DEVELOPMENT OF ‘GREEN’ PREVENTIVE AND CONTROL TECHNOLOGIES IN GUIZHOU TEA PLANTATIONS

Frontiers of Agricultural Science and Engineering 2022, Volume 9, Issue 1, doi: 0.15302/J-FASE-2021424

Abstract: rsquo; preventive technologies being applied in Guizhou tea plantations, including the use of plant defense

Keywords: ‘green’ prevention / natural enemies / plant defense inducers / tea plantations / Trifolium repens    

Title Author Date Type Operation

Mimic Defense Technology

Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing

Journal Article

A Review of the Basic Theory of Mimic Defense

Si Xueming,Wang Wei and Zeng Junjie、Yang Benchao、Li Guangsong、Yuan Chao、Zhang Fan

Journal Article

Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry

Pang Jianmin,Zhang Yujia and Zhang Zheng、Wu Jiangxing

Journal Article

Scientific workflow execution system based on mimic defense in the cloud environment

Ya-wen WANG, Jiang-xing WU, Yun-fei GUO, Hong-chao HU, Wen-yan LIU, Guo-zhen CHENG

Journal Article

Polyamines and antioxidant defense system are associated with cold tolerance in centipedegrass

Jingjing CHEN, Junyang FANG, Zhenfei GUO, Shaoyun LU

Journal Article

Gametheoretic analysis for themechanism of moving target defense

Gui-lin CAI, Bao-sheng WANG, Qian-qian XING

Journal Article

Underwater Attack–Defense Confrontation System and Its Future Development

Xie Wei, Yang Meng, Gong Junbin

Journal Article

Moving target defense: state of the art and characteristics

Gui-lin CAI,Bao-sheng WANG,Wei HU,Tian-zuo WANG

Journal Article

Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional

Yang CHEN, Hong-chao HU, Guo-zhen CHENG

Journal Article

Development Trends of Chemical and Biological Weapons and Defense Technology in the 21st Century

Chen Jisheng

Journal Article

Artificial Intelligence Enabled Cyberspace Security Defense

Jia Yan, Fang Binxing, Li Aiping, Gu Zhaoquan

Journal Article

Impact of Recent Regional Wars on Requirements of Ground based Air Defense Radars

Peng Jiating

Journal Article

DART Mission Shows Potential for Planetary Defense by Smashing Asteroid into New Orbit

Chris Palmer

Journal Article

Research on the Issue of a Cyber Sovereignty Guarantee

Zou Peng,He Jun,Zou Hongxia,Liu Yunjie

Journal Article

APPLICATION AND DEVELOPMENT OF ‘GREEN’ PREVENTIVE AND CONTROL TECHNOLOGIES IN GUIZHOU TEA PLANTATIONS

Journal Article