期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Survey on quantitative evaluations of moving target defense 被引量:1
1
作者 Huanruo LI Yunfei GUO +2 位作者 shumin huo Guozhen CHENG Wenyan LIU 《网络与信息安全学报》 2018年第9期66-76,共11页
Quantitative evaluations are of great importance in network security decision-making.In recent years,moving target defense(MTD)has appeared to be a promising defense approach that blocks asymmetrical advantage of atta... Quantitative evaluations are of great importance in network security decision-making.In recent years,moving target defense(MTD)has appeared to be a promising defense approach that blocks asymmetrical advantage of attackers and favors the defender-notwithstanding,it has a limited deployment due to its uncertain efficiency and effectiveness in defense.In that case,quantitative metrics and evaluations of MTD are essential to prove its capability and impulse its further research.This article presents a comprehensive survey on state-of-the-art quantitative evaluations.First,taxonomy of MTD techniques is stated according to the software stack model.Then,a concrete review and comparison on existing quantitative evaluations of MTD is presented.Finally,notice-worthy open issues regarding this topic are proposed along with the conclusions of previous studies. 展开更多
关键词 计算机网络 网络管理 应用程序 信息安全
下载PDF
Method for reducing cloud workflow completion time under the task interruption
2
作者 Yawen WANG Yunfei GUO +1 位作者 Wenyan LIU shumin huo 《网络与信息安全学报》 2020年第3期113-125,共13页
As more and more large-scale scientific workflows are delivered to clouds,the business model of workflow-as-a-service is emerging.But there are many kinds of threats in the cloud environment,which can interrupt the ta... As more and more large-scale scientific workflows are delivered to clouds,the business model of workflow-as-a-service is emerging.But there are many kinds of threats in the cloud environment,which can interrupt the task execution and extend the workflow completion time.As an important QoS parameter,the workflow completion time is determined by the critical task path.Therefore,critical path redundancy method is proposed to create a redundant path having the interact parallel relationship with the critical path,which can provide the protection for the tasks in the critical path and reduce the probability of the critical path interruption.Computing instance allocation is an essential part of the cloud workflow execution,since only the tasks assigned the instance can begin execution.In order to further reduce the workflow completion time,computing instance allocation algorithm based on HEFT(heterogeneous earliest finish time)is proposed.The algorithm considers diverse task dependency relationships and takes full advantages of the critical path redundancy method,which can improve the efficiency of workflow execution.Experimental results demonstrate that the proposed method can effectively reduce the cloud workflow completion time under the task interruption. 展开更多
关键词 cloud workflow task interruption resource allocation fault tolerance
下载PDF
Discussion on a new paradigm of endogenous security towards 6G networks 被引量:3
3
作者 Xinsheng JI Jiangxing WU +6 位作者 Liang JIN Kaizhi HUANG Yajun CHEN Xiaoli SUN Wei YOU shumin huo Jing YANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第10期1421-1450,共30页
The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with the&#... The sixth-generation mobile communication(6G)networks will face more complex endogenous security problems,and it is urgent to propose new universal security theories and establish new practice norms to deal with theªunknown unknownºsecurity threats in cyberspace.This paper first expounds the new paradigm of cyberspace endogenous security and introduces the vision of 6G cyberspace security.Then,it analyzes the security problems faced by the 6G core network,wireless access network,and emerging associated technologies in detail,as well as the corresponding security technology development status and the integrated development of endogenous security and traditional security.Furthermore,this paper describes the relevant security theories and technical concepts under the guidance of the new paradigm of endogenous security. 展开更多
关键词 6G security New paradigm of endogenous security Core network Wireless access network
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部