期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Soliciting Contributions for "Symposium on Defense Science and Technology Management 2008"
1
《Defence Technology(防务技术)》 SCIE EI CAS 2008年第2期F0003-F0003,共1页
"Symposium on Defense Science and Technology Management 2008",sponsored by China Ordnance Society and Beijing Institute of Technology,and undertaken by Management and Economy College,Beijing Institute of Tec... "Symposium on Defense Science and Technology Management 2008",sponsored by China Ordnance Society and Beijing Institute of Technology,and undertaken by Management and Economy College,Beijing Institute of Technology,will be held in Beijing Institute of Technology in the last ten-day period 展开更多
关键词 Symposium on defense Science and technology Management 2008 Soliciting Contributions for
下载PDF
Research on Cyberspace Mimic Defense Based on Dynamic Heterogeneous Redundancy Mechanism 被引量:1
2
作者 Junjie Xu 《Journal of Computer and Communications》 2021年第7期1-7,共7页
With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target sy... With the rapid growth of network technology, the methods and types of cyber-attacks are increasing rapidly. Traditional static passive defense technologies focus on external security and known threats to the target system and cannot resist advanced persistent threats. To solve the situation that cyberspace security is easy to attack and difficult to defend, Chinese experts on cyberspace security proposed an innovative theory called mimic defense, it is an active defense technology that employs “Dynamic, Heterogeneous, Redundant” architecture to defense attacks. This article first briefly describes the classic network defense technology and Moving Target Defense (MTD). Next, it mainly explains in detail the principles of the mimic defense based on the DHR architecture and analyzes the attack surface of DHR architecture. This article also includes applications of mimic defense technology, such as mimic routers, and mimic web defense systems. Finally, it briefly summarizes the existing research on mimic defense, expounds the problems that need to be solved in mimic defense, and looks forward to the future development of mimic defense. 展开更多
关键词 Cyberspace Mimic defense Dynamic Heterogeneous Redundancy Structure defense technology Network Security
下载PDF
Symbol RFID Technology to be Deployed at United States Defense Logistics Agency's Distribution Centers Worldwide
3
作者 Symbol XR400 Fixed Readers to Support Department of Defense RFID Initiative 《射频世界》 2006年第5期76-76,共1页
Symbol Technologies, Inc., The Enterprise Mobility Company, today announced that it had been selected by ODIN technologies, the leader in the physics of RFID testing, software and deployment, to support its recent con... Symbol Technologies, Inc., The Enterprise Mobility Company, today announced that it had been selected by ODIN technologies, the leader in the physics of RFID testing, software and deployment, to support its recent contract win with the United States Defense Logistics Agency (DLA), the United States Department of Defense’s (DoD) logistics combat support agency that provides supplies and services to America’s military forces worldwide. 展开更多
关键词 RFID Symbol RFID technology to be Deployed at United States defense Logistics Agency’s Distribution Centers Worldwide DLA
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部