Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Lingshu LI"'
Publikováno v:
网络与信息安全学报, Vol 8, Pp 87-96 (2022)
Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks du
Externí odkaz:
https://doaj.org/article/73d5d3bb168948e9b1af078a7879604e
Publikováno v:
网络与信息安全学报, Vol 7, Pp 95-104 (2021)
Container technology promotes the rapid development of cloud computing with its flexible and efficient features, but it also introduces security threats such as co-resident attacks, escape attacks, and common mode attacks.In response to these securit
Externí odkaz:
https://doaj.org/article/242b8d0b3fac47e0a01d3df78843152d
Autor:
Liqiang Jia, Lingshu Li
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2020, Iss 1, Pp 1-16 (2020)
Abstract The traditional training system based on case teaching is according to the analysis of past competitions and training cases to carry out the strength training of aerobics special movements. The training results cannot be evaluated intelligen
Externí odkaz:
https://doaj.org/article/56fcc29f2cf641fc9d55a9d3223dc83c
Autor:
Liqiang Jia, Lingshu Li
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2022, Iss 1, Pp 1-1 (2022)
Externí odkaz:
https://doaj.org/article/dcdfbaaa6d6044bc8721f4c9de255bd1
Publikováno v:
网络与信息安全学报, Vol 4, Pp 47-55 (2018)
In multi-application scenarios of 5G,data traffic often increases dramatically.Virtual machine resources in network slicing may not meet the normal needs of users.In view of this,a network slicing function migration mechanism aiming at load balancing
Externí odkaz:
https://doaj.org/article/ef7b4a61d3d345e288bbf45cd2d204ac
Publikováno v:
网络与信息安全学报, Vol 4, Pp 60-68 (2018)
Dealing with the problem of network resource utilization and the user experience,the network slicing as a novel technology is adopted in 5G.A dynamic resource scheduling strategy for 5G network slicing based on improved greedy algorithm was proposed.
Externí odkaz:
https://doaj.org/article/e002b83c5f804e23b5a8858fe7566a3a
Autor:
Lingshu Li, Li Zhang
Publikováno v:
Computational Intelligence and Neuroscience. 2022:1-10
Health has always been recognized as the imperative parameter to excel in any field whether professional or personal. People with sound health having regular habit of physical activities show more potential in their professional and personal lives th
Publikováno v:
China Communications. 18:17-34
Based on the diversified technology and the cross-validation mechanism, the N-variant system provides a secure service architecture for cloud providers to protect the cloud applications from attacks by executing multiple variants of a single software
Publikováno v:
IEICE Transactions on Information and Systems. :893-896
Publikováno v:
SSRN Electronic Journal.