Zobrazeno 1 - 10
of 240
pro vyhledávání: '"Zhang, Guo‐Min"'
Publikováno v:
Jisuanji kexue, Vol 49, Iss 11, Pp 351-359 (2022)
Network fingerprinting detection is an important network reconnaissance method,which can be used by attackers to obtain the fingerprinting characteristics of the target network,and then provide support for subsequent targeted attacks.Fingerprinting o
Externí odkaz:
https://doaj.org/article/54325bf1b8e64e17bb92bc1401551f7d
Publikováno v:
Jisuanji kexue, Vol 49, Iss 9, Pp 333-339 (2022)
As a typical deception defense means,honeypot technology is of great significance in actively trapping attackers.The existing design methods mainly optimize the trapping decision of honeypot through the game model,ignoring the impact of the attacker'
Externí odkaz:
https://doaj.org/article/035d3e32c965484b9f23018b1bbe0adf
Publikováno v:
Jisuanji kexue, Vol 48, Iss 10, Pp 294-300 (2021)
As an important deception defense method,honeypot is of great significance to enhance the network active defense capability.However,most of the existing honeypots adopt the static deployment method,which is difficult to deal with the strategic attack
Externí odkaz:
https://doaj.org/article/6a5e5fcac35b46e9850a557010e3f67c
Publikováno v:
Jisuanji kexue, Vol 48, Iss 10, Pp 278-285 (2021)
Some typical network attacks,such as link-flooding attack,need to be carried out on critical links based on topology reconnaissance,which has strong destructiveness and stealthiness.In order to defense these attacks effectively,TopoObfu,a topology ob
Externí odkaz:
https://doaj.org/article/c78ac1b66546433fb7697a3127cb049e
Publikováno v:
Jisuanji kexue, Vol 48, Iss 10, Pp 334-342 (2021)
By deploying computation and storage resources at the network edge that is close to the data source,and scheduling tasks offloaded by users efficiently,edge computing can greatly improve the quality of experience (QoE) of users.However,due to the lac
Externí odkaz:
https://doaj.org/article/85dbfeeab0f04e6a9040413a300bed0a
Publikováno v:
Jisuanji kexue, Vol 48, Iss 8, Pp 291-299 (2021)
Fingerprinting,which is an important part of reconnaissance,the first stage of network attack killing chain,is the prerequisite of successful implementation of network attack.The promotion of the concept of active defense,especially deception defense
Externí odkaz:
https://doaj.org/article/8e9a6a4d44994d808249084bdc61fef0
Autor:
Zhang, Guo-Min, Guo, Yi-Xuan, Cheng, Chun-Yu, El-Samahy, M.A., Tong, Ran, Gao, Xiao-Xiao, Deng, Kai-Ping, Wang, Feng, Lei, Zhi-hai
Publikováno v:
In Theriogenology December 2020 158:75-83
Publikováno v:
Digital Chinese Medicine, Vol 3, Iss 3, Pp 163-179 (2020)
Objective: Pharmacological methods were used to screen targets and signaling pathways of Ma Xing Shi Gan Decoction (MXSGD) during influenza treatments, and mechanisms underlying anti-influenza effects were elucidated. Methods: The Traditional Chinese
Externí odkaz:
https://doaj.org/article/1e51ef042d6e4e46bdbb8f8a6b025747
Autor:
Gao, Xiao-Xiao, Zhang, Qi-Fan, Zhu, Ming, Li, Xiao-He, Guo, Yi-Xuan, Pang, Jing, Liu, Zi-Fei, You, Pei-Hua, Zhang, Guo-Min, Wang, Feng
Publikováno v:
In Theriogenology 15 October 2019 138:137-144
Autor:
Zhang, Guo-Min, An, Shi-Yu, El-Samahy, M.A., Zhang, Yan-Li, Wan, Yong-Jie, Wang, Zi-Yu, Xiao, Shen-Hua, Meng, Fan-Xing, Wang, Feng, Lei, Zhi-Hai
Publikováno v:
In Theriogenology 1 July 2019 132:72-82