2019 IEEE Fifth International Conference on Big Data Computing Service and Applications (BigDataService) 2019
DOI: 10.1109/bigdataservice.2019.00043
|View full text |Cite
|
Sign up to set email alerts
|

Mimic Defense Techniques of Edge-Computing Terminal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…2) The second direction focuses on security optimization based on the idea of mimicry defense, which can increase the difficulty of attacks and reduce the probability of a successful attack [24], [25]. However, this method can cause a big waste of communication resources, and in some cases, it may not be worthwhile to exchange communication resources for reliability.…”
Section: B Optimization Of Sfcmentioning
confidence: 99%
“…2) The second direction focuses on security optimization based on the idea of mimicry defense, which can increase the difficulty of attacks and reduce the probability of a successful attack [24], [25]. However, this method can cause a big waste of communication resources, and in some cases, it may not be worthwhile to exchange communication resources for reliability.…”
Section: B Optimization Of Sfcmentioning
confidence: 99%
“…Based on [37,38], Sang and Li [39] studied mimic defence techniques of edge computing terminal, which is also the basic framework of this paper. However, there are few researches focusing on the security analysis methods of mimic defence systems.…”
Section: Introductionmentioning
confidence: 99%