2018
DOI: 10.1109/access.2018.2869174
|View full text |Cite
|
Sign up to set email alerts
|

Mimic Encryption System for Network Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 25 publications
0
10
0
Order By: Relevance
“…9(d) and 9(e), both SDR and SDF of Loose-T and Tight-T are 0 under any scenarios, which is no degradation occurs. The reason is that when the methods set parameter T , the equation (13) ensures that the period is not lower than the degradation limit. This reveals that ''a stable scheduling sequence is easy to obtain according to the scheduling over-head,'' which is stated in §II-A-2.…”
Section: B Results and Analysis 1) The Impact Of Attack Scenariosmentioning
confidence: 99%
See 3 more Smart Citations
“…9(d) and 9(e), both SDR and SDF of Loose-T and Tight-T are 0 under any scenarios, which is no degradation occurs. The reason is that when the methods set parameter T , the equation (13) ensures that the period is not lower than the degradation limit. This reveals that ''a stable scheduling sequence is easy to obtain according to the scheduling over-head,'' which is stated in §II-A-2.…”
Section: B Results and Analysis 1) The Impact Of Attack Scenariosmentioning
confidence: 99%
“…10(a) and 10(b), All algorithms except Loose-S have a rise in both SRR and ARD. Among them, the rise of Loose-T is the most significant, due to the setting increase of T Loose by equation (13) with to. The other Tight-T, Tight-S and Sliding Window perform similarly in ARD, but the SRR of Sliding Window rises more slowly, revealing its much security.…”
Section: ) the Impact Of Scheduling Overheadmentioning
confidence: 99%
See 2 more Smart Citations
“…To solve these problems, inspired by the mimic phenomena in the natural world, Wu et al [28] proposed a novel theory called Mimic Defense (MD). Combing "dynamic, heterogeneity and redundancy (DHR)" mechanism, MD has been applied in many fields such as Software Defined Networking (SDN) [29], encryption [30] and cloud [31]. Generally, MD includes dynamic scheduling algorithm and voting algorithm.…”
Section: Introductionmentioning
confidence: 99%