2018
DOI: 10.1049/iet-ifs.2017.0086
|View full text |Cite
|
Sign up to set email alerts
|

Mimic defense: a designed‐in cybersecurity defense framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 68 publications
(35 citation statements)
references
References 42 publications
0
33
0
2
Order By: Relevance
“…The heterogeneity definition in this paper adopts the mainstream method [28], that is related to the number of common vulnerabilities between the two heterogeneous variants. The number of common vulnerabilities is positively correlated with the heterogeneity and the possibility of simultaneous destruction by the same attack.…”
Section: A Heterogeneitymentioning
confidence: 99%
See 3 more Smart Citations
“…The heterogeneity definition in this paper adopts the mainstream method [28], that is related to the number of common vulnerabilities between the two heterogeneous variants. The number of common vulnerabilities is positively correlated with the heterogeneity and the possibility of simultaneous destruction by the same attack.…”
Section: A Heterogeneitymentioning
confidence: 99%
“…indicates the probability of an attacker exploiting the vulnerability in heterogeneous variants to make the output incorrect. In a physical sense, we define ( ) as follows to describe the changing rate of success probability at time t [28]:…”
Section: B the Relationship Between Attack Success Probability And Hmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, the mimic construction technology provides a feasible way to solve the general robust control problem in the network [24]. This general robust control problem can essentially cope with structural defects, such as static states, deterministic form, and similarities relative to backdoor or loophole attacks.…”
Section: Breakthroughs In Many Key Technologies Have Provided Core Fomentioning
confidence: 99%