Uneingeschränkter Zugang

Research on the traceability of attack teams based on offensive and defensive confrontation

, , , ,  und   
05. Nov. 2024

Zitieren
COVER HERUNTERLADEN

He yi. Research and implementation of Trojan Horse hiding technology Based on P2P. Search in Google Scholar

Wang Gang. The traceability method in the network attack and defense. Search in Google Scholar

Gao Qigong Xiaojing Huang Rui Huang Chenglin Zhou Shenyong. The traceability method of network attack and trapping based on honeypot technology. Search in Google Scholar

Wang Hua Li Jue Li Bo Tan Haibo. Trability analysis of attack and defense drill. Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
1 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Biologie, Biologie, andere, Mathematik, Angewandte Mathematik, Mathematik, Allgemeines, Physik, Physik, andere