97 results on '"Cheng, Guozhen"'
Search Results
2. ESO-based robust adaptive control for dual closed-loop fuel control system in aeroengine
3. SMWE: A Framework for Secure and Makespan-Oriented Workflow Execution in Serverless Computing.
4. Research progress on dynamic hopping technology for network layer
5. Attacker Hunting in the Intranet Using Multi-Agent Reinforcement Learning
6. Multi-Dimensional Moving Target Defense Method Based on Adaptive Simulated Annealing Genetic Algorithm
7. Leveraging spatial prior and grid attention for few-shot medical segmentation
8. ReDoS Defense Method Based on Moving Target Defense in Cloud-native Environment.
9. Research on mimic decision method based on deep learning.
10. A Fabric Defect Segmentation Model Based on Improved Swin-Unet with Gabor Filter
11. YOLO-GFD: A Fast and Accurate Fabric Defect Detection Model
12. Active Perceptive Dynamic Scheduling Mechanism Based on Negative Feedback
13. Design and implementation of the controller scheduling-time in SDN
14. Maximizing SDN control resource utilization via switch migration
15. Optimal Deception Asset Deployment in Cybersecurity: A Nash Q-Learning Approach in Multi-Agent Stochastic Games.
16. GP-Net: Image Manipulation Detection and Localization via Long-Range Modeling and Transformers.
17. Enabling network function combination via service chain instantiation
18. Evaluating Software Diversity Based on Gadget Feature Analysis
19. Software diversity evaluating method based on gadget feature analysis.
20. Cushion : A proactive resource provisioning method to mitigate SLO violations for containerized microservices
21. Overview of Scientific Workflow Security Scheduling in Clouds
22. Uncovering network traffic anomalies based on their sparse distributions
23. SecIngress: An API gateway framework to secure cloud applications based on N-variant system
24. Mitigating malicious packets attack via vulnerability-aware heterogeneous network devices assignment
25. A Software-Defined Intranet Dynamic Defense System
26. A Diversity Metric Based Study on the Correlation between Diversity and Security
27. A Positive Feedback Mechanism of Adaptive Dynamic System
28. Improving Resiliency of Software-Defined Networks with Network Coding-based Multipath Routing
29. Improving the Routing Security in Software-Defined Networks
30. The Design and Implementation of a Dynamic IP defense System Accelerated by Vector Packet Processing
31. A Correlation-aware Diverse Variant Placement to Increase Network Resilience
32. Towards Adaptive Network Nodes via Service Chain Construction
33. Mimic defense: a designed‐in cybersecurity defense framework
34. SDNManager: A Safeguard Architecture for SDN DoS Attacks Based on Bandwidth Prediction
35. Security Analysis of Dynamic SDN Architectures Based on Game Theory
36. A secure control plane for SDN based on Bayesian Stackelberg Games
37. Dynamic Migration of Virtual Links
38. The Best Defense Strategy against Session Hijacking Using Security Game in SDN
39. MNOS: a mimic network operating system for software defined networks
40. A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
41. Towards a dynamic controller scheduling-timing problem in software-defined networking
42. An aware-scheduling security architecture with priority-equal multi-controller for SDN
43. Game-Theoretic Analysis for Security of Various Software-Defined Networking (SDN) Architectures
44. Orchestrating network functions in software-defined networks
45. Toward a scalable SDN control mechanism via switch migration
46. Dynamic‐scheduling mechanism of controllers based on security policy in software‐defined network
47. A game-theoretic approach to elastic control in software-defined networking
48. Dynamic switch migration towards a scalable SDN control plane
49. An approach for network function combination based on least busy placement algorithm
50. Mutine: A Mutable Virtual Network Embedding with Game-Theoretic Stochastic Routing
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.