Shi et al., 2021 - Google Patents
Modeling and performance analysis of satellite network moving target defense system with petri netsShi et al., 2021
View HTML- Document ID
- 1875440524747420201
- Author
- Shi L
- Du S
- Miao Y
- Lan S
- Publication year
- Publication venue
- Remote Sensing
External Links
Snippet
With the development of satellite communication networks and the increase of satellite services, security problems have gradually become some of the most concerning issues. Researchers have made great efforts, including conventional safety methods such as secure …
- 238000004458 analytical method 0 title abstract description 48
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ometov et al. | A survey of security in cloud, edge, and fog computing | |
Tariq et al. | A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things | |
Wang et al. | Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks | |
Le et al. | Gridattacksim: A cyber attack simulation framework for smart grids | |
Al-Aqrabi et al. | Hardware-intrinsic multi-layer security: A new frontier for 5G enabled IIoT | |
Shi et al. | Modeling and performance analysis of satellite network moving target defense system with petri nets | |
Kavallieratos et al. | Threat analysis for smart homes | |
Zhang et al. | Security performance analysis of leo satellite constellation networks under ddos attack | |
Wang et al. | Coordinated defense of distributed denial of service attacks against the multi-area load frequency control services | |
Jin et al. | Security state estimation for cyber-physical systems against DoS attacks via reinforcement learning and game theory | |
Wang et al. | A two-layer IP hopping-based moving target defense approach to enhancing the security of mobile ad-hoc networks | |
Du et al. | Formal safety assessment and improvement of DDS protocol for industrial data distribution service | |
Boodai et al. | Review of physical layer security in 5G wireless networks | |
Le et al. | Gridattackanalyzer: A cyber attack analysis framework for smart grids | |
Ying et al. | Microservice security framework for IoT by mimic defense mechanism | |
Seo et al. | D-CEWS: DEVS-based cyber-electronic warfare M&S framework for enhanced communication effectiveness analysis in battlefield | |
Tsantikidou et al. | Threats, attacks, and cryptography frameworks of cybersecurity in critical infrastructures | |
Bouzidi et al. | Lpwan cyber security risk analysis: Building a secure iqrf solution | |
Saeed et al. | Analyzing the impact of active attack on the performance of the AMCTD protocol in underwater wireless sensor networks | |
Gao et al. | A malicious behavior awareness and defense countermeasure based on LoRaWAN protocol | |
Wang et al. | A web-based honeypot in IPv6 to enhance security | |
Yildirim Yayilgan et al. | An approach for analyzing cyber security threats and attacks: a case study of digital substations in Norway | |
Yu et al. | Optimal deployment in moving target defense against coordinated cyber–physical attacks via game theory | |
Min et al. | Learning-based IRS-assisted secure transmission for mine IoTs | |
Wan et al. | A brief survey of recent advances and methodologies for the security control of complex cyber–physical networks |