Multiple redundant flow fingerprint model based on time slots
With the increasingly widespread use of the Internet, various network security problems are frequently exposed, while the “patching” style security enhancement mechanisms cannot effectively prevent the growing security risks.The researchers in the field of network security believe that the future In...
Saved in:
| Main Authors: | Kexian LIU, Jianfeng GUAN, Wancheng ZHANG, Zhikai HE, Dijia YAN |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2023-02-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2023006 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
by: Asia Abdullah, et al.
Published: (2025-06-01) -
Robust JND-Guided Video Watermarking via Adaptive Block Selection and Temporal Redundancy
by: Antonio Cedillo-Hernandez, et al.
Published: (2025-08-01) -
Security & safety issues and endogenous security for intelligent connected vehicles
by: JIA Hongying, et al.
Published: (2024-12-01) -
Redundancy and conflict detection method for label-based data flow control policy
by: Rongna XIE, et al.
Published: (2023-10-01) -
Progress in research on active network flow watermark
by: Xiao-jun GUO, et al.
Published: (2014-07-01)