Open Access
Issue |
E3S Web Conf.
Volume 78, 2019
2018 International Seminar on Food Safety and Environmental Engineering (FSEE 2018)
|
|
---|---|---|
Article Number | 03005 | |
Number of page(s) | 4 | |
Section | Environmental Biotechnology and Environmental Equipment | |
DOI | https://doi.org/10.1051/e3sconf/20197803005 | |
Published online | 15 January 2019 |
- YANG Hua-xian, HONG Liang, WEI Zhong, et al. A Safety Design Method of GIS. GEOSPATIAL INFORMATION, 4:8-11 (2006) [Google Scholar]
- Kotenko I, Polubelova O, Saenko I. Logical Inference Framework for Security Management in Geographical Information Systems// Information Fusion and Geographic Information Systems (IF AND GIS 2013). Springer Berlin Heidelberg, 2014:203-218 (2013) [Google Scholar]
- Chun-Xia W U, Jian-Qiang L I, Xia L U. The threedimensional authorization mechanism of Grid-GIS geological resource. China Mining Magazine (2011) [Google Scholar]
- TIAN Bin SUN Jing-jie YANG Jun. A DIGITAL GIS SECURITY SOLUTION BASE ON WEB. SURVEYING AND MAPPING OF SICHUAN, 30(3):46-49 (2007) [Google Scholar]
- GONG Jian-Ya. Geographic information system foundation. Science Press (2001) [Google Scholar]
- Pandey J. geographic information system. Springer US (2001) [Google Scholar]
- WU Jiangxing. Research on Cyber Mimic Defense. Journal of Cyber Security, 1(4): 1-10 (2016) [Google Scholar]
- WU Jiangxing. Meaning and Vision of Mimic Computing and Mimic Security Defense. Telecommunications Science, 30 (7): 1-7 (2014) [Google Scholar]
- WU Jiangxing. Introduction to Cyberspace Mimic Defense. Beijing:Science Press (2017) [Google Scholar]
- Hu Hongchao, Chen Fucai, Wang Zhenpeng. Performance Evaluations on DHR for Cyberspace Mimic Defense. Journal of Cyber Security, 1 (4) :40-51 (2016) [Google Scholar]
- Tong Qing, Zhang Zheng, Zhang Weihua, et al. Design and Implementation of Mimic Defense Web Server. Journal of Software, 28 (4) :883-897 (2017) [Google Scholar]
- Ma Hailong, Yi Peng, Jiang Yiming, et al. Dynamic Heterogeneous Redundancy Based Router Architecture with Mimic Defenses. Journal of Cyber Security, 2 (1): 29-42 (2017) [Google Scholar]
- Wang Zhenpeng, Hu Hongchao, Cheng Guozhen. Design and Implementation of Mimic Network Operating System. Journal of Computer Research and Development, 54(10): 2321-2333 (2017) [Google Scholar]
- Wang Zhenpeng, Hu Hongchao, Cheng Guozhen. A DNS Architecture Based on Mimic Security Defense. Acta Electronica Sinica (11): 2705-2714 (2017) [Google Scholar]
- Li B, Zhou Q, Si X. Mimic computing for password recovery. Future Generation Computer Systems, (2018) [Google Scholar]
- WEI Shuai, YU Hong, GU Zeyu, ZHANG Xingming. Architecture of Mimic Security Processor for Industry Control System. Journal of Cyber Security, 2(1):54-73 (2017) [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.