Revelation of the Heterogeneous Redundancy Architecture

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It can be seen from the foregoing chapters that the biggest security threat in cyberspace is uncertain attacks based on the unknown vulnerabilities of the target object, and the biggest defense concern lies in the ability of reliably addressing uncertain attacks based on unknown factors in the absence of priori knowledge. The theoretical challenge is how to quantify the effectiveness of defense against uncertain attacks. In order to change the current situation where cyberspace cannot effectively prevent uncertain threats, the following scientific issues must be tackled:

Cite

CITATION STYLE

APA

Wu, J. (2020). Revelation of the Heterogeneous Redundancy Architecture. In Wireless Networks(United Kingdom) (pp. 207–271). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29844-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free