In Chap. 9, we described the basic principles of mimic defense. In this chapter, we will focus on the basic conditions and constraints for mimic defense engineering and implementation, the key implementation mechanisms, major issues, and possible approaches and solutions. We will also briefly explore how to test and evaluate the mimic defense.
CITATION STYLE
Wu, J. (2020). Engineering and Implementation of Mimic Defense. In Wireless Networks(United Kingdom) (pp. 495–560). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29844-9_10
Mendeley helps you to discover research relevant for your work.