期刊文献+
共找到535篇文章
< 1 2 27 >
每页显示 20 50 100
TrustZone半虚拟化与容器化实现机制
1
作者 余发江 王朝州 《信息网络安全》 北大核心 2025年第10期1523-1536,共14页
TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种Tr... TrustZone广泛应用于移动平台,随着ARM CPU在云服务中大量部署,利用TrustZone增强虚拟机计算环境和数据的安全性需求日益凸显。但基础的TrustZone提供的硬件可信执行环境通常仅支持主机上的应用程序使用。为解决这一问题,文章提出一种TrustZone半虚拟化与容器化实现机制pvTEE,使虚拟机或容器中的客户能够高效、并行利用主机平台的可信执行环境运行可信应用。pvTEE通过前端驱动vTEEdriver、虚拟设备vTEE、主机代理程序vTEEproxy以及后端驱动TEEdriver,将虚拟机或容器内客户的调用请求转发至可信执行环境中的可信应用执行。主机、虚拟机和容器中的客户仅可调用自身场景的可信应用,无法访问其他应用。同时,主机、虚拟机及容器各自有独立的日志获取能力与安全存储服务。pvTEE基于ARMv8.2 CPU服务器、QEMU KVM虚拟机和Docker容器实现,实验结果表明,客户在虚拟机中调用可信应用完成一次RSA加解密操作,相比在主机场景中仅增加约6%的时间开销。 展开更多
关键词 trustZONE 可信执行环境 虚拟化 容器化 云服务
在线阅读 下载PDF
A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking 被引量:7
2
作者 Yu-Chao Liu Yu-Tao Ma +2 位作者 Hai-Su Zhang De-Yi Li Gui-Sheng Chen 《International Journal of Automation and computing》 EI 2011年第3期280-285,共6页
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dyn... With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtuMized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security. 展开更多
关键词 cloud computing cloud security trust management cloud watermarking data coloring.
在线阅读 下载PDF
An Evaluation Approach of Subjective Trust Based on Cloud Model 被引量:5
3
作者 Shouxin Wang Li Zhang +1 位作者 Na Ma Shuai Wang 《Journal of Software Engineering and Applications》 2008年第1期44-52,共9页
As online trade and interactions on the internet are on the rise, a key issue is how to use simple and effective evaluation methods to accomplish trust decision-making for customers. It is well known that subjective t... As online trade and interactions on the internet are on the rise, a key issue is how to use simple and effective evaluation methods to accomplish trust decision-making for customers. It is well known that subjective trust holds uncertainty like randomness and fuzziness. However, existing approaches which are commonly based on probability or fuzzy set theory can not attach enough importance to uncertainty. To remedy this problem, a new quantifiable subjective trust evaluation approach is proposed based on the cloud model. Subjective trust is modeled with cloud model in the evaluation approach, and expected value and hyper-entropy of the subjective cloud is used to evaluate the reputation of trust objects. Our experimental data shows that the method can effectively support subjective trust decisions and provide a helpful exploitation for subjective trust evaluation. 展开更多
关键词 SUBJECTIVE trust cloud MODEL trust DECISION-MAKING
在线阅读 下载PDF
Trusted Data Acquisition Mechanism for Cloud Resource Scheduling Based on Distributed Agents 被引量:4
4
作者 李小勇 杨月华 《China Communications》 SCIE CSCD 2011年第6期108-116,共9页
Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation... Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation and scheduling are extremely important challenges in cloud infrastructure. Based on distributed agents, this paper presents trusted data acquisition mechanism for efficient scheduling cloud resources to satisfy various user requests. Our mechanism defines, collects and analyzes multiple key trust targets of cloud service resources based on historical information of servers in a cloud data center. As a result, using our trust computing mechanism, cloud providers can utilize their resources efficiently and also provide highly trusted resources and services to many users. 展开更多
关键词 cloud computing trusted computing distributed agent resource scheduling
在线阅读 下载PDF
Trust Assessment Model Based on a Zero Trust Strategy in a Community Cloud Environment 被引量:2
5
作者 Rodrigue N’goran Jean-Louis Tetchueng +2 位作者 Ghislain Pandry Yvon Kermarrec Olivier Asseu 《Engineering(科研)》 CAS 2022年第11期479-496,共18页
The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminate... The adoption of Cloud Computing services in everyday business life has grown rapidly in recent years due to the many benefits of this paradigm. The various collaboration tools offered by Cloud Computing have eliminated or reduced the notion of distance between entities of the same company or between different organizations. This has led to an increase in the need to share resources (data and services). Community Cloud environments have thus emerged to facilitate interactions between organizations with identical needs and with specific and high security requirements. However, establishing trust and secure resource sharing relationships is a major challenge in this type of complex and heterogeneous environment. This paper proposes a trust assessment model (SeComTrust) based on the Zero Trust cybersecurity strategy. First, the paper introduces a community cloud architecture subdivided into different security domains. Second, it presents a process for selecting a trusted organization for an exchange based on direct or recommended trust value and reputation. Finally, a system for promoting or relegating organizations in the different security domains is applied. Experimental results show that our model guarantees the scalability of a community cloud with a high success rate of secure and quality resource sharing. 展开更多
关键词 trust Management Resources Sharing Community cloud Zero trust
在线阅读 下载PDF
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing 被引量:1
6
作者 Jie Zhu Guoyuan Lin +2 位作者 Fucheng You Huaqun Liu Chunru Zhou 《China Communications》 SCIE CSCD 2016年第7期83-91,共9页
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed... This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown. 展开更多
关键词 cloud computing virtual machine trustworthiness measurement dynamic trust transfer
在线阅读 下载PDF
Trusted Heartbeat Framework for Cloud Computing 被引量:1
7
作者 Dipen Contractor Dhiren Patel Shreya Patel 《Journal of Information Security》 2016年第3期103-111,共9页
In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunct... In cloud computing environment, as the infrastructure not owned by users, it is desirable that its security and integrity must be protected and verified time to time. In Hadoop based scalable computing setup, malfunctioning nodes generate wrong output during the run time. To detect such nodes, we create collaborative network between worker node (i.e. data node of Hadoop) and Master node (i.e. name node of Hadoop) with the help of trusted heartbeat framework (THF). We propose procedures to register node and to alter status of node based on reputation provided by other co-worker nodes. 展开更多
关键词 trusted Heartbeat cloud Computing Hadoop Framework REPUTATION Attestation
在线阅读 下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
8
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 MOBILE internet cloud COMPUTING MOBILE agent system SUBJECTIVE trust dynamic trust management
在线阅读 下载PDF
A Multi-dimensional Trust-aware Cloud Service Selection Mechanism Based on Evidential Reasoning Approach 被引量:4
9
作者 Wen-Juan Fan Shan-Lin Yang +1 位作者 Harry Perros Jun Pei 《International Journal of Automation and computing》 EI CSCD 2015年第2期208-219,共12页
In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boo... In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boosting cloud services are offered through the internet and some of them may be not reliable or even malicious, how to select trustworthy cloud services for cloud users is a big challenge. In this paper, we propose a multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning(ER) approach that integrates both perception-based trust value and reputation based trust value, which are derived from direct and indirect trust evidence respectively, to identify trustworthy services. Here, multi-dimensional trust evidence, which reflects the trustworthiness of cloud services from different aspects, is elicited in the form of historical users feedback ratings. Then, the ER approach is applied to aggregate the multi-dimensional trust ratings to obtain the real-time trust value and select the most trustworthy cloud service of certain type for the active users. Finally, the fresh feedback from the active users will update the trust evidence for other service users in the future. 展开更多
关键词 cloud service selection multi-dimensional trust evidence trust and reputation evaluation evidential reasoning(ER) clond service
原文传递
Trustworthy Assurance of Service Interoperation in Cloud Environment 被引量:6
10
作者 Bing Li Bu-Qing Cao +1 位作者 Kun-Mei Wen Rui-Xuan Li 《International Journal of Automation and computing》 EI 2011年第3期297-308,共12页
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c... Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation. 展开更多
关键词 Quality of service (QoS) trust service discovery service interoperation service invocation success-rate cloud computing.
在线阅读 下载PDF
Shared Resource Quality Monitoring and Dynamic Trust Management in a Community Cloud
11
作者 Rodrigue N’goran Linda N. Vallee +3 位作者 Grâce Y. E. Johnson Jean-Louis Tetchueng Yvon Kermarrec Olivier Asseu 《Open Journal of Applied Sciences》 CAS 2022年第11期1898-1914,共17页
The collaboration tools offered by Cloud Computing have increased the need to share data and services within companies or between autonomous organizations. This has led to the deployment of community cloud infrastruct... The collaboration tools offered by Cloud Computing have increased the need to share data and services within companies or between autonomous organizations. This has led to the deployment of community cloud infrastructures. However, several challenges will arise from this grouping of heterogeneous organizations. One of the main challenges is the management of trust between the actors of the community. Trust issues arise from the uncertainty about the quality of the resources and entities involved. The quality of a resource can be examined from a security or functional perspective. Therefore, ensuring security and monitoring the quality of resources is to ensure a high level of trust. Therefore, we propose in this paper a technique for dynamic trust management and quality monitoring of resources shared between organizations. Our approach consists, on the one hand, in evaluating the quality of resources based on quality of service measurement attributes and, on the other hand, in updating the trust values according to the information deduced from these measurements. The proposed framework is evaluated in terms of resource sharing success rate and execution time. Experimental results and comparison with TNA-SL and InterTrust models show that the framework can identify and track the behavior of malicious organizations with relatively low execution time. 展开更多
关键词 SMI (Service Measure Index) trust Management SLA QOS Community cloud
在线阅读 下载PDF
Trust Based Meta-Heuristics Workflow Scheduling in Cloud Service Environment
12
作者 G. Jeeva Rathanam A. Rajaram 《Circuits and Systems》 2016年第4期520-531,共12页
Cloud computing has emerged as a new style of computing in distributed environment. An efficient and dependable Workflow Scheduling is crucial for achieving high performance and incorporating with enterprise systems. ... Cloud computing has emerged as a new style of computing in distributed environment. An efficient and dependable Workflow Scheduling is crucial for achieving high performance and incorporating with enterprise systems. As an effective security services aggregation methodology, Trust Work-flow Technology (TWT) has been used to construct composite services. However, in cloud environment, the existing closed network services are maintained and functioned by third-party organizations or enterprises. Therefore service-oriented trust strategies must be considered in workflow scheduling. TWFS related algorithms consist of trust policies and strategies to overcome the threats of the application with heuristic workflow scheduling. As a significance of this work, trust based Meta heuristic workflow scheduling (TMWS) is proposed. The TMWS algorithm will improve the efficiency and reliability of the operation in the cloud system and the results show that the TMWS approach is effective and feasible. 展开更多
关键词 Workflow Scheduling cloud Computing trust Metrics META-HEURISTICS trust Strategies
在线阅读 下载PDF
基于TrustZone的可信移动终端云服务安全接入方案 被引量:29
13
作者 杨波 冯登国 +1 位作者 秦宇 张英骏 《软件学报》 EI CSCD 北大核心 2016年第6期1366-1383,共18页
可信云架构为云计算用户提供了安全可信的云服务执行环境,保护了用户私有数据的计算与存储安全.然而在移动云计算高速发展的今天,仍然没有移动终端接入可信云服务的安全解决方案.针对上述问题,提出了一种可信移动终端云服务安全接入方案... 可信云架构为云计算用户提供了安全可信的云服务执行环境,保护了用户私有数据的计算与存储安全.然而在移动云计算高速发展的今天,仍然没有移动终端接入可信云服务的安全解决方案.针对上述问题,提出了一种可信移动终端云服务安全接入方案.方案充分考虑了移动云计算应用背景,利用ARM Trust Zone硬件隔离技术构建可信移动终端,保护云服务客户端及安全敏感操作在移动终端的安全执行.结合物理不可克隆函数技术,给出了移动终端密钥与敏感数据管理机制.在此基础上,借鉴可信计算技术思想设计了云服务安全接入协议.协议兼容可信云架构,提供云服务端与移动客户端间的端到端认证.分析了方案具备的6种安全属性,给出了基于方案的移动云存储应用实例,实现了方案的原型系统.实验结果表明:可信移动终端TCB较小,方案具有良好的可扩展性和安全可控性,整体运行效率较高. 展开更多
关键词 移动云计算 可信计算 可信移动终端 安全接入 trust Zone 物理不可克隆函数(PUF)
在线阅读 下载PDF
基于TrustZone的移动云环境指纹认证终端APP的设计和实现 被引量:1
14
作者 王志恒 徐彦彦 《计算机应用》 CSCD 北大核心 2020年第11期3255-3260,共6页
针对指纹等生物特征在云环境下存在泄露的安全隐患,以及已有的生物特征认证方案安全性或便利性不足的问题,设计并实现了基于正交分解和TrustZone的可信指纹认证终端APP。利用TrustZone的硬件隔离机制,在可信执行环境中完成指纹特征提取... 针对指纹等生物特征在云环境下存在泄露的安全隐患,以及已有的生物特征认证方案安全性或便利性不足的问题,设计并实现了基于正交分解和TrustZone的可信指纹认证终端APP。利用TrustZone的硬件隔离机制,在可信执行环境中完成指纹特征提取、指纹模板生成等敏感操作,与普通执行环境中的应用隔离,从而抵挡恶意程序的攻击,保证认证过程的安全性。基于正交分解算法生成的指纹模板在保证可匹配性的同时融合了随机噪声,可以在一定程度上抵挡针对特征模板的攻击,使得指纹模板可以在云环境下存储和传输,解除用户与设备的绑定,提升了生物认证的便利性。实验和理论分析表明,指纹模板的相关性和随机性比原始特征和随机映射算法更高,有更强的安全性;另外时间和存储开销、识别的准确性的实验结果表明,所设计APP兼顾便利性和安全性,满足移动云环境下安全认证的需求。 展开更多
关键词 trustZONE 可信认证 指纹识别 可信应用 云安全
在线阅读 下载PDF
电气教学虚拟实验室云端权限访问控制方法
15
作者 林羽 《计算机应用文摘》 2026年第3期206-208,211,共4页
为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分... 为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分为近期行为与历史行为,实现动态更新,整体架构涵盖实验室配置、权限分配、资源访问及行为评估4个模块;在计算访问权限综合信任值时,对各类行为属性进行细粒度量化,通过逐层计算得到最终的综合信任评估结果;在权限控制环节,结合节点信任相似度计算、身份验证等多维因素,应用角色激活与权限分配机制实现动态、精准的权限调控。 展开更多
关键词 电气教学 虚拟实验室 云端访问结构 权限控制 用户信任值
在线阅读 下载PDF
Formal Protection Architecture for Cloud Computing System 被引量:1
16
作者 Yasha Chen Jianpeng Zhao +1 位作者 Junmao Zhu Fei Yan 《ZTE Communications》 2014年第2期63-66,共4页
Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigo... Cloud computing systems play a vital role in national security. This paper describes a conceptual framework called dualsystem architecture for protecting computing environments. While attempting to be logical and rigorous, formalism method is avoided and this paper chooses algebra Communication Sequential Process. 展开更多
关键词 formal method trusted computing PRIVACY cloud computing
在线阅读 下载PDF
A New Kind of Subjective Trust Model 被引量:1
17
作者 ZHANG Guangwei KANG Jianchu +3 位作者 LUO Ziqiang MENG Xiangyi FANG Peici LI Deyi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1457-1461,共5页
Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we ... Based on the outstanding characteristics of Cloud Model on the process of transforming a qualitative concept to a set of quantitative numerical values, a formalized model of subjective trust is introduced by which we can transform between qualitative reputation and quantitative voting data. The present paper brings forward algorithms to compute direct trust and recommender trust. Further more, an effective similarity measuring method used to distinguish two users' reputation on knowledge level is also proposed. The given model properly settles the uncertainty and fuzziness properties of subjective trust which is always the weakness of traditional subjective trust model, and provides a step in the direction of proper understanding and definition of human trust. 展开更多
关键词 subjective trust REPUTATION opens network cloud model UNCERTAINTY FUZZINESS
在线阅读 下载PDF
A measurement approach of trust relation in web service
18
作者 WANG Shou-xin ZHANG Li WANG Shuai 《通讯和计算机(中英文版)》 2009年第8期9-17,共9页
关键词 信任关系 网络服务 测量方法 分布式网络环境 网站 服务质量 WEB服务 模糊性
在线阅读 下载PDF
一种云原生TEE服务共享机制
19
作者 卢笛 刘玉佳 +3 位作者 吕超越 孙梦娜 张清文 杨力 《信息网络安全》 北大核心 2025年第11期1774-1791,共18页
网络化智能终端在开放环境中长期面临多样化的安全威胁。可信执行环境(TEE)虽可为终端敏感程序提供硬件级隔离执行环境,但其安全能力局限于单设备内部,难以构建跨设备的安全服务体系,致使大量不具备TEE的终端无法开展硬件级机密计算,从... 网络化智能终端在开放环境中长期面临多样化的安全威胁。可信执行环境(TEE)虽可为终端敏感程序提供硬件级隔离执行环境,但其安全能力局限于单设备内部,难以构建跨设备的安全服务体系,致使大量不具备TEE的终端无法开展硬件级机密计算,从而造成TEE安全覆盖不足问题。因此,文章提出一种云原生TEE服务共享机制,利用云端TEE及其充裕的计算资源,为缺乏TEE的终端设备提供远程机密计算能力。该机制以轻量化云端机密虚拟机(CVM)作为隔离执行环境,为远程终端提供TEE服务;同时,通过构建安全通信信道以及基于零知识证明的设备认证与密钥协商协议,确保远程TEE服务过程的机密性、完整性及抗重放攻击能力。原型系统基于Intel TDX平台设计并实现。实验结果表明,该机制能够有效将TEE安全能力扩展至终端设备,其远程执行性能接近常规虚拟机,验证了该方案的有效性与可用性。 展开更多
关键词 可信执行环境 云原生 服务共享 机密计算
在线阅读 下载PDF
基于深度学习和信任度量的云平台自适应恶意攻击检测与响应算法
20
作者 王东岳 刘浩 《计算技术与自动化》 2025年第2期44-48,共5页
由于提取的云平台数据特征与异常行为相关性不高,云平台自适应恶意攻击检测效果不佳。因此,设计了基于深度学习和信任度量的云平台自适应恶意攻击检测与响应算法。利用传感器采集云平台数据,并对其进行平滑计算和规范化处理,再对其进行... 由于提取的云平台数据特征与异常行为相关性不高,云平台自适应恶意攻击检测效果不佳。因此,设计了基于深度学习和信任度量的云平台自适应恶意攻击检测与响应算法。利用传感器采集云平台数据,并对其进行平滑计算和规范化处理,再对其进行聚类分析,在深度学习网络的作用下,提取出云平台运行数据的多个特征,并计算其信任度值,通过计算自适应控制函数,构建恶意攻击检测模型,将检测结果作为基础,计算恶意攻击带来的风险值,由此设计恶意攻击响应机制。以某云平台为实验对象的测试结果表明该算法在实际应用中检出率较高,检测效果较好。 展开更多
关键词 深度学习 信任度量 云平台 恶意攻击 攻击响应 攻击检测算法 算法设计
在线阅读 下载PDF
上一页 1 2 27 下一页 到第
使用帮助 返回顶部