{"title":"可生存网络系统:免疫方法","authors":"Huiqiang Wang, Guo-sheng Zhao, Jian Wang","doi":"10.1109/ICICSE.2008.86","DOIUrl":null,"url":null,"abstract":"Survivability has emerged as a new phase for the development of network security technique, but an accepted analysis and construction method is still lacking for it. This paper presents the similarity between biological immunity system and survivable network system, and also provides a kind of new and feasible idea for designing and implementing survivable network system.","PeriodicalId":333889,"journal":{"name":"2008 International Conference on Internet Computing in Science and Engineering","volume":"118 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Survivable Network System: An Immune Approach\",\"authors\":\"Huiqiang Wang, Guo-sheng Zhao, Jian Wang\",\"doi\":\"10.1109/ICICSE.2008.86\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Survivability has emerged as a new phase for the development of network security technique, but an accepted analysis and construction method is still lacking for it. This paper presents the similarity between biological immunity system and survivable network system, and also provides a kind of new and feasible idea for designing and implementing survivable network system.\",\"PeriodicalId\":333889,\"journal\":{\"name\":\"2008 International Conference on Internet Computing in Science and Engineering\",\"volume\":\"118 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-01-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Internet Computing in Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICSE.2008.86\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Internet Computing in Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICSE.2008.86","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survivability has emerged as a new phase for the development of network security technique, but an accepted analysis and construction method is still lacking for it. This paper presents the similarity between biological immunity system and survivable network system, and also provides a kind of new and feasible idea for designing and implementing survivable network system.