|
|
|
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute...
ver más
|
|
|
|
|
|
|
Zhi-Peng Yang, Lu Hua, Ning-Jie Gao, Ru Huo, Jiang Liu and Tao Huang
Blockchain is becoming more and more popular in various fields. Since the information transmission mode of the blockchain is data broadcasting, the traditional TCP/IP network cannot support the blockchain system well, but the Named-Data Networking (NDN) ...
ver más
|
|
|
|