Jianmin Pang's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (2)
Cyberspace mimic defense has been proven to be a revolutionary defense technology that “changes the rules of the game” to ensure the security of cyberspace. However, the software diversity inherent in mimic defense technology may increase the difficulty in managing software executable binaries, especially when updating or debugging a software. In t...
Citations
... Among multiple possibilities to address corresponding security threats, Security through Diversity is a suitable design approach. While state of the art literature discusses corresponding concepts in generic terms [10][11], specific implementation solutions meeting essential requirements and related testing scenarios need to be developed in order to make the concepts applicable to related RED Articles. Below, we will outline how related concepts can be implemented supporting Article 3(3)(e) and 3(3)(f) requirements through the reconfiguration architecture designs currently developed by ETSI [6]. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 Radio Equipment, Article 3(3)(e) related to Privacy and Article 3(3)(f) related to protection against fraud and cybersecurity. ...
... The first problem before deployment of an application is to decide the right number of variants it needed. In our previous work [19], we propose a software assignment algorithm which can help the user decide the right number of variants for an application defending worm-like attacks. ...