CN111988317A
|
|
Judgment method and device based on network information analysis result
|
CN111949950A
|
|
Heterogeneous method and system of application software
|
CN111796913A
|
|
Lightweight virtualization implementation method and system for mimicry Web service
|
CN111783080A
|
|
Active protection method and system for application program
|
CN111666562A
|
|
Active defense method and system for software security
|
CN111586060A
|
|
State transition model-based mimicry defense architecture security quantification method and system
|
CN111459832A
|
|
Heterogeneous compilation algorithm feasibility evaluation method and system
|
CN111368307A
|
|
Active defense method and system
|
CN111343176A
|
|
Network attack countering device, method, storage medium and computer equipment
|
CN111338942A
|
|
Software diversity evaluation method and system
|
CN110569032A
|
|
Method and device for judging application label of script language interpreter
|
CN110610068A
|
|
Method and device for application isomerization
|
CN110502893A
|
|
A kind of method and system of java virtual machine level voting
|
CN110162974A
|
|
Database attack defence method and system
|
CN109257445A
|
|
A kind of Web service dynamic dispatching method and dynamic scheduling system
|
CN109413081A
|
|
A kind of Web service dispatching method and scheduling system
|
CN109218322A
|
|
A kind of mimicry defence method, apparatus and system
|
CN109344612A
|
|
The active defense method and system inversely attacked for program code static analysis
|
CN108900558A
|
|
A kind of access request processing method and system
|