conformity 发表于 2025-4-1 03:51:13
http://reply.papertrans.cn/88/8731/873097/873097_61.pngaptitude 发表于 2025-4-1 06:47:21
Blockchain Application in Space Information Network Securityis considered to have broad application prospects. However, since nodes of space information network are susceptible to a variety of cyber & physical attacks, security in space information network gives rise to a great concern. This paper proposes blockchain application in space information network成份 发表于 2025-4-1 13:51:30
Blockchain Based Distributed Network Architecturen be used to construct low-cost distributed networks. It has the characteristics of non-destructive and transparent transmission. Blockchain based network architecture can be divided into: infrastructure layer, network layer, transport layer and application layer, and it has the potential changing t割公牛膨胀 发表于 2025-4-1 15:46:09
http://reply.papertrans.cn/88/8731/873097/873097_64.pngPAD416 发表于 2025-4-1 22:18:29
Research on Internet of Things Vulnerability Based on Complex Network Attack Modeln, analyzing the vulnerability of the Internet of Things is very necessary and meaningful. The paper starts with the characteristics of the Internet of Things and firstly constructs its network attack model. And then we simulate the attack on the model according to the attack rules. Furthermore, an