作者: Siying Yang
DOI:
关键词: State (computer science) 、 Computer security 、 Action (philosophy) 、 Security policy 、 Computer science 、 Selection (relational algebra)
摘要: In one embodiment, a method of improving the security computing device comprises using that has received or more messages have been determined as unauthorized, obtaining plurality state data values from device, messages, and second computer; before admitting to communications network is configured protect: pseudo-random selection logic, based on values, pseudo-randomly selecting particular policy action among different stored actions; acting upon action; wherein performed devices.