News

To address the challenge that DHR system services face in coping with common vulnerability attacks, this paper proposes an algorithm to optimize the rules for constructing the executor. First, the ...