CN116866085A - Network security exercise management analysis method, device and medium - Google Patents

Network security exercise management analysis method, device and medium Download PDF

Info

Publication number
CN116866085A
CN116866085A CN202311117039.7A CN202311117039A CN116866085A CN 116866085 A CN116866085 A CN 116866085A CN 202311117039 A CN202311117039 A CN 202311117039A CN 116866085 A CN116866085 A CN 116866085A
Authority
CN
China
Prior art keywords
information
network security
event
management analysis
exercise management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311117039.7A
Other languages
Chinese (zh)
Inventor
武建双
宋超
许建锋
刘江涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Tianwei Information Security Technology Co ltd
Original Assignee
Hefei Tianwei Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Tianwei Information Security Technology Co ltd filed Critical Hefei Tianwei Information Security Technology Co ltd
Priority to CN202311117039.7A priority Critical patent/CN116866085A/en
Publication of CN116866085A publication Critical patent/CN116866085A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a network security exercise management analysis method, a device and a medium, wherein the method comprises the following steps: acquiring target event information, target unit information corresponding to the target event information, account information of a referee and basic information of a competition team; selecting corresponding team members to participate in the game according to the basic information of the team members to participate in the game; verifying the loophole mining result of the target unit system uploaded by the contestant, and finishing the detailed information of the loophole mining process and the loophole to form and store electronic loophole materials in a document or other visual formats; when the vulnerability mining result is checked and passed, adding corresponding points to the competition team corresponding to the competition team members according to the vulnerability mining process and detailed information of the vulnerability, and displaying ranking information of the competition team. The whole life cycle of the event is covered from the creation of the event to the creation of the competitors and referees, to the submission and examination of attack results, and the like, so that the state of the event at any stage can be controlled conveniently.

Description

Network security exercise management analysis method, device and medium
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a network security exercise management analysis method, a device and a medium.
Background
At present, information technologies such as the Internet of things, cloud computing, big data, mobile interconnection and the like are rapidly developed and widely applied. With the introduction of new generation information technology, the intelligent information service system is enabled to promote intelligence and improve the information service quality, and meanwhile, more network security threats are faced, and the network security attack and defense exercise system plays an important role in coping with the network security threats. The network security attack and defense exercise is to take the purpose of acquiring rights and sinking a specified target machine by means of unlimited means and paths. The attack and defense exercise in the real network is performed, the real network attack is simulated to the maximum extent by adopting a mode without limiting attack paths and attack means, so that the safety protection and emergency handling capacity of a defender is checked, an emergency response team is trained, and the comprehensive prevention and control capacity of network safety is improved.
At present, a unified management command platform for attack and defense exercise hardly exists in the network security market, so that the whole state of a normal network security attack and defense event is difficult to master, and a complete set of unified management command platform is not available for unified command of the attack and defense exercise event, so that the comprehensive prevention and control capability of network security is greatly affected.
Based on the analysis of the prior art, it is needed to provide a network security exercise management analysis platform, which can cover the state information from the creation of a match to the creation of competitors and referees, the creation of units and target systems, and the real-time state of a large screen in the match and the submitting and auditing of attack results.
Disclosure of Invention
The invention provides a network security exercise management analysis method, a device and a medium, which can solve the defects existing in the prior art, and can cover the whole life cycle of the event from the creation of the event to the creation of a competitor, a referee, the creation of a unit and a target system, the real-time state of a large screen in the event, the submitting and checking of attack results and the like, and can control the state of the event at any stage.
In order to achieve the above purpose, the invention adopts the following technical scheme:
in a first aspect, the present invention provides a network security exercise management analysis method, where the method uses event basic information as a carrier, and is implemented by a network security exercise management analysis system, and includes the following implementation steps:
s1, acquiring target event information, target unit information corresponding to the target event information, account information of a referee and basic information of a team for competition, wherein the target event information comprises at least one of basic information, a sponsoring unit and site information of an event, and the target unit information comprises detailed information of a target unit system.
S2, selecting corresponding team members to participate in the game according to the basic information of the team members to participate in the game.
S3, auditing the loophole mining result of the target unit system uploaded by the team members, and finishing detailed information of the loophole mining process and loopholes to form documents or other electronic loophole materials in a visual format and storing the documents or other electronic loophole materials.
And S4, when the vulnerability mining result is checked and passed, adding corresponding points for the competition warriors corresponding to the competition warriors according to the vulnerability mining process and the detailed information of the vulnerability, and displaying ranking information of the competition warriors.
Still further, the network security exercise management analysis system comprises an event management module, a target unit management module, a team and competitor management module, a judge management module, an attack result uploading module and an auditing module, wherein the event management module is used for inputting event basic information, the target unit management module is used for inputting and managing target units to be attacked and detailed information of the target unit system, the team and competitor management module is used for managing competitor teams and staff, account numbers of the team and competitors are generated and supervised, the judge management module is used for creating and monitoring the judge account numbers of the event, the attack result uploading module is used for uploading attack results, and comprises documents or other electronic vulnerability materials in visual format, and the auditing module is used for auditing vulnerability excavation results uploaded by the competitors whether the vulnerability excavation results are effective or not and increasing the team score after the auditing is passed.
Furthermore, the network security exercise management analysis system also comprises a large-screen competition module, wherein the large-screen competition module is used for displaying all real-time state information in a competition.
Furthermore, the network security exercise management analysis system is constructed by a SpringCloud, springboot framework and combining a database mysql and a non-relational database Redis; the network security exercise management analysis system adopts transverse expansion longitudinal management and supports a mode of multistage deployment management.
Further, the detailed information of the target unit system comprises a system name and access address information, and the ranking information of the team for competition comprises a team ranking and an attacked condition.
Furthermore, the method adopts RESTFUL network application program to control the running state of the event, observe the running direction of the event and make proper adjustment in real time, and is provided with an acquisition interface for providing data to the inside or the outside.
Furthermore, each target unit system presets the loopholes which can be excavated and sets different scores according to the difficulty level, and the players are arranged into electronic document materials and provided to the host or uploaded to the network security exercise management analysis system, and judges whether the loopholes really exist according to the electronic document materials; the network security exercise management analysis system adopts a document analysis technology, firstly inputs detailed information related to the loopholes in the electronic document materials, when a contestant uploads an attack result, the contestant is required to fill in the system name, the loophole name and the type of a target unit corresponding to the loopholes, then compares the loophole information input by the contestant with a loophole library of a system of the target unit input by the network security exercise management analysis system, judges that the loopholes really exist if the system name, the loophole name and the type of the target unit are the same, and judges that the loopholes pass the examination, and judges that the loopholes do not exist if the system name, the loophole name and the type of the target unit are different.
Further, 300 points, 200 points and 100 points are preset for each vulnerability according to the difficulty level of excavation, the score is calculated according to the score of the battle through submitting and checking the ranking of the battle, the proportion of the primary score obtained by the first name is 100%, the proportion of the primary score obtained by each descending name is reduced by 10%, and the proportion of the primary score obtained by the lowest name is up to 50%.
In a second aspect, the present invention provides a network security exercise management analysis device, including a memory and a processor, where the memory stores computer executable instructions, and the processor is configured to execute the computer executable instructions, and the computer executable instructions implement the network security exercise management analysis method when executed by the processor.
In a third aspect, the present invention provides a computer readable storage medium, on which a computer program is stored, the computer program when executed by a processor implementing the network security exercise management analysis method.
Compared with the prior art, the invention has the beneficial effects that:
the method constructs a complete safe exercise management business flow, from the creation of the competition to the creation of competitors and referees, the creation of units and target systems, and then to the real-time state of a large screen in the competition, the submission and examination of attack results, and the like, covers the whole life cycle of the competition, and can control the state of the competition at any stage. The competition running state can be watched in real time through the competition large screen, the competition running state can be properly regulated, the whole process of the competition is recorded in the system, the archiving and analysis after the competition are convenient, and the labor cost and the off-line cost are greatly saved through the complete on-line use flow.
2. The invention is based on the basic information input of event management, and the modules of target unit management, battle team and competitor management, judge management, attack result uploading and auditing and the like are implemented by taking the event basic information as a carrier, and the auditing result can be combined with artificial intelligence judgment by judging experience of judge, thereby ensuring the authenticity of the competition auditing result and the fairness of the competition. The network security exercise management analysis system adopts a mode of transversely expanding and longitudinally managing and supporting multistage deployment management, can better control the running state of the event, observe the running direction of the event in real time, make proper adjustment in real time and the like, and improves the event.
Drawings
Fig. 1 is a block diagram of a network security exercise management analysis flow disclosed in embodiment 1 of the present invention.
Fig. 2 is a schematic diagram of the network security exercise management analysis system disclosed in embodiment 1 of the present invention.
Fig. 3 is a schematic diagram of a judge audit attack result process disclosed in embodiment 1 of the present invention.
Detailed Description
Example 1:
referring to fig. 1, the embodiment discloses a network security exercise management analysis method, which uses event basic information as a carrier, and is implemented by a network security exercise management analysis system, and includes the following implementation steps:
s1, acquiring target event information, target unit information corresponding to the target event information, account information of referees and basic information of a competition team, wherein the target event information comprises at least one of basic information, sponsoring units and site information of the event, and the target unit information comprises detailed information of a target unit system.
S2, selecting corresponding team members to participate in the game according to the basic information of the team members to participate in the game.
S3, auditing the loophole mining result of the target unit system uploaded by the team members, and finishing detailed information of the loophole mining process and loopholes to form documents or other electronic loophole materials in a visual format and storing the documents or other electronic loophole materials.
And S4, when the vulnerability mining result is checked and passed, adding corresponding points for the team corresponding to the team members according to the vulnerability mining process and detailed information of the vulnerability, and displaying ranking information of the team members.
The detailed information of the target unit system comprises system names and access address information, and the ranking information of the team in competition comprises team ranking and attacked conditions. The method adopts RESTFUL network application program to control the running state of the event, observe the running direction of the event and make proper adjustment in real time, and is provided with an acquisition interface which can provide data for the interior or the exterior.
Referring to fig. 3, each target unit system presets a hole which can be mined and sets different scores according to difficulty, namely 300 scores, 200 scores and 100 scores, and players sort the hole into electronic document materials and provide the electronic document materials to a host or upload the electronic document materials to a network security exercise management analysis system, so that a referee judges whether the hole really exists or not according to the electronic document materials.
Uploading electronic document materials arranged by the participants to a network security exercise management analysis system, firstly inputting detailed information related to the loopholes in the electronic document materials by the network security exercise management analysis system through a document analysis technology, when the participants upload attack results, requiring to fill in the names, the names and the types of target unit systems corresponding to the loopholes, comparing the loopholes input by the participants with a loophole library of the target unit systems input by the network security exercise management analysis system, judging that the loopholes really exist if the names, the names and the types of the target unit systems are the same, judging that the loopholes pass the examination, and judging that the loopholes do not exist if the names, the names and the types of the target unit systems are different, and judging that the examination does not pass the examination.
In the aspect of corresponding points increased by the warfare, each vulnerability is respectively preset to 300 points, 200 points and 100 points according to the difficulty level of excavation, the points increased by the warfare are calculated according to the grades submitted and audited through the warfare, the proportion of the primary points obtained by the first name is 100%, the proportion of the primary points obtained by each descending name is reduced by 10%, and the proportion of the primary points obtained by the lowest name is up to 50%.
Referring to fig. 2, the network security exercise management analysis system includes an event management module, a target unit management module, a team and competitor management module, a judge management module, an attack result uploading module and an auditing module, wherein the event management module is used for inputting basic event information, the target unit management module is used for inputting and managing target units to be attacked and detailed information of the target unit system, the team and competitor management module is used for managing competitor teams and staff, generating and supervising accounts of the team and competitor, the judge management module is used for creating and monitoring accounts of judges of the event, the attack result uploading module is used for uploading attack results, including documents or other vulnerability visual format electronic vulnerability materials, and the auditing module is used for auditing whether the mining results uploaded by the competitor and the auditing mining results are valid or not and increasing the team score after the auditing is passed.
Specifically, the network security exercise management analysis system is constructed by a SpringCloud, springboot framework and combining a database mysql and a non-relational database Redis; the network security exercise management analysis system adopts a transverse extension longitudinal management mode and supports a mode of multistage deployment management.
Example 2:
the embodiment discloses a network security exercise management analysis device, which comprises a memory and a processor, wherein the memory stores computer executable instructions, the processor is configured to run the computer executable instructions, and the computer executable instructions realize the network security exercise management analysis method disclosed in the embodiment 1 when being run by the processor.
Example 3:
the present embodiment discloses a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the network security exercise management analysis method disclosed in embodiment 1.

Claims (10)

1. The network security exercise management analysis method is characterized in that the method takes event basic information as a carrier, is executed by a network security exercise management analysis system and comprises the following implementation steps:
s1, acquiring target event information, target unit information corresponding to the target event information, account information of referees and basic information of a team for competition, wherein the target event information comprises at least one of basic information, sponsoring units and place information of an event, and the target unit information comprises detailed information of a target unit system;
s2, selecting corresponding competitors to participate in the competition according to the basic information of the competition warfare;
s3, auditing the loophole mining result of the target unit system uploaded by the team members, and finishing detailed information of the loophole mining process and loopholes to form documents or other electronic loophole materials in a visual format and storing the documents or other electronic loophole materials;
and S4, when the vulnerability mining result is checked and passed, adding corresponding points for the competition warriors corresponding to the competition warriors according to the vulnerability mining process and the detailed information of the vulnerability, and displaying ranking information of the competition warriors.
2. The network security exercise management analysis method according to claim 1, wherein the network security exercise management analysis system comprises an event management module, a target unit management module, a team and contestant management module, a referee management module and an attack result uploading module and an auditing module, wherein the event management module is used for inputting basic event information, the target unit management module is used for inputting and managing target units to be attacked and detailed information of the target unit system, the team and contestant management module is used for managing contestant teams and personnel, accounts of the team and contestants are generated and supervised, the referee management module is used for creating and monitoring the account of the referee of an event, the attack result uploading module is used for uploading an attack result, comprises documents or other electronic vulnerability materials in a visual format, and the auditing module is used for auditing whether the mining result uploaded by the contestant and the mining result are valid or not and increasing the battle score after the mining result passes.
3. The network security exercise management analysis method of claim 2, wherein the network security exercise management analysis system further comprises an event large screen module, wherein the event large screen module is used for displaying all real-time status information in a game.
4. The network security exercise management analysis method according to claim 2, wherein the network security exercise management analysis system is constructed by combining a database mysql and a non-relational database Redis through a SpringCloud, springboot framework; the network security exercise management analysis system adopts transverse expansion longitudinal management and supports a mode of multistage deployment management.
5. The network security exercise management analysis method of claim 1, wherein the detailed information of the target unit system includes a system name and access address information, and the ranking information of the team includes a team ranking and an attacked situation.
6. The network security exercise management analysis method of claim 1, wherein the method uses a restul network application to control the running state of an event, observe the running direction of the event, and make appropriate adjustments in real time, and is configured with an acquisition interface to provide data to the inside or outside.
7. The network security exercise management analysis method according to claim 2, wherein each target unit system presets a hole which can be mined and sets different scores according to difficulty, players sort the holes into electronic document materials and provide the electronic document materials to a host or upload the electronic document materials to the network security exercise management analysis system, and judges whether the hole really exists according to the electronic document materials; the network security exercise management analysis system adopts a document analysis technology, firstly inputs detailed information related to the loopholes in the electronic document materials, when a contestant uploads an attack result, the contestant is required to fill in the system name, the loophole name and the type of a target unit corresponding to the loopholes, then compares the loophole information input by the contestant with a loophole library of a system of the target unit input by the network security exercise management analysis system, judges that the loopholes really exist if the system name, the loophole name and the type of the target unit are the same, and judges that the loopholes pass the examination, and judges that the loopholes do not exist if the system name, the loophole name and the type of the target unit are different.
8. The network security exercise management analysis method according to claim 1, wherein each vulnerability is preset to 300 points, 200 points and 100 points according to the mining difficulty, and the scores are calculated according to the ranking of the passing wars, wherein the first name obtains 100% of the primary scores, and the ratio of each descending one obtains 10% of the primary scores until the ratio of the lowest obtaining primary scores is 50%.
9. A network security exercise management analysis device comprising a memory and a processor, the memory storing computer executable instructions, the processor configured to execute the computer executable instructions, wherein the computer executable instructions when executed by the processor implement the network security exercise management analysis method of any one of claims 1 to 8.
10. A computer readable storage medium having a computer program stored thereon, wherein the computer program when executed by a processor implements the network security exercise management analysis method of any one of claims 1 to 8.
CN202311117039.7A 2023-09-01 2023-09-01 Network security exercise management analysis method, device and medium Pending CN116866085A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311117039.7A CN116866085A (en) 2023-09-01 2023-09-01 Network security exercise management analysis method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311117039.7A CN116866085A (en) 2023-09-01 2023-09-01 Network security exercise management analysis method, device and medium

Publications (1)

Publication Number Publication Date
CN116866085A true CN116866085A (en) 2023-10-10

Family

ID=88221879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311117039.7A Pending CN116866085A (en) 2023-09-01 2023-09-01 Network security exercise management analysis method, device and medium

Country Status (1)

Country Link
CN (1) CN116866085A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101918547B1 (en) * 2017-11-28 2018-11-14 주식회사 시큐센 Hacking Defense Contest System That Can Verify Vulnerability Patch
CN109543933A (en) * 2018-10-08 2019-03-29 中国科学院信息工程研究所 A kind of net peace personnel technical ability evaluation system
CN109740032A (en) * 2018-12-13 2019-05-10 烽台科技(北京)有限公司 The method for exhibiting data and network security matching system of network security matching system
CN112835871A (en) * 2021-02-07 2021-05-25 大连和捷科技有限公司 Teenagers network security sports platform
CN113792895A (en) * 2021-09-02 2021-12-14 成都仁达至信科技有限公司 Training guiding and guaranteeing system
CN114065214A (en) * 2021-11-19 2022-02-18 中国工商银行股份有限公司 Attack and defense competition method, apparatus, electronic device, medium, and program product
CN114244623A (en) * 2021-12-30 2022-03-25 贵州国卫信安科技有限公司 Network security attack and defense drilling automatic scoring system
CN114897380A (en) * 2022-05-18 2022-08-12 尚蝉(浙江)科技有限公司 Network attack and defense online practical training OJ system and method
CN115277091A (en) * 2022-06-23 2022-11-01 奇安信科技集团股份有限公司 Attack and defense method and device in network security competition
CN116248411A (en) * 2023-03-21 2023-06-09 广西塔易信息技术有限公司 AWD attacks and defends platform

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101918547B1 (en) * 2017-11-28 2018-11-14 주식회사 시큐센 Hacking Defense Contest System That Can Verify Vulnerability Patch
CN109543933A (en) * 2018-10-08 2019-03-29 中国科学院信息工程研究所 A kind of net peace personnel technical ability evaluation system
CN109740032A (en) * 2018-12-13 2019-05-10 烽台科技(北京)有限公司 The method for exhibiting data and network security matching system of network security matching system
CN112835871A (en) * 2021-02-07 2021-05-25 大连和捷科技有限公司 Teenagers network security sports platform
CN113792895A (en) * 2021-09-02 2021-12-14 成都仁达至信科技有限公司 Training guiding and guaranteeing system
CN114065214A (en) * 2021-11-19 2022-02-18 中国工商银行股份有限公司 Attack and defense competition method, apparatus, electronic device, medium, and program product
CN114244623A (en) * 2021-12-30 2022-03-25 贵州国卫信安科技有限公司 Network security attack and defense drilling automatic scoring system
CN114897380A (en) * 2022-05-18 2022-08-12 尚蝉(浙江)科技有限公司 Network attack and defense online practical training OJ system and method
CN115277091A (en) * 2022-06-23 2022-11-01 奇安信科技集团股份有限公司 Attack and defense method and device in network security competition
CN116248411A (en) * 2023-03-21 2023-06-09 广西塔易信息技术有限公司 AWD attacks and defends platform

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
慕志: "用于人才测评和选拔的网络安全竞赛 平台", 信息技术与标准化, no. 9, pages 1 - 4 *
袁涛: "某企业网络攻防仿真系统中信息安全竞赛子系统的设计与实现", 中国优秀硕士学位论文全文数据库信息科技辑, no. 1, pages 2 - 6 *

Similar Documents

Publication Publication Date Title
CN110694256A (en) Novel emergency computer war game deduction system and method
CN112448857A (en) Construction method, device and equipment of target range and storage medium
CN109543933B (en) Network security personnel skill evaluation system
CN103093035B (en) For computer simulation system and the emulation mode of the rehearsal of city crisis Emergency decision
CN106789233B (en) Automatic scoring method and device for network attack and defense experiment platform
CN111652475A (en) Multi-level analysis and evaluation method for fighting capacity of combined fighting system and storage medium
CN109447448A (en) A kind of method, client, server and the system of fire Safety Assessment management
CN108898903A (en) A kind of general CTF network security talent training system and setting a question based on this system and do topic method at method
CN112600794A (en) Method for detecting GAN attack in combined deep learning
CN109003211B (en) Emergency drilling system and method
CN116866085A (en) Network security exercise management analysis method, device and medium
CN113496638A (en) Network security training system and method
Sheehan Next steps in joint force integration
CN115983389A (en) Attack and defense game decision method based on reinforcement learning
CN114758545A (en) Practice method for creating open network and applying internal control perception to network space research
Shin et al. Model‐based integration of test and evaluation process and system safety process for development of safety‐critical weapon systems
Dixon et al. A neural network for counter-terrorism
Keren et al. Examining the effect of level of stress on firefighters’ time-to-decision in virtual reality
Lin et al. A new credibility assessment framework for training simulators
CN117151435B (en) Emergency management method, system and readable storage medium
CN113256462B (en) Cloud computing-based electronic contest education system
Zhai et al. On the Application of Computer War Chess Technology in the Support of Military Supplies
CN117176478B (en) Network security practical training platform construction method and system based on user operation behaviors
bin Noor Azam et al. Usability evaluation of open source and online capture the flag platforms
Pandey et al. Aerial war game simulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination