[1] FOUKAS X, PATOUNAS G, ELMOKASHFI A, et al. Network slicing in 5G:survey and challenges[J]. IEEE Communications Magazine, 2017, 55(5):94-100. [2] ORDONEZ-LUCENA J, AMEIGEIRAS P, LOPEZ D, et al. Network slicing for 5G with SDN/NFV:concepts, architectures, and challenges[J]. IEEE Communications Magazine, 2017, 55(5):80-87. [3] FISCHER A, de MEER H. Position paper:secure virtual network embedding[J]. Praxis der Informationsverarbeitung und Kommunikation, 2011, 34(4):190-193. [4] ALJUHANI A, ALHARBI T. Virtualized network functions security attacks and vulnerabilities[C]//Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference. Piscataway, NJ:IEEE, 2017:1-4. [5] IRAZOQUI G, EISENBARTH T, SUNAR B. SMYMA:a shared cache attack that works across cores and defies VM sandboxing-and it's application to AES[C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE, 2015:591-604. [6] LIU F, YAROM Y, GE Q, et al. Last-level cache side-channel attacks are practical[C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway, NJ IEEE, 2015:605-622. [7] NAHAPETIAN A. Side-channel attacks on mobile and wearable systems[C]//Proceedings of the 2016 IEEE 13th Consumer Communications & Networking Conference. Piscataway, NJ:IEEE, 2016:243-247. [8] VARADARAJAN V, RISTENPART T, SWIFT M. Scheduler-based defenses against cross-VM side-channels[C]//Proceedings of the 23rd USENIX Conference on Security Symposium. Berkeley, CA:USENIX Association, 2014:687-702. [9] MOON S-J, SEKAR V, REITER M K. NOMAD:mitigating arbitrary cloud side channels via provider-assisted migration[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York:ACM, 2015:1595-1606. [10] VATTIKONDA B C, DAS S, SHACHAM H. Eliminating fine grained timers in Xen[C]//Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop. New York:ACM, 2011:41-46. [11] WU J, DING L, LIN Y, et al. XenPump:a new method to mitigate timing channel in cloud computing[C]//Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing. Washington, DC:IEEE Computer Society, 2012:678-685. [12] HAN Y, CHAN J, ALPCAN T, et al. Using virtual machine allocation policies to defend against co-resident attacks in cloud computing[J]. IEEE Transactions on Dependable & Secure Computing, 2017, 14(1):95-108. [13] 赵硕,季新生,毛宇星,等.基于安全等级的虚拟机动态迁移方法[J].通信学报,2017,38(7):165-174. (ZHAO S, JI X S, MAO Y X, et al. Research on dynamic migration of virtual machine based on security level[J]. Journal on Communications, 2017, 38(7):165-174.) [14] BASS T. Intrusion detection systems and multisensor data fusion[J]. Communications of the ACM, 2000, 43(4):99-105. [15] 龚正虎,卓莹.网络态势感知研究[J].软件学报,2010,21(7):1605-1619. (GONG Z H, ZHUO Y. Research on cyberspace situational awareness[J]. Journal of Software, 2010, 21(7):1605-1619.) [16] HUO Q, CHAN C, LEE C H. Bayesian adaptive learning of the parameters of hidden Markov model for speech recognition[J]. IEEE Transactions on Speech and Audio Processing, 1995, 3(5):334-345. [17] 牛犇,游伟,汤洪波.基于安全信任的网络切片部署策略研究[J/OL].计算机应用研究,2019[2018-04-06]. http://www.arocmag.com/article/02-2019-02-043.html. (NIU B, YOU W, TANG H B. Research on network slicing deployment strategy based on security trust[J/OL]. Application Research of Computers, 2009[2018-04-06]. http://www.arocmag.com/article/02-2019-02-043.html. [18] 汪京培,孙斌,钮心忻,等.基于可信建模过程的信任模型评估算法[J].清华大学学报(自然科学版),2013,53(12):1699-1707. (WANG J P, SUN B, NIU X X, et al. A trust model evaluation algorithm based on trusted modeling process[J]. Journal of Tsinghua University (Science and Technology), 2013, 53(12):1699-1707. [19] 孟顺梅.云计算环境下可信服务组合及其关键技术研究[D].南京:南京大学,2016:20-43. (MENG S M. Trusted service composition and its key technologies in cloud environment[D]. Nanjing:Nanjing University, 2016:20-43.) [20] SHAO W, HU W, HUANG X. A new implicit enumeration method for linear 0-1 programming[C]//Proceedings of the 2008 International Workshop on Modelling, Simulation and Optimization. Washington, DC:IEEE Computer Society, 2008:298-301. [21] GEOFFRION A M. An improved implicit enumeration approach for integer programming[J]. Operations Research, 1969, 17(3):437-454. [22] 王军,李端.多项式0-1规划中隐枚举算法的改进及应用[J].系统工程理论与实践,2007,27(3):21-27. (WANG J, LI D. A new implicit enumeration method for polynomial 0-1 programming and applications[J]. System Engineering-Theory & Practice, 2007, 27(3):21-27.) [23] HARRINGTON P. Machine learning in Action[M]. Greenwich, CT:Manning Publications Co., 2012:15-31. [24] ZHAO Y M, LO S, ZEGURA E, et al. Virtual network migration on the GENI wide-area SDN-enabled infrastructure[C]//Proceedings of the 2017 IEEE Conference on Computer Communications Workshops. Piscataway, NJ:IEEE, 2017:265-270. |