[1]ZHANG H. Virtual switch research and design based on Xen [D]. Tianjin: Tianjin University, 2012.(张洪素.基于Xen的虚拟交换技术的研究与设计[D].天津:天津大学,2012.)
[2]XIANG G. Research on security monitoring technology in virtualcomputing environment [D]. Wuhan: Huazhong University of Science and Technology, 2012.(项国富.虚拟计算环境的安全监控技术研究[D].武汉:华中科技大学,2012.)
[3]LIU Z, MU D. Secure virtualization-based fine-grained process execution monitoring [J]. Journal of Xidian University, 2012, 39(6): 181-186.(刘哲元,慕德俊.安全虚拟环境中的进程执行精确监控[J].西安电子科技大学学报,2012,39(6):181-186.)
[4]LIU Q, WANG G, WENG C, et al.A mandatory access controlframework in virtual machine system with respect to multi-level security I: theory [J]. China Communications, 2010(4): 137-143.(刘谦,王观海,翁楚良,等.一种虚拟机系统中关于多级安全的强制访问控制框架Ⅰ:理论[J].中国通信,2010(4):137-143.)
[5]LIU Q, WANG G, WENG C, et al.A mandatory access controlframework in virtual machine system with respect to multi-level security II: implementation [J]. China Communications, 2011(2): 86-94.(刘谦,王观海,翁楚良,等.一种虚拟机系统下关于多级安全的强制访问控制框架Ⅱ:实现[J].中国通信,2011(2):86-94.)
[6]McKEOWN N, ANDERSON T, BALAKRISHNAN H, et al.OpenFlow: enabling innovation in campus networks [J]. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69-74.
[7]ELLIOTT C. GENI: opening up new classes of experiments in global networking [J]. IEEE Internet Computing, 2010, 14(1): 39-42.
[8]CHUN B, CULLER D, ROSCOE T, et al.PlanetLab: an overlay testbed for broad-coverage services [J]. ACM SIGCOMM Computer Communication Review, 2003, 33(3): 3-12.
[9]GAVRAS A, KARILA A, FDIDA S, et al.Future Internet research and experimentation: the FIRE initiative [J]. ACM SIGCOMM Computer Communication Review, 2007, 37(3): 89-92.
[10]CoreLab Project. CoreLab home page [EB/OL]. [2013-08-20]. http://www.corelab.jp/.
[11]NAOUS J, ERICKSON D, COVINGTON G A, et al.Implementing an OpenFlow switch on the NetFPGA platform [C]// Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM, 2008: 1-9.
[12]ZUO Q, CHEN M, ZHAO G, et al.Research on OpenFlow-based SDN technologies [J]. Journal of Software, 2013, 24(5): 1078-1097.(左青云,陈鸣,赵广松,等.基于OpenFlow的SDN技术研究[J].软件学报,2013,24(5):1078-1097.)
[13]OpenFlow Consortium. The OpenFlow switch specification [EB/OL]. [2013-08-20]. http://archive.openflow.org/documents/openflow-spec-v1.1.0.pdf.
[14]Open vSwitch home page [EB/OL]. [2013-08-20]. http://openvswitch.org/.
[15]NOX home page [EB/OL]. [2013-08-20]. http://www.noxrepo.org.
[16]GUDE N, KOPONEN T, PETTIT J, et al.NOX: towards an operating system for networks [J]. ACM SIGCOMM Computer Communication Review, 2008, 38(3): 105-110.
[17]YANG H, ZHU D, XIE F, et al.Survey of anomaly intrusion detection research [J]. Journal of University of Electronic Science and Technology of China, 2009, 38(5): 587-596.(杨宏宇,朱丹,谢丰,等.入侵异常检测研究综述[J].电子科技大学学报,2009,38(5):587-596.)
[18]WU X. The research and application of intrusion detection system based on Snort [D]. Changchun: Jilin University, 2011.(武旭东.Snort入侵检测系统研究与应用[D].长春:吉林大学,2011.) |