1 |
SINGH S, CHANA I, BUYYA R. STAR: SLA-aware autonomic management of cloud resources[J]. IEEE Transactions on Cloud Computing, 2020, 8(4): 1040-1053. 10.1109/tcc.2017.2648788
|
2 |
马海龙,伊鹏,江逸茗,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017, 2(1): 29-42. 10.19363/j.cnki.cn10-1380/tn.2017.01.003
|
|
MA H L, YI P, JIANG Y M, et al. Dynamic heterogeneous redundancy based router architecture with mimic defenses[J]. Journal of Cyber Security, 2017, 2(1): 29-42. 10.19363/j.cnki.cn10-1380/tn.2017.01.003
|
3 |
MA L M, ZHAO D M, GAO Y J, et al. Research on SQL injection attack and prevention technology based on web[C]// Proceedings of the 2019 International Conference on Computer Network, Electronic and Automation. Piscataway: IEEE, 2019: 176-179. 10.1109/iccnea.2019.00042
|
4 |
魏为民,袁仲雄. 网络攻击与防御技术的研究与实践[J]. 信息网络安全, 2012(12):53-56. 10.3969/j.issn.1671-1122.2012.12.016
|
|
WEI W M, YUAN Z X. Research and practice of network attacks and defense techniques[J]. Netinfo Security, 2012(12): 53-56. 10.3969/j.issn.1671-1122.2012.12.016
|
5 |
KANNAN K, TELANG R. Market for software vulnerabilities? Think again[J]. Management Science, 2005, 51(5): 726-740. 10.1287/mnsc.1040.0357
|
6 |
邬江兴. 拟态防御技术构建国家信息网络空间内生安全[J]. 信息通信技术, 2019, 13(6):4-6. 10.3969/j.issn.1674-1285.2019.06.001
|
|
WU J X. Mimicry defense technology to construct the endogenous security of national information network space[J]. Information and Communications Technologies, 2019, 13(6): 4-6. 10.3969/j.issn.1674-1285.2019.06.001
|
7 |
普黎明,刘树新,丁瑞浩,等. 面向拟态云服务的异构执行体调度算法[J]. 通信学报, 2020, 41(3):17-24. 10.11959/j.issn.1000-436x.2020052
|
|
PU L M, LIU S X, DING R H, et al. Heterogeneous executor scheduling algorithm for mimic cloud service[J]. Journal on Communications, 2020, 41(3): 17-24. 10.11959/j.issn.1000-436x.2020052
|
8 |
张玉清,王晓菲,刘雪峰,等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6): 1328-1348. 10.13328/j.cnki.jos.005004
|
|
ZHANG Y Q, WANG X F, LIU X F, et al. Survey on cloud computing security[J]. Journal of Software, 2016, 27(6): 1328-1348. 10.13328/j.cnki.jos.005004
|
9 |
邬江兴. 网络空间拟态防御研究[J]. 信息安全学报, 2016, 1(4): 1-10. 10.19363/j.cnki.cn10-1380/tn.2016.04.001
|
|
WU J X. Research on cyber mimic defense[J]. Journal of Cyber Security, 2016, 1(4): 1-10. 10.19363/j.cnki.cn10-1380/tn.2016.04.001
|
10 |
崔冰萌,倪明,凌幸华. 基于FPGA的拟态服务器设计[J]. 计算机系统应用, 2018, 27(4):219-225.
|
|
CUI B M, NI M, LING X H. Design of mimicry computing server with FPGA[J]. Computer Systems and Applications, 2018, 27(4): 219-225.
|
11 |
HU H C, WANG Z P, CHENG G Z, et al. MNOS: a mimic network operating system for software defined networks[J]. IET Information Security, 2017, 11(6):345-355. 10.1049/iet-ifs.2017.0085
|
12 |
仝青,张铮,张为华,等. 拟态防御Web服务器设计与实现[J]. 软件学报, 2017, 28(4):883-897. 10.13328/j.cnki.jos.005192
|
|
TONG Q, ZHANG Z, ZHANG W H, et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017, 28(4): 883-897. 10.13328/j.cnki.jos.005192
|
13 |
韩煦. 基于服务计算的拟态式蜜罐研究[D]. 青岛:中国石油大学(华东), 2014: 30-41.
|
|
HAN X. Research on mimicry honeypot based on service computing[D]. Qingdao: China University of Petroleum (East China), 2014: 30-41.
|
14 |
郭威,谢光伟,张帆,等. 一种分布式存储系统拟态化架构设计与实现[J]. 计算机工程, 2020,4 6(6):12-19. 10.19678/j.issn.1000-3428.0056660
|
|
GUO W, XIE G W, ZHANG F, et al. Design and implementation of a mimic architecture for distributed storage system[J]. Computer Engineering, 2020, 46(6): 12-19. 10.19678/j.issn.1000-3428.0056660
|
15 |
王梦童,邵培南. Ceph分布式存储系统拟态防御设计[J]. 信息技术, 2020, 44(2):43-48, 57. 10.13274/j.cnki.hdzj.2020.02.009
|
|
WANG M T, SHAO P N. Design of Ceph distributed storage system based on mimic defense[J]. Information Technology, 2020, 44(2): 43-48, 57. 10.13274/j.cnki.hdzj.2020.02.009
|
16 |
王禛鹏,扈红超,程国振. 一种基于拟态安全防御的DNS框架设计[J]. 电子学报, 2017, 45(11):2705-2714. 10.3969/j.issn.0372-2112.2017.11.018
|
|
WANG Z P, HU H C, CHENG G Z. A DNS architecture based on mimic security defense[J]. Acta Electronica Sinica, 2017, 45(11): 2705-2714. 10.3969/j.issn.0372-2112.2017.11.018
|
17 |
宋克,刘勤让,魏帅,等. 基于拟态防御的以太网交换机内生安全体系结构[J]. 通信学报, 2020, 41(5):18-26. 10.11959/j.issn.1000-436x.2020098
|
|
SONG K, LIU Q R, WEI S, et al. Endogenous security architecture of Ethernet switch based on mimicry defense[J]. Journal on Communications, 2020, 41(5): 18-26. 10.11959/j.issn.1000-436x.2020098
|
18 |
POLINSKY I, MARTIN K, ENCK W, et al. n-m-Variant Systems: adversarial-resistant software rejuvenation for cloud-based web applications[C]// Proceedings of the 10th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2020: 235-246. 10.1145/3374664.3375745
|
19 |
WANG Y W, WU J X, GUO Y F, et al. Scientific workflow execution system based on mimic defense in the cloud environment[J]. Frontiers of Information Technology and Electronic Engineering, 2018, 19(12): 1522-1536. 10.1631/fitee.1800621
|
20 |
普黎明,卫红权,李星,等. 面向云应用的拟态云服务架构[J]. 网络与信息安全学报, 2021, 7(1):101-112. 10.11959/j.issn.2096-109x.2021011
|
|
PU L M, WEI H Q, LI X, et al. Mimicry cloud service architecture for cloud applications[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 101-112. 10.11959/j.issn.2096-109x.2021011
|
21 |
PU L M, WU J X, MA H L, et al. MimicCloudSim: an environment for modeling and simulation of mimic cloud service[J]. China Communications, 2021, 18(1): 212-221. 10.23919/jcc.2021.01.018
|