[1] |
YAN Q , YU F R , GONG Q ,et al. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments:a survey,some research issues,and challenges[J]. IEEE Communications Surveys & Tutorials, 2015,18(1): 602-622.
|
[2] |
WANG K , DU M , MAHARJAN S ,et al. Strategic honeypot game model for distributed denial of service attacks in the smart grid[J]. IEEE Transactions on Smart Grid, 2017,8(5): 2474-2482.
|
[3] |
徐明迪, 高杨, 崔峰 . 基于 SDN 的分布式欺骗防御系统[J]. 通信学报, 2018,39(A2): 54-60.
|
|
XU M D , GAO Y , CUI F . Distributed deception defense system based on SDN[J]. Journal on Communications, 2018,39(A2): 54-60.
|
[4] |
SAIED A , OVERILL R E , RADZIK T . Detection of known and unknown DDoS attacks using artificial neural networks[J]. Neurocomputing, 2016,172: 385-393.
|
[5] |
XU W , HU G , HOD W ,et al. Distributed secure cooperative control under denial-of-service attacks from multiple adversaries[J]. IEEE Transactions on Cybernetics, 2019: 1-10.
|
[6] |
FORREST S , HOFMEYR S A , SOMAYAJI A.et al . A sense of self for UNIX processes[C]// In Proceedings of the 1996 IEEE Symposium on Security and Privacy. 1996: 120-128.
|
[7] |
GONZALEZ D . An immunogenetic approach to intrusion detection[R]. 2001.
|
[8] |
BENTLEY K , . The artificial immune model for network intrusion detection[C]// The 7th EUFIT'99. 1999.
|
[9] |
LUO W J , ZHANG S H , LIANG W ,et al. NIDS research advance based on artificial immunology[J]. Journal of University of Science and Technology of China, 2002,22(5): 520-531.
|
[10] |
BECK G , HABICHT G S . Immunity and the inverte-brates[J]. Scientific American, 1996,275(5): 60-66.
|
[11] |
周建国 . 网络入侵检测的免疫学建模及其仿真研究[D]. 北京:北京航空航天大学, 2002.
|
|
ZHOU J G . Simalation and modeling of immunology network in-trinsion detection[D]. Beijing:Beijing University, 2002.
|
[12] |
Mimic octopus Wikipedia,the free encyclopedia[EB].
|
[13] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[14] |
HU H C , WU J X , WANG Z P ,et al. Mimic defense:a designed-in cybersecurity defense framework[J]. IET Information Security, 2017,12(3): 226-237.
|
[15] |
HU H C , WANG Z P , CHENG G Z ,et al. MNOS:a mimic network operating system for software defined networks[J]. IET Information Security, 2017,11(6): 345-355.
|
[16] |
BUCZAK A , GUVEN E . A survey of data mining and machine learning methods for cyber security intrusion detection[J]. IEEE Communications Surveys & Tutorials, 2015,18(2): 1153-1176.
|
[17] |
HAREL Y , GAL I B , ELOVICI Y . Cyber security and the role of intelligent systems in addressing its challenges[J]. ACM Transactions on Intelligent Systems and Technology, 2017,8(4): 49.
|
[18] |
DONG Y , HAN Q L . Guest editorial special issue on new trends in energy internet:artificial intelligence-based control,network security,and management[J]. IEEE Transactions on Systems,Man,and Cybernetics, 2019,49(8): 1551-1553.
|
[19] |
JESCHKE S , BRECHER C , SONG H B ,et al. Industrial internet of things and cyber manufacturing systems[M]. Springer International Publishing, 2017: 3-19.
|
[20] |
张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164.
|
|
ZHANG H G , HAN W B , LAI X J ,et al. Cyber security over-view[J]. Science China:Information Science, 2016,46(2): 125-164.
|
[21] |
VINCENT L , TANNER A , BLARER A . Gaining an edge in cyberspace with advanced situational awareness[J]. IEEE Security &Privacy, 2015,13(2): 65-74.
|
[22] |
李艳, 王纯子, 黄光球 ,等. 网络安全态势感知分析框架与实现方法比较[J]. 电子学报, 2019,47(4): 927-945.
|
|
LI Y , WANG C Z , HUANG G Q ,et al. A survey of architecture and implementation method on cyber security situation awareness analysis[J]. Acta Electronica Sinica, 2019,47(4): 927-945.
|
[23] |
POO M M , DU J L , LP N Y ,et al. China brain project:basic neuroscience,brain diseases,and brain-inspired computing[J]. Neuron, 2016,92: 591-596.
|
[24] |
BUNDY A . Review of preparing for the future of artificial intelligence[J]. AI and Society, 2017,32(2): 285-287.
|
[25] |
PAN Y H . Heading toward artificial intelligence 2.0[J]. Engineering, 2016,2(4): 409-413.
|
[26] |
PAN Y H.Special issue on artificial intelligence 2 . 0[J]. Frontiers of Information Technology & ElectronicEngineering, 2017,18: 1-2
|
[27] |
蒲慕明, 徐波, 谭铁牛 . 脑科学与类脑研究概述[J]. 中国科学院院刊, 2016,31(7): 725-736.
|
|
PU M M , XU B , TAN T N . Brain science and brain-inspired intel-ligence technology-an overview[J]. Bulletin of Chinese Academy of Sciences, 2016,31(7): 725-736.
|