[1] |
王秀苹 . 云计算下基于拜占庭算法的容忍入侵技术研究[D]. 包头:内蒙古科技大学, 2012.
|
|
WANG X P . Research on intrusion tolerance based on Byzantine algorithm in c1oud computing[D]. Baotou:Inner Mongolia University of Science and Technology, 2012.
|
[2] |
ZHANG Y , ZHENG Z , LYU M R . BFTCloud:a Byzantine fault tolerance framework for voluntary-resource cloud computing[C]// International Conference on Cloud Computing. 2011: 444-451.
|
[3] |
ALZAIN M A , SOH B , PARDEDE E . A Byzantine fault tolerance model for a multi-cloud computing[C]// International Conference on Computational Science and Engineering. 2013: 130-137.
|
[4] |
KAPITZA R , BEHL J , CACHIN C ,et al. CheapBFT:resourceefficient Byzantine fault tolerance[J]. IEEE Transactions on Computers, 2016,65(9): 2807-2819.
|
[5] |
MERIDETH M G , IYENGAR A , MIKALSEN T ,et al. Thema:Byzantine-fault-tolerant middleware for Web-service applications[C]// IEEE Symposium on Reliable Distributed Systems. 2005: 131-142.
|
[6] |
ZHAO W , . BFT-WS:A Byzantine fault tolerance framework for Web services[C]// Eleventh International IEEE Edoc Conference Workshop. 2007: 89-96.
|
[7] |
PALLEMULLE S L , THORVALDSSON H D , GOLDMAN K J . Byzantine fault-tolerant Web services for n-tier and service oriented architectures[C]// The International Conference on Distributed Computing Systems. 2008: 260-268.
|
[8] |
PENG W , LI F , HUANG C T ,et al. A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces[C]// IEEE International Conference on Communications. 2014: 804-809.
|
[9] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. The design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[10] |
LEINSTER T , COBBOLD C A . Measuring diversity:the importance of species similarity[J]. Ecology, 2012,93(3): 477.
|
[11] |
ZHANG M , WANG L , JAJODIA S ,et al. Network diversity:a security metric for evaluating the resilience of networks against zero-day attacks[J]. IEEE Transactions on Information Forensics &Security, 2016,11(5): 1071-1086.
|
[12] |
MCQUEEN M A , BOYER W F , FLYNN M A ,et al. Time-tocompromise model for cyber risk reduction estimation[M]// Quality of Protection. Berlin: Springer, 2006: 49-64.
|