[1] |
邬江兴 . 鲁棒控制与内生安全[J]. 网信军民融合, 2018(3): 23-27.
|
|
WU J X . Robust control and endogenous safety[J]. Civil-Military Integration on Cyberspace, 2018(3): 23-27.
|
[2] |
科学网. 拟态防御或助网络安全实现再平衡[EB]. 2016.
|
|
ScienceNet. Mimic defense may help rebalance network security[EB]. 2016.
|
[3] |
网络空间拟态防御原理——广义鲁棒控制与内生安全(第二版)上册[J]. 北京: 科学出版社, 2018.
|
|
Principles of mimic defense in cyberspace——generalized robust control and endogenous security (second edition) volume One[J]. Beijing: Science Press, 2018.
|
[4] |
WU J X . Cyberspace mimic defense - generalized robust control and endogenous security[M]. Switzerland: Springer International Publishing, 2020.
|
[5] |
齐向东 . 网络安全已进化到“内生安全”时代[EB]. 2019.
|
|
QI X D . Network security has evolved into the era of “endogenous security”[EB]. 2019.
|
[6] |
齐向东 . 网络安全形势有三大转变[EB]. 2019.
|
|
QI X D . There are three major changes in the cyber security situation[EB]. 2019.
|
[7] |
FORREST S , PERELSON A S , ALLEN L ,et al. Self-nonself discrimination in a computer[C]// Proceedings of 1994 IEEE computer society symposium on research in security and privacy. Piscataway:IEEE Press, 1994: 202-212.
|
[8] |
KEPHART J O , . A biologically inspired immune system for computers[C]// Proceedings of the Fourth International Workshop on Synthesis and Simulation of Living Systems,Artificial Life IV:Citeseer.[S.l.:s.n.], 1994.
|
[9] |
DASGUPTA D . Artificial immune systems and their applications[M]. Heidelberg Springer Science & Business Media, 2012.
|
[10] |
LAMONT G B , MARMELSTEIN R E , VAN VELDHUIZEN D A . A distributedarchitecture for a self-adaptive computer virus immune system[M]. New ideas in optimization.[S.l.:s.n.], 1999: 167-184.
|
[11] |
KEPHART J , SORKIN G , SWIMMER M ,et al. Blueprint for a computer immune system[C]// Artificial immune systems and their applications. 1999: 242-261.
|
[12] |
FORREST S , HOFMEYR S A , SOMAYAJI A . Computer immunology[J]. Communications of the ACM, 1997,40(10): 88-96.
|
[13] |
DASGUPTA D , . Immunity-based intrusion detection systems:A general frame- work[C]// Proceedings of the 22nd National Information Systems Security Conference.[S.l.:s.n.], 1999: 18-21.
|
[14] |
HARMER P K , WILLIAMS P D , GUNSCH G H ,et al. An artificial immune system architecture for computer security applications[J]. IEEE transactions on evolutionary computation, 2002,6(3): 252-280.
|
[15] |
MTHUNZI S N , BENKHELIFA E , BOSAKOWSKI T ,et al. A bio-inspired approach to cyber security[C]// Proceedings of Machine Learning for Computer and Cyber Security:Principle,Algorithms,and Practices. Boca Raton:CRC Press, 2019:75.
|
[16] |
WLODARCZAK P , . Cyber immunity[C]// International Conference on Bioinformatics and Biomedical Engineering. Heidelberg:Springer, 2017: 199-208.
|
[17] |
RAUF U . A taxonomy of bio-inspired cyber security approaches:existing techniques and future directions[J]. Arabian Journal for Science and Engineering, 2018,43(12): 6693-6708.
|
[18] |
FERNANDES D A , FREIRE M M , FAZENDEIRO P A ,et al. Applications of artificial immune systems to computer security:A survey[J]. Journal of Information Security and Applications, 2017,35: 138-159.
|
[19] |
BECK G , HABICHT G S . Immunity and the invertebrates[J]. Scientific American, 1996,275(5): 60-66.
|
[20] |
GENE M . Innate or non-specific immunity[EB]. 2006.
|
[21] |
PANCER Z , COOPER M D . The evolution of adaptive immunity[J]. ANNU REV IMMUNOL, 2006(24): 497-518.
|
[22] |
MEIRA J , ANDRADE R,PRA?A I ,et al. Performance evaluation of unsupervised techniques in cyber-attack anomaly detection[J]. Journal of Ambient Intelligence and Humanized Computing, 2020,11(11): 4477-4489.
|
[23] |
DUESSEL P , GEHL C , FLEGEL U ,et al. Detecting zero-day attacks using context-aware anomaly detection at the application-layer[J]. International Journal of Information Security, 2017,16(5): 475-490.
|
[24] |
SABEEL U , HEYDARI S S , MOHANKA H ,et al. Evaluation of deep learning in detecting unknown network attacks[C]// Proceedings of 2019 International Conference on Smart Applications,Communications and Networking (SmartNets). Piscataway:IEEE Press, 2019: 1-6.
|
[25] |
MAHAJAN V , PEDDOJU S K . Integration of network intrusion detection systems and honeypot networks for cloud security[C]// Proceedings of 2017 International Conference onComputing,Communication and Automation (ICCCA). Piscataway:IEEE Press, 2017: 829-834.
|
[26] |
YU Y H , YU F , WU X P . Unknown attack detection model based on network behavior analysis[J]. Chinese Journal of Network and Information Security, 2016,2(6): 54.
|
[27] |
MAUGHAN D , NEWHOUSE W D , VAGOUN T . Introducing the federal cyber- security r&d strategic plan[J]. 2012.
|
[28] |
卿昱 . 动态目标防御—为应对赛博威胁构建非对称的不确定性[M]. 北京: 国防工业出版社, 2014.
|
|
QING Y . Dynamic target defense—constructing asymmetric uncertainty in response to cyber threats[M]. Beijing: National Defense Industry Press, 2014.
|
[29] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG Z P . Discussion on several issues and performance evaluation of mimic defense DHR model[J]. Journal of Cyber Security, 2016,1(4): 40-51.
|
[30] |
刘建侯 . 功能安全技术基础[M]. 北京: 机械工业出版社, 2008.
|
|
LIU J H . Fundamentals of functional safety technology[M]. Beijing: Machinery Industry Press, 2008.
|