[1] |
Imperva’s Threat Research Lab. Bad bot report 2020:bad bots strike back[R]. 2020.
|
[2] |
邬江兴 . 新型网络技术发展思考[J]. 中国科学:信息科学, 2018,48(8): 1102-1111.
|
|
WU J X . Thoughts on the development of novel network technology[J]. Scientia Sinica Informationis, 2018,48(8): 1102-1111.
|
[3] |
刘杨, 彭木根 . 6G内生安全:体系结构与关键技术[J]. 电信科学, 2020,36(1): 11-20.
|
|
LIU Y , PENG M G . 6G endogenous security:architecture and key technologies[J]. Telecommunications Science, 2020,36(1): 11-20.
|
[4] |
季新生, 黄开枝, 金梁 ,等. 5G安全技术研究综述[J]. 移动通信, 2019,43(1): 34-39,45.
|
|
JI X S , HUANG K Z , JIN L ,et al. Overview on 5G security technology[J]. Mobile Communications, 2019,43(1): 34-39,45.
|
[5] |
江伟玉, 刘冰洋, 王闯 . 内生安全网络架构[J]. 电信科学, 2019,35(9): 20-28.
|
|
JIANG W Y , LIU B Y , WANG C . Network architecture with intrinsic security[J]. Telecommunications Science, 2019,35(9): 20-28.
|
[6] |
唐燕群, 李为, 张立健 ,等. 基于无线信道特征的内生安全通信技术及应用[J]. 无线电通信技术, 2020,46(2): 159-167.
|
|
TANG Y Q , LI W , ZHANG L J ,et al. Endogenous secure communication based on characteristics of wireless channel[J]. Radio Communications Technology, 2019,46(2): 159-167.
|
[7] |
张杰 . 内生安全光通信技术及应用[J]. 无线电通信技术, 2019,45(4): 337-342.
|
|
ZHANG J . Technologies and applications of endogenously secure optical communication[J]. Radio Communications Technology, 2019,45(4): 337-342.
|
[8] |
NGUYEN T D , MARCHAL S , MIETTINEN M ,et al. D?oT:a federated self-learning anomaly detection system for IoT[C]// Proceedings of 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Piscataway:IEEE Press, 2019: 756-767.
|
[9] |
JIA Y , QI Y , SHANG H ,et al. A practical approach to constructing a knowledge graph for cybersecurity[J]. Engineering, 2018,4(1): 53-60.
|