[1] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[2] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[3] |
仝青, 张铮, 邬江兴 . 基于软硬件多样性的主动防御技术[J]. 信息安全学报, 2017,2(1): 1-12.
|
|
TONG Q , ZHANG Z , WU J X . The active defense technology based on the software/hardware diversity[J]. Journal of Cyber Security, 2017,2(1): 1-12.
|
[4] |
REIS G A , CHANG J , VACHHARAJANI N ,et al. SWIFT:software implemented fault tolerance[C]// International Symposium on Code Generation and Optimization. 2005: 243-254.
|
[5] |
WANG J , BAO W , ZHU X ,et al. FESTAL:fault-tolerant elastic scheduling algorithm for real-time tasks in virtualized clouds[J]. IEEE Transactions on Computers, 2015,64(9): 2545-2558.
|
[6] |
殷进勇, 顾国昌 . 允许多处理机故障的实时任务容错调度算法[J]. 电子与信息学报, 2010,32(2): 444-448.
|
|
YIN J Y , GU G C . A real-time fault-tolerant scheduling algorithm for multiple processor faults[J]. Journal of Electronics & Information Technology, 2010,32(2): 444-448.
|
[7] |
彭浩, 陆阳, 孙峰 ,等. 副版本不可抢占的全局容错调度算法[J]. 软件学报, 2016,27(12): 3158-3171.
|
|
PENG H , LU Y , SUN F ,et al. Faulttolerant global scheduling with non-preemptive backups[J]. Journal of Software, 2016,27(12): 3158-3171.
|
[8] |
DAS A , KUMAR A , VEERAVALLI B . Reliability and energy-aware mapping and scheduling of multimedia applications on multiprocessor systems[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(3): 869-884.
|
[9] |
吉萌, 余少华, 詹翊春 . 双冗余结构路由器故障恢复模型与方案研究[J]. 通信学报, 2006,27(6): 21-28.
|
|
JI M , YU S H , ZHAN Y C . Research on fault-recovery model and scheme in dual-system redundancy router[J]. Journal on Communications, 2006,27(6): 21-28.
|
[10] |
CHEN C Y . Task scheduling for maximizing performance and reliability considering fault recovery in heterogeneous distributed systems[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(2): 521-532.
|
[11] |
邬江兴, 李军飞 ,等. 一种异构功能等价体调度装置及方法[P]. 中国,CN106161417A,2016-11-23.
|
|
WU J X , LI J F ,et al. A heterogeneous redundancies scheduling equipment and method[P]. 中国,CN106161417A,2016-11-23.
|
[12] |
马海龙, 伊鹏, 江逸茗 ,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017,2(1): 29-42.
|
|
MA H L , YI P , JIANG Y M ,et al. Dynamic heterogeneous redundancy based router architecture with mimic defenses[J]. Journal of Cyber Security, 2017,2(1): 29-42.
|
[13] |
姚文斌, 杨孝宗 . 相异性软件组件选择算法设计[J]. 哈尔滨工业大学学报, 2003,35(3): 261-264.
|
|
YAO W B , YANG X Z . Design of selective algorithm for diverse software components[J]. Journal of Harbin Institute of Technology, 2003,35(3): 261-264.
|
[14] |
曾国荪, 陈闳中 . 探索计算系统异构性的描述[J]. 计算机科学, 2003,30(12): 16-18.
|
|
ZENG G S , CHEN H Z . Inquiring the description of heterogeneity among computational systems[J]. Computer Science, 2003,30(12): 16-18.
|
[15] |
吴奎, 周献中, 王建宇 ,等. 基于贝叶斯估计的概念语义相似度算法[J]. 中文信息学报, 2010,24(2): 52-57.
|
|
WU K , ZHOU X Z , WANG J Y ,et al. A concept semantic similarity algorithm based on bayesian estimation[J]. Journal of Chinese Information Processing, 2010,24(2): 52-57.
|
[16] |
魏帅, 于洪, 顾泽宇 ,等. 面向工控领域的拟态安全处理机架构[J]. 信息安全学报, 2017,2(1): 54-73.
|
|
WEI S , YU H , GU Z Y ,et al. Architecture of mimic security processor for industry control system[J]. Journal of Cyber Security, 2017,2(1): 1-12.
|