[1] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANG Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[2] |
邬江兴 . 网络空间拟态防御原理[M]. 北京: 科学出版社, 2018.
|
|
WU J X . Cyberspace mimic defense[M]. Beijing: Science PressPress, 2018.
|
[3] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[4] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016,1(4): 40-51.
|
[5] |
陈越, 王龙江, 严新成 ,等. 基于再生码的拟态数据存储方案[J]. 通信学报, 2018,39(4): 21-34.
|
|
CHEN Y , WANG L J , YAN X C ,et al. Mimic storage scheme based on regenerated code[J]. Journal on Communications, 2018,39(4): 21-34.
|
[6] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[7] |
马海龙, 伊鹏, 江逸茗 ,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017,2(1): 29-42.
|
|
MA H L , YI P , JIANG Y M ,et al. Dynamic heterogeneous redundancy based router architecture with mimic defenses[J]. Journal of Cyber Security, 2017,2(1): 29-42.
|
[8] |
李传煌, 任云方, 汤中运 ,等. SDN中服务部署的拟态防御方法[J]. 通信学报, 2018,39(S2): 121-130.
|
|
LI C H , REN Y F , TANG Z Y ,et al. Mimic defense method for service deployment in SDN[J]. Journal on Communications, 2018,39(S2): 121-130.
|
[9] |
王禛鹏, 扈红超, 程国振 . 一种基于拟态安全防御的 DNS 框架设计[J]. 电子学报, 2017,45(11): 139-148.
|
|
WANG Z P , HU H C , CHENG G Z . A DNS architecture based on mimic security defense[J]. Acta Electronica Sinica, 2017,45(11): 139-148.
|
[10] |
殷斌, 陆熊, 陶想林 . 非相似三余度飞控计算机设计和可靠性分析[J]. 测控技术, 2015,34(5): 53-56.
|
|
YIN B , LU X , TAO X L . Design of a prototype flight control computer system with triple dissimilar redundancy[J]. Measurement &Control Technology, 2015,34(5): 53-56.
|
[11] |
臧红伟, 韩炜, 高德远 . 非相似余度计算机系统及其可靠性分析[J]. 哈尔滨工业大学学报, 2008,40(3): 492-494.
|
|
ZANG H W , HAN W , GAO D Y . Dissimilar redundancy computer system and reliability analysis[J]. Journal of Harbin Institute of Technology, 2008,40(3): 492-494.
|
[12] |
王伟, 杨本朝, 李光松 ,等. 异构冗余系统的安全性分析[J]. 计算机科学, 2018,45(9): 183-186,194.
|
|
WANG W , YANG B C , LI G S ,et al. Security analysis of heterogeneous redundant systems[J]. Computer Science, 2018,45(9): 183-186,194.
|
[13] |
王伟, 曾俊杰, 李光松 ,等. 动态异构冗余系统的安全性分析[J]. 计算机工程, 2018,44(10): 42-45,50.
|
|
WANG W , ZENG J J , LI G S ,et al. Security analysis of dynamic heterogeneous redundant system[J]. Computer Engineering, 2018,44(10): 42-45,50.
|
[14] |
姚文斌, 杨孝宗 . 相异性软件组件选择算法设计[J]. 哈尔滨工业大学学报, 2003,35(3): 261-264.
|
|
YAO W B , YANG X Z . Design of selective algorithm for diverse software components[J]. Journal of Harbin Institute of Technology, 2003,35(3): 261-264.
|
[15] |
WANG Y W , WU J X , GUO Y F ,et al. Scientific workflow execution system based on mimic defense in the cloud environment[J]. Frontiers of Information Technology & Electronic Engineering, 2018,19(12): 1522-1537.
|
[16] |
张杰鑫, 庞建民, 张铮 ,等. 面向拟态构造Web服务器的执行体调度算法[J]. 计算机工程, 2019,45(8): 14-21.
|
|
ZHANG J X , PANG J M , ZHANG Z ,et al. The executors scheduling algorithm for the Web server with mimic construction[J]. Computer Engineering, 2019,45(8): 14-21.
|
[17] |
GARCIA M , BESSANI A , GASHI I ,et al. Analysis of operating system diversity for intrusion tolerance[J]. Software:Practice and Experience, 2014,44(6): 735-770.
|
[18] |
刘勤让, 林森杰, 顾泽宇 . 面向拟态安全防御的异构功能等价体调度算法[J]. 通信学报, 2018,39(7): 188-198.
|
|
LIU Q R , LIN S J , GU Z Y . Heterogeneous redundancies scheduling algorithm for mimic security defense[J]. Journal on Communications, 2018,39(7): 188-198.
|
[19] |
魏帅, 于洪, 顾泽宇 ,等. 面向工控领域的拟态安全处理机架构[J]. 信息安全学报, 2017,2(1): 54-73.
|
|
WEI S , YU H , GU Z Y ,et al. Architecture of mimic security processor for industry control system[J]. Journal of Cyber Security, 2017,2(1): 54-73.
|