[1] |
舒晓慧, 金小晰, 吴瑶 . 网络交换机的安全威胁与防范[J]. 网络安全技术与应用, 2014(10): 130-131.
|
|
SHU X H , JIN X X , WU Y . Security treats and prevention of a network switch[J]. Network Security Technology & Application, 2014(10): 130-131.
|
[2] |
武泽慧, 魏强, 任开磊 ,等. 基于 OpenFlow 交换机洗牌的 DDoS攻击动态防御方法[J]. 电子与信息学报, 2017,39(2): 397-404.
|
|
WU Z H , WEI Q , REN K L ,et al. Dynamic defense for DDoS attack using OpenFlow-based switch shuffling approach[J]. Journal of Electronics & Information Technology, 2017,39(2): 397-404.
|
[3] |
YAN Q , YU F R , GONG Q ,et al. Software-defined networking (SDN)and distributed denial of service (DDoS) attacks in cloud computing environments:a survey,some research issues,and challenges[J]. IEEE Communications Surveys & Tutorials, 2016,18(1): 602-622.
|
[4] |
ZHUANG R , DELOAC H , SCOTT A ,et al. A model for analyzing the effect of moving target defenses on enterprise networks[C]// Proceedings of the 9th Annual Cyber and Information Security Research Conference. New York:ACM Press, 2014: 73-76.
|
[5] |
FENG X T , ZHENG Z Z , DERYA C ,et al. A signaling game model for moving target defense[C]// IEEE INFOCOM 2017-IEEE Conference on Computer Communications. Piscataway:IEEE Press, 2017: 1-4.
|
[6] |
ZAFFARANO K , TAYLOR J , HAMILTON S . A quantitative framework for moving target defense effectiveness evaluation[J]. Association for Computing Machinery, 2015(10): 3-11.
|
[7] |
邬江兴 . 拟态计算和拟态安全防御的原意和愿景[J]. 电信科学, 2014,30(7): 1-7.
|
|
WU J X . Meaning and vision of mimic computing and mimic security defense[J]. Telecommunications Science, 2014,30(7): 1-7.
|
[8] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG S P . Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016,1(4): 40-51.
|
[9] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[10] |
马海龙, 伊鹏, 江逸茗 ,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017,2(1): 29-42.
|
|
MA H L , YI P , JIANG Y M ,et al. Dynamic heterogeneous redundancy based router architecture with mimic defenses[J]. Journal of Cyber Security, 2017,2(1): 29-42.
|
[11] |
魏帅, 于洪, 顾泽宇 ,等. 面向工控领域的拟态安全处理机架构[J]. 信息安全学报, 2017,2(1): 54-74.
|
|
WEI S , YU H , GU Z Y ,et al. Architecture of mimic security processor for industry control system[J]. Journal of Cyber Security, 2017,2(1): 54-74.
|
[12] |
邬江兴 . 网络空间拟态防御导论[M]. 北京: 科学出版社, 2017.
|
|
WU J X . Introduction to cyberspace mimetic defense[M]. Beijing: Science PressPress, 2017.
|