[1] |
National Science and Technology Council. Trustworthy cyberspace:strategic plan for the federal cybersecurity research and development program[R]. Executive Office of the President of The United States,(2011-12)[2020-01-08].
|
[2] |
COX B , EVANS D , FILIPI A ,et al. N-variant systems:a secretless framework for security through diversity[C]// Conference on USENIX Security Symposium. Berkeley:USENIX Association, 2006: 1-16.
|
[3] |
HOFMEYR S A , FORREST S . Architecture for an artificial immune system[J]. Evolutionary Computation, 2000,8(4): 443-473.
|
[4] |
KAMPANAKIS P , PERROS H , BEYENE T . SDN-based solutions for moving target defense network protection[C]// The 2014 IEEE International Symposium on World of Wireless,Mobile and Multimedia Networks. Piscataway:IEEE Press, 2014: 1-6.
|
[5] |
邬江兴 . 网络空间拟态防御[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[6] |
任权, 邬江兴, 贺磊 . 基于GSPN的拟态DNS构造策略研究[J]. 信息安全学报, 2019,4(2): 37-52.
|
|
REN Q , WU J X , HEI L . Research on mimic DNS architectural strategy based on generalized stochastic petri net[J]. Journal of Cyber Security, 2019,4(2): 37-52.
|
[7] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016,1(4): 40-51.
|
[8] |
张杰鑫, 庞建民, 张铮 . 拟态构造的Web服务器异构性量化方法[J]. 软件学报, 2020,31(2): 564-577.
|
|
ZHANG J X , PANG J M , ZHANG Z . Quantification method for heterogeneity on Web server with mimic construction[J]. Journal of Software, 2020,31(2): 564-577.
|
[9] |
张杰鑫, 庞建民, 张铮 ,等. 拟态构造Web服务器的服务质量量化方法[J]. 计算机科学, 2019,46(11): 109-118.
|
|
ZHANG J X , PANG J M , ZHANG Z ,et al. QoS quantification method for Web server with mimic construction[J]. Computer Science, 2019,46(11): 109-118
|
[10] |
张杰鑫, 庞建民, 张铮 ,等. 面向拟态构造Web服务器的执行体调度算法[J]. 计算机工程, 2019,45(8): 14-21.
|
|
ZHANG J X , PANG J M , ZHANG Z ,et al. Executors scheduling algorithm for Web server with mimic structure[J]. Computer Engineering, 2019,45(8): 14-21.
|
[11] |
李卫超, 张铮, 王立群 ,等. 一种拟态构造的Web威胁态势分析方法[J]. 计算机工程, 2019,45(8): 1-6.
|
|
LI W C , ZHANG Z , WANG L Q ,et al. A web threat situation analysis method for mimic structure[J]. Computer Engineering, 2019,45(8): 1-6.
|
[12] |
DO C T , TRAN N H , HONG C ,et al. Game theory for cyber security and privacy[J]. ACM Computing Surveys, 2017,50(2): 1-37.
|
[13] |
张兴明, 顾泽宇, 魏帅 ,等. 拟态防御马尔可夫博弈模型及防御策略选择[J]. 通信学报, 2018,39(10): 143-154.
|
|
ZHANG X M , GU Z Y , WEI S ,et al. Markov game modeling of mimic defense and defense strategy determination[J]. Journal on Communications, 2018,39(10): 143-154.
|
[14] |
齐超 . 拟态网络操作系统架构及关键技术研究[D]. 郑州:信息工程大学, 2018.
|
|
QI C . Research on the key technologies of mimic network operating system architecture[D]. Zhengzhou:Information Engineering University, 2018.
|
[15] |
廉哲, 殷肖川, 席茜 ,等. 一种基于拟态防御机制的 SDN 虚拟蜜网[J]. 计算机工程与应用, 2019,55(1): 115-120.
|
|
LIAN Z , YIN X C , XI X ,et al. SDN virtual honeynet based on mimic defense mechanism[J]. Computer Engineering and Applications, 2019,55(1): 109-114.
|
[16] |
MARTEN V D , ARI J , ALINA O . FlipIt:the game of “stealthy takeover”[J]. Journal of Cryptology, 2013,26(4): 655-713.
|
[17] |
LASZKA A , HORVATH G , FELEGYHAZI M ,et al. FlipThem:modeling targeted attacks with FlipIt for multiple resources[J]. Lecture Notes in Computer Science, 2014,8840: 175-194.
|
[18] |
ARON L , BENJAMIN J , JENS G . Mitigating covert compromises[C]// Web and Internet Economics. Berlin:Springer, 2013: 319-332.
|
[19] |
VIET P , CARLOS C . Are we compromised? modelling security assessment games[C]// Decision and Game Theory for Security. Berlin:Springer, 2012: 234-247.
|
[20] |
JONES S , OUTKIN A , GEARHART J ,et al. Evaluating moving target defense with PLADD[R]. Sandia National Laboratories,(2015-09-1)[2020-01-08].
|