[1] |
贾铁军, 侯丽波, 宋少婷 ,等. 网络安全实用技术[M]. 北京: 清华大学出版社, 2011.
|
|
JIA T J , HOU L B , SONG S T ,et al. Practical network security technology[M]. Beijing: Tsinghua University PressPress, 2011.
|
[2] |
李小燕 . 网络可信身份认证技术演变史及发展趋势研究[J]. 网络空间安全, 2018,9(11): 6-18.
|
|
LI X Y . Study on evolution history and development trend of network trusted identity authentication technology[J]. Information Security and Technology, 2018,9(11): 6-18.
|
[3] |
常玲, 赵蓓, 薛姗 ,等. 基于网络安全的身份认证技术研究[J]. 电信工程技术与标准化, 2019,32(2): 37-42.
|
|
CHANG L , ZHAO P , XUE S ,et al. Research on identity authentication technology in network security[J]. Telecom Engineering Technics and Standardization, 2019,32(2): 37-42.
|
[4] |
安迪, 杨超, 姜奇 ,等. 一种新的基于指纹与移动端协助的口令认证方法[J]. 计算机研究与发展, 2016,53(10): 2400-2411.
|
|
AN D , YANG C , JIANG Q ,et al. A new password authentication method based on fingerprint and mobile phone assistance[J]. Journal of Computer Research and Development, 2016,53(10): 2400-2411.
|
[5] |
周庆, 黄党志 . 基于 Ising 模型的 QR 码加密算法[J]. 计算机应用, 2013,33(10): 2861-2864.
|
|
ZHOU Q , HUANG D Z . Encryption algorithm for QR code based on Ising model[J]. Journal of Computer Applications, 2013,33(10): 2861-2864.
|
[6] |
韩林, 张春海, 徐建良 . 基于二维码的内外网物理隔离环境下的数据交换[J]. 计算机科学, 2016,43(S2): 520-522.
|
|
HAN L , ZHANG C H , XU J L . Data exchange based on QR code in physically isolated internal and external network environment[J]. Computer Science, 2016,43(S2): 520-522.
|
[7] |
古晓艳, 夏志强 . 基于二维码的高校教学设备管理系统的设计与实现[J]. 计算机科学, 2017,44(S1): 523-525.
|
|
GU X Y , XIA Z Q . Design and implementation of teaching equipment management system based on two-dimensional code[J]. Computer Science, 2017,44(S1): 523-525.
|
[8] |
MOHAN P , CHELLIAH S . An authentication technique for accessing de-duplicated data from private cloud using one time password[J]. International Journal of Information Security and Privacy, 2017,11(2): 1-10.
|
[9] |
KAO Y , LUO G , LIN H ,et al. Physical access control based on QR code[C]// 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. Piscataway:IEEE Press, 2011: 285-288.
|
[10] |
于英政 . QR 二维码相关技术的研究[D]. 北京:北京交通大学, 2014.
|
|
YU Y Z . Research on related technologies of the QR 2-dimensional code[D]. Beijing:Beijing Jiaotong University, 2014.
|
[11] |
邬江兴 . 网络空间拟态防御导论[M]. 北京: 科学出版社, 2017.
|
|
WU J X . Introduction to cyberspace mimic defense[M]. Beijing: Science PressPress, 2017.
|
[12] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016,1(4): 40-51.
|
[13] |
ZHUANG R , DELOACH S A , OU X . Towards a theory of moving target defense[C]// Proceedings of the First ACM Workshop on Moving Target Defense. New York:ACM Press, 2014: 31-40.
|
[14] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[15] |
王禛鹏, 扈红超, 程国振 . 一种基于拟态安全防御的DNS框架设计[J]. 电子学报, 2017,45(11): 2705-2714.
|
|
WANG Z P , HU H C , CHENG G Z . A DNS architecture based on mimic security defense[J]. Acta Electronica Sinica, 2017,45(11): 2705-2714.
|
[16] |
王禛鹏, 扈红超, 程国振 . MNOS:拟态网络操作系统设计与实现[J]. 计算机研究与发展, 2017,54(10): 2321-2333.
|
|
WANG Z P , HU H C , CHENG G Z . Design and implementation of mimic network operating system[J]. Journal of Computer Research and Development, 2017,54(10): 2321-2333.
|
[17] |
马海龙, 伊鹏, 江逸茗 ,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017,2(1): 29-42.
|
|
MA H L , YI P , JIANG Y M ,et al. Dynamic heterogeneous redundancy based router architecture with mimic defenses[J]. Journal of Cyber Security, 2017,2(1): 29-42.
|
[18] |
OUELHADJ D , PETROVIC S . A survey of dynamic scheduling in manufacturing systems[J]. Journal of Scheduling, 2009,12(4):417.
|
[19] |
刘勤让, 林森杰, 顾泽宇 . 面向拟态安全防御的异构功能等价体调度算法[J]. 通信学报, 2018,39(7): 188-198.
|
|
LIU Q R , LIN S J , GU Z Y . Heterogeneous redundancies scheduling algorithm for mimic security defense[J]. Journal on Communications, 2018,39(7): 188-198.
|