[9] |
CHANG X , ZHANG B W , ZHANG Y . Information security modeling method for CMD systems[J]. Communications Technology, 2018,51(1): 165-170.
|
[10] |
李宁波, 赫凌俊, 谢彬 ,等. 基于主动防御的高安全分布式存储系统研究[J]. 信息技术与信息化, 2018(8): 185-188.
|
|
LI N B , HAO L J , XIE B ,et al. Research on high security distributed storage system based on active defense[J]. Information Technology &Informatization, 2018(8): 185-188.
|
[11] |
周清雷, 冯峰, 朱维军 . 基于功能切片的拟态防御体系结构及安全等级评估方法[J]. 通信学报, 2018,39(z2): 99-109.
|
[1] |
KEKKI S , FEATHERSTONE W , FANG Y ,et al. MEC in 5G networks[S].2018. 2018:
|
[2] |
NDIKUMANA A , TRAN N H , HO T M ,et al. Joint communication,computation,caching,and control in big data multi-access edge computing[J]. IEEE Transactions on Mobile Computing, 2019:1.
|
[3] |
TALEB T , SAMDANIS K , MADA B ,et al. On multi-access edge computing:a survey of the emerging 5G network edge cloud architecture and orchestration[J]. IEEE Communications Surveys &Tutorials, 2017,19(3): 1657-1681.
|
[4] |
SHI W , CAO J , ZHANG Q ,et al. Edge computing:vision and challenges[J]. IEEE Internet of Things Journal, 2016,3(5): 637-646.
|
[5] |
CESELLI A , FIORE M , FURNO A ,et al. Prescriptive analytics for MEC orchestration[C]// 2018 IFIP Networking Conference (IFIP Networking) and Workshops. IEEE, 2019: 1-9.
|
[6] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[7] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[8] |
庞建民, 张宇嘉, 张铮 ,等. 拟态防御技术结合软件多样化在软件安全产业中的应用[J]. 中国工程科学, 2016,18(6): 74-78.
|
|
PANG J M , ZHANG Y J , ZHANG Z ,et al. Applying a combination of mimic defense and software diversity in the software security industry[J]. Engineering Science, 2016,18(6): 74-78.
|
[9] |
常箫, 张保稳, 张莹 . 一种面向网络拟态防御系统的信息安全建模方法[J]. 通信技术, 2018,51(1): 165-170.
|
[11] |
ZHOU Q L , FENG F , ZHU W J . Mimic defense organization structure based on functional slice and method of evaluating security level[J]. Journal on Communications, 2018,39(z2): 99-109.
|