[1] |
SCH?NW?LDER J , FOUQUET M , RODOSEK G D ,et al. Future Internet=content + services + management[J]. IEEE Communications Magazine, 2009,47(7): 27-33.
|
[2] |
国务院 . 国务院关于积极推进“互联网+”行动的指导意见[J]. 中华人民共和国国务院公报, 2015(20): 20-22.
|
|
State Council of the People’s Republic of China . Opinions of the State Council on actively promoting the "Internet +"action[J]. Bulletin of the State Council of the People’s Republic of China, 2015(20): 20-22.
|
[3] |
工业和信息化部. 工业和信息化部关于印发贯彻落实《国务院关于积极推进“互联网+”行动的指导意见》行动计划(2015-2018年)的通知[Z].
|
|
Ministry of Industry and Information Technology. Notice on the implementation of the action plan of the State Council on actively promoting the guidance of the “Internet +” action(2015-2018)[Z].
|
[4] |
王兴伟, 李婕, 谭振华 ,等. 面向“互联网+”的网络技术发展现状与未来趋势[J]. 计算机研究与发展, 2016,53(4): 729-741.
|
|
WANG X W , LI J , TAN Z H ,et al. The current situation and future trend of network technology for “Internet+”[J]. Computer Research and Development, 2016,53(4): 729-741.
|
[5] |
中国互联网络信息中心. 第36次中国互联网络发展状况统计报告[R]. 2015.
|
|
CNNIC. The 36th annual statistics report of China Internet development[R]. 2015.
|
[6] |
中国新闻网. 中国应以军队为主体整合国家网络空间安全力量[EB/OL]. .
|
|
China News Network. China should use the army as the main body to integrate national cyberspace security forces[EB/OL]. .
|
[7] |
李凤华 . 信息技术与网络空间安全发展趋势[J]. 网络与信息安全学报, 2015,1(1): 8-17.
|
|
LI F H . Information technology and network space security development trend[J]. Chinese Journal of Network and Information Security, 2015,1(1): 8-17.
|
[8] |
方滨兴 . 从层次角度看网络空间安全技术的覆盖领域[J]. 网络与信息安全学报, 2015,1(1): 2-7.
|
|
FANG B X . Study on the coverage of cyberspace security technology from the perspective of hierarchy[J]. Chinese Journal of Network and Information Security, 2015,1(1): 2-7.
|
[9] |
丁禹, 逯志安, 焦建伟 . 2014年网络空间安全问题综述与展望[J]. 信息安全与通信保密, 2015(2): 16-21.
|
|
DING Y , LU Z A , JIAO J W . Summary and prospect of cyberspace security in 2014[J]. Information Security and Communication Confidentiality, 2015(2): 16-21.
|
[10] |
李衂 . 维护国家网络空间主权势在必行[J]. 信息安全与通信保密, 2015(8): 27.
|
|
LI N . Maintaining national cyberspace dominance is imperative[J]. Information Security and Communication Confidentiality, 2015(8): 27.
|
[11] |
MENDYK-KRAJEWSKA T , MAZUR Z . Problem of network security threats[C]// The 3rd Conference on Human System Interactions. 2010: 436-443.
|
[12] |
阿里研究院. 互联网+:从IT到DT[M]. 北京: 机械工业出版社, 2015.
|
|
Alibaba Research Institute. Internet+:from IT to DT[M]. Beijing: Machinery Industry PressPress, 2015.
|
[13] |
FURDEK M , WOSINSKA L , GO?CIE? R ,et al. An overview of security challenges in communication networks[C]// Resilient Networks Design and Modeling. 2016.
|
[14] |
HASHIZUME K , ROSADO D G , FERNáNDEZ-MEDINA E ,et al. An analysis of security issues for cloud computing[J]. Journal of Internet Services and Applications, 2013,4(1): 1-13.
|
[15] |
国家计算机网络应急技术处理协调中心. 2014 年中国互联网网络安全报告[M]. 北京: 人民邮电出版社, 2015.
|
|
CNCERT/CC. China Internet network security report 2014[M]. Beijing: Posts and Telecommunications PressPress, 2015.
|
[16] |
DRIAS Z , SERHROUCHNI A , VOGEL O . Analysis of cyber security for industrial control systems[C]// The International Conference on Cyber Security of Smart Cities,Industrial Control System and Communications. 2015.
|
[17] |
陶耀东, 李宁, 曾广圣 . 工业控制系统安全综述[J]. 计算机工程与应用, 2016,52(13): 8-18.
|
|
TAO Y D , LI N , ZENG G S . Safety of industrial control system[J]. Computer Engineering and Applications, 2016,52(13): 8-18.
|
[18] |
维克托·迈尔-舍恩伯格, 肯尼斯·库克耶 . MPLS宽带网络互联技术[M]. 大数据时代: 浙江人民出版社, 2012: 27-60.
|
|
SMEYER-CHOENBERG V , COOKE K . Big data era[M]. Hangzhou: Zhejiang People 's Publishing HousePress, 2012: 27-60.
|
[19] |
苏鹏冲, 马丁, 袁得嵛 . “互联网+”时代网络安全与执法专业人才培养研究[J]. 中国人民公安大学学报:自然科学版, 2016(1): 79-82.
|
|
SU P C , MA D , YUAN D Y . Research on the training of network security and law enforcement professional talents in Internet plus era[J]. Journal of People’s Public Security University of China:Natural Science Edition, 2016(1): 79-82.
|
[20] |
马明阳 . 针对社会工程学攻击的防御技术研究[D]. 北京:北京邮电大学, 2015.
|
|
MA M Y . Research on defense technology for social engineering attack[D]. Beijing:Beijing University of Posts and Telecommunications, 2015.
|
[21] |
ROADS of storage[EB/OL]. .
|
[22] |
杨帅 . 工业4.0与工业互联网:比较、启示与应对策略[J]. 当代财经, 2015(8): 99-107.
|
|
YANG S . Industrial 4.0 and industrial Internet:comparison,revelation and coping strategies[J]. Contemporary Finance and Economics, 2015(8): 99-107.
|
[23] |
GAN G , LU Z , JIANG J . Internet of things security analysis[C]// The International Conference on Internet Technology and Applications. 2011: 1-4.
|
[24] |
郑斌 . 大数据下的数据安全[EB/OL]. .
|
|
ZHENG B . Data security under big data[EB/OL]. .
|
[25] |
杨洁冰 . 自动分层存储技术及其应用[D]. 北京:北京邮电大学, 2011.
|
|
YANG J B . Automatic tiered storage technology and its application[D]. Beijing:Beijing University of Posts and Telecommunications, 2011.
|
[26] |
BANDARI G M , CHANDRA N S , KRISHNA V . Secure cloud storage through public auditing and cryptographic primitives[J]. International Journal of Computer Trends &Technology, 2014,15(2): 36-48.
|
[27] |
YU S , LIU M , DOU W ,et al. Networking for big data:a survey[J]. IEEE Communications Surveys &Tutorials, 2016,99: 1.
|
[28] |
WANG J , LUO Y , ZHAO Y ,et al. A survey on privacy preserving data mining[C]// The International Workshop on Database Technology &Applications. 2009: 111-114.
|
[29] |
WU F , XU L , KUMARI S ,et al. A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security[J]. Journal of Ambient Intelligence &Humanized Computing, 2016: 1-16.
|
[30] |
黄刘生, 田苗苗, 黄河 . 大数据隐私保护密码技术研究综述[J]. 软件学报, 2015,26(4): 945-959.
|
|
HUANG L S , TIAN M M , HUANG H . A survey on big data privacy protection[J]. Journal of Software, 2015,26(4): 945-959.
|