[1] |
方滨兴 . 定义网络空间安全[J]. 网络与信息安全学报, 2018,4(1): 1-5.
|
|
FANG B X . Define cyberspace security[J]. Chinese Journal of Network and Information Security, 2018,4(1): 1-5.
|
[2] |
黄韬, 刘江, 霍如 ,等. 未来网络体系架构研究综述[J]. 通信学报, 2014,35(8): 184-197.
|
|
HUANG T , LIU J , HUO R ,et al. Survey of research on future network architectures[J]. Journal on Communications, 2014,35(8): 184-197.
|
[3] |
谭晶磊, 张红旗, 雷程 ,等. 面向SDN的移动目标防御技术研究进展[J]. 网络与信息安全学报, 2018,4(7): 1-12.
|
|
TAN J L , ZHANG H Q , LEI C ,et al. Research progress on moving target defense for SDN[J]. Chinese Journal of Network and Information Security, 2018,4(7): 1-12.
|
[4] |
邬江兴 . 拟态计算与拟态安全防御的原意和愿景[J]. 电信科学, 2014,30(7): 2-7.
|
|
WU J X . Meaning and vision of mimic computing and mimic security defense[J]. Telecommunications Science, 2014,30(7): 2-7.
|
[5] |
付钰, 李洪成, 吴晓平 ,等. 基于大数据分析的APT攻击检测研究综述[J]. 通信学报, 2015,36(11): 1-14.
|
|
FU Y , LI H C , WU X P ,et al. Detecting APT attacks:a survey from the perspective of big data analysis[J]. Journal on Communications, 2015,36(11): 1-14.
|
[6] |
张蕾, 崔勇, 刘静 ,等. 机器学习在网络空间安全研究中的应用[J]. 计算机学报, 2018,41(9): 1943-1975.
|
|
ZHANG L , CUI Y , LIU J ,et al. Application of machine learning in cyberspace security research[J]. Chinese Journal of Computers, 2018,41(9): 1943-1975.
|
[7] |
杨德全, 刘卫民, 俞宙 . 基于蜜罐的主动防御应用研究[J]. 网络与信息安全学报, 2018,4(1): 57-62.
|
|
YANG D Q , LIU W Q , YU Z . Research on active defense application based on honeypot[J]. Chinese Journal of Network and Information Security, 2018,4(1): 57-62.
|
[8] |
杨沛安, 武杨, 苏莉娅 ,等. 网络空间威胁情报共享技术综述[J]. 计算机科学, 2018,45(6): 9-18.
|
|
YANG P A , WU Y , SU L Y ,et al. Overview of threat intelligence sharing technologies in cyberspace[J]. Computer Science, 2018,45(6): 9-18.
|
[9] |
Antiy CERT. 从“方程式”到“方程组”EQUATION攻击组织高级恶意代码的全平台能力解析[EB].
|
|
Antiy CERT. From “equation” to “equation group”,full platform capability solution of advanced malicious code of EQUATION attack organization[EB].
|
[10] |
李建华 . 网络空间威胁情报感知、共享与分析技术综述[J]. 网络与信息安全学报, 2016,2(2): 16-29.
|
|
LI J H . Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space[J]. Chinese Journal of Network and Information Security, 2016,2(2): 16-29.
|