[1] |
HU H , WU J , WANG Z ,et al. Mimic defense:a designed-in cybersecurity defense framework[J]. IET Information Security, 2017,12(3): 226-237.
|
[2] |
MA B L , ZHANG Z . Security research of redundancy in mimic defense system[C]// Proceedings of 3rd IEEE International Conference on Computer and Communications (ICCC). Piscataway:IEEE Press, 2017: 2910-2914.
|
[3] |
马海龙, 伊鹏, 江逸茗 ,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017,2(1): 29-42.
|
|
MA H L , YI P , JIANG Y M ,et al. Dynamic heterogeneous redundancy based router architecture with Mimic defenses[J]. 2017,2(1): 29.
|
[4] |
沈丛麒, 陈双喜, 吴春明 . 基于信誉度与相异度的自适应拟态控制器研究[J]. 通信学报, 2018,39(Z2): 173-180.
|
|
SHEN C Q , CHEN S X , WU C M . Adaptive mimic defensive controller framework based on reputation and dissimilarity[J]. Journal on Communications, 2018,39(Z2): 173-180.
|
[5] |
陈利跃, 孙歆, 吴春明 ,等. 一种基于异构度的拟态执行体调度模型研究[C]// 第一届“先进计算与防御技术”会议. 北京:人民邮电出版社, 2018: 494-500.
|
|
CHEN L Y , SUN X , WU C M ,et al. A heterogeneous-based mimic execution scheduling model[C]// Proceedings of the first national conference on advanced computing and defense. Beijing:People’s Posts and Telecom Press, 2018: 494-500.
|
[6] |
魏帅, 于洪, 顾泽宇 ,等. 面向工控领域的拟态安全处理机架构[J]. 信息安全学报, 2017,2(1): 54-73.
|
|
WEI S , YU H , GU Z Y ,et al. Architecture of mimic security processor for industry control system[J]. Journal of Cyber Security, 2017,2(1): 54-73.
|
[7] |
赵长海, 晏海华, 金茂忠 . 基于编译优化和反汇编的程序相似性检测方法[J]. 北京航空航天大学学报, 2008(6): 711-715.
|
|
ZHAO C H , YAN H H , JIN M Z . Approach based on compiling optimization and disassembling to detect program similarity[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008(6): 711-715.
|
[8] |
LIN S , LIU Q , WU Y ,et al. A self-adaptive timeout mechanism in Mimic Defense System[C]// Proceedings of 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). Piscataway:IEEE Press, 2017: 588-591.
|
[9] |
GARCIA M , BESSANI A , GASHI I ,et al. Analysis of OS diversity for intrusion tolerance[J]. Software:Practice and Experience (accepted for publication), 2013.
|
[10] |
邬江兴 . 网络空间内生安全——拟态防御与广义鲁棒控制[M]. 北京: 科学出版社, 2020.
|
|
WU J X . Cyberspace endogenous security:Mimic defense and generalized robust control[M]. Beijing: Science Press, 2020.
|