[1] |
XU H , CHEN X , ZHOU J M ,et al. Research on basic problems of cognitive network intrusion prevention[C]// Proceedings of 2013 Ninth International Conference on Computational Intelligence and Security. Piscataway:IEEE Press, 2013: 514-517.
|
[2] |
CHUNG C J , KHATKAR P , XING T Y ,et al. NICE:network intrusion detection and countermeasure selection in virtual network systems[J]. IEEE transactions on dependable and secure computing, 2013,10(4): 198-211.
|
[3] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Cyber Security, 2016,1(4): 1-10.
|
[4] |
邬江兴 . 拟态计算与拟态安全防御的原意和愿景[J]. 电信科学, 2014,30(7): 1-7.
|
|
WU J X . Meaning and vision of mimic computing andmimic security defense[J]. Telecommications Science, 2014,30(7): 1-7.
|
[5] |
仝青, 张铮, 张为华 ,等. 拟态防御Web服务器设计与实现[J]. 软件学报, 2017(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017(4): 883-897.
|
[6] |
朱泓艺, 陆肖元, 李毅 . 基于拟态防御原理的分布式多接入边缘计算研究[J]. 物联网学报, 2019(10): 80-87.
|
|
ZHU H Y , LU X Y , LI Y . Distributed multi-access edge computing based on mimic defense theory[J]. Chinese Journal on Interner of Things, 2019(10): 80-87.
|
[7] |
方滨兴, 贾焰, 李爱平 ,等. 网络空间靶场技术研究[J]. 信息安全学报, 2016,1(3): 1-9.
|
|
FANG B X , JIA Y , LI A P ,et al. Cyber ranges:state-of-the-art and research challenges[J]. Cyber Security, 2016,1(3): 1-9.
|
[8] |
刘正军, 徐锐, 李春林 ,等. 面向先进防御技术的网络安全试验场构建方法[J]. 通信技术, 2020,53(2): 450-455.
|
|
LIU Z J , XU R , LI C L ,et al. Construction method of network security experimental platform foradvanced defense technology[J]. Communication Technology, 2020,53(2): 450-455.
|
[9] |
FERGUSON B , TALL A , OLSEN D . National cyber range overview[C]// Proceedings 2014 IEEE Military Communications Conference. Piscataway:IEEE Press, 2014: 123-128.
|
[10] |
URISA V E , STOUT W M S , VANan L B ,et al. Cyber range infrastructure limitations and needs of tomorrow:a position paper[C]// Proceedings 2018 International Carnahan Conference on Security Technology (ICCST). Piscataway:IEEE Press, 2018: 1-5.
|
[11] |
PETESON L , WROCLAWSKI J . Overview of the GENI architecture[J]. GENI Design Document, 2007(2): 06-11.
|
[12] |
PETERSONE L , MUIR S , ROSCOE T ,et al. Planetlab architecture:an overview[J]. PlanetLab Consortium May, 2006,1(15): 1-4.
|
[13] |
BENZEL T , BRADEN R , KIM D ,et al. Experience with deter:a testbed for security research[C]// Proceedings of 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities. Piscataway:IEEE Press, 2006:10.
|
[14] |
SUNE M , BERGESIO L , WOSENER H ,et al. Design and implementation of the OFELIA FP7 facility:The European OpenFlow testbed[J]. Computer Networks, 2014,61: 132-150.
|
[15] |
WINTER H , . System security assessment using a cyber range[C]// Proceedings of IET International Conference on System Safety.[S.l.:s.n.], 2013.
|
[16] |
SCHWERDEL D , REUTHER B , ZINNER T ,et al. Future internet research and experimentation:the G-Lab approach[J]. Computer Networks, 2014(61): 102-117.
|
[17] |
MULLER P , SCHWERDEL D . A novel approach towards sustainable testbeds:ToMaTo on cloudLab[J]. PIK-Praxis der Informationsverarbeitung und Kommunikation, 2017,39(3-4): 87-102.
|
[18] |
MIYAJI T . X-ray-Infrared relation of AGNs and search for highly obscured accretion in the AKARI NEP Field[J]. Proceedings of the International Astronomical Union, 2019,15(S341): 172-176.
|
[19] |
BAIK K H , SUK Y K . A Study on the ubiquitous industryz's effects on Korean economy using interindustry analysis[J]. Journal of the Korea Academia-Industrial Cooperation Society, 2006,7(3): 494-505.
|
[20] |
丁绍虎, 李军飞, 季新生 . 基于拟态防御的SDN控制层安全机制研究[J]. 信息安全学报, 2018,4(4): 84-93.
|
|
DING S H , LI J F , JI X S . Research on SDN control layer security based onmimic defense[J]. Cyber Security, 2018,4(4): 84-93.
|