[1] |
SUBRAHMANIAN V S , OVEKGONN M , DUMITRAS T ,et al. The global cyber-vulnerability report[J]. Springer Int’l Publishing, 2015(10): 33-64.
|
[2] |
China Information Technology Security Evaluation Center. China national vulnerability database of information security[EB]. 2015.
|
[3] |
XU H , CHEN X , ZHOU J ,et al. Research on basic problems of cognitive network intrusion prevention[C]// Proceedings of 9th International Conference on Computational Intelligence and Security (CIS). Piscataway:IEEE Press, 2013: 514-517.
|
[4] |
CHUNG C J , KHATKAR P , XING T ,et al. NICE:network intrusion detection and countermeasure selection in virtual network systems[J]. IEEE Transaction on Dependable and Secure Computing, 2013,10(4): 198-211.
|
[5] |
MADA B B , GOSEVAP K , VAIDYANATHAN K ,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems[J]. Performance Evaluation, 2004,56(14): 167-186.
|
[6] |
WU J X . Research on cyberspace mimic defense[J]. Journal of Information Security, 2016,1(4): 1-10.
|
[7] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017(4): 883-897.
|
[8] |
邬江兴 . 拟态计算与拟态安全防御的原意和愿景[J]. 电信科学, 2014,30(7): 2-7.
|
|
WU J X . The original intention and vision of mimic computing and mimic security defense[J]. Telecommunications Science, 2014,30(7): 2-7.
|
[9] |
National Science and Technology Council. Trustworthy cyberspace:strategic plan for the federal cybersecurity research and development program[EB]. 2011.
|
[10] |
邬江兴 . 网络空间拟态防御原理[M]. 北京: 科学出版社, 2018: 317-367.
|
|
WU J X . Cyber mimic defense[M]. Beijing: Science PressPress, 2018: 317-367.
|
[11] |
VOAS J , GHOSH A , CHARRON F ,et al. Reducing uncertainty about common-mode failures[C]// Proceedings of IEEE Symposium on Software Reliability Engineering (SRE’ 97). Piscataway:IEEE Press, 1997: 308-319.
|
[12] |
LECITIN G . Optimal structure of fault-tolerant software systems[J]. Reliability Engineering & System Safety, 2005,8(3): 286-295.
|
[13] |
LIU C , LI C Q , QIU G W . Research on intruder countermeasures based on CobaltStrike and office vulnerabilities[J]. Cyberspace Security, 2018(1): 56-61.
|