[1] |
马洪源, 肖子玉, 卜忠贵 ,等. 5G边缘计算技术及应用展望[J]. 电信科学, 2019,35(6): 114-123.
|
|
MA H Y , XIAO Z Y , BU Z G ,et al. 5G edge computing technology and application prospects[J]. Telecommunications Science, 2019,35(6): 114-123.
|
[2] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83.
|
|
FENG D G , ZHANG M , ZHANG Y ,et al. Study on cloud computing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[3] |
李雨航, 郭鹏程 . 云安全的发展与未来趋势[J]. 中国信息安全, 2022(5): 39-42.
|
|
LI Y H , GUO P C . The development and future trend of cloud security[J]. China Information Security, 2022(5): 39-42.
|
[4] |
李莹, 张乐, 徐晓蕾 ,等. 面向 5G 的云网融合发展探讨[J]. 电信工程技术与标准化, 2019,32(11): 7-11.
|
|
LI Y , ZHANG L , XU X L ,et al. Discussion on the cloud-network integration for 5G[J]. Telecom Engineering Technics and Standardization, 2019,32(11): 7-11.
|
[5] |
陈广勇, 祝国邦, 范春玲 . 《信息安全技术 网络安全等级保护测评要求》(GB/T 28448-2019)标准解读[J]. 信息网络安全, 2019,223(7): 1-7.
|
|
CHEN G Y , ZHU G B , FAN C L . Information security technology—evaluation requirement for classified protection of cybersecurity (GB/T 28448-2019) standard interpretation[J]. Netinfo Security, 2019,223(7): 1-7.
|
[6] |
马力, 祝国邦, 陆磊 . 《网络安全等级保护基本要求》(GB/T 22239-2019)标准解读[J]. 信息网络安全, 2019(2): 77-84.
|
|
MA L , ZHU G B , LU L . Baseline for classified protection of cybersecurity (GB/T 22239-2019) standard interpretation[J]. Netinfo Security, 2019(2): 77-84.
|
[7] |
丁春涛, 曹建农, 杨磊 ,等. 边缘计算综述:应用、现状及挑战[J]. 中兴通讯技术, 2019,25(3): 2-7.
|
|
DING C T , CAO J N , YANG L ,et al. Edge computing:applications,state-of-the-art and challenges[J]. ZTE Technology Journal, 2019,25(3): 2-7.
|
[8] |
王琦 . 5G 云化安全风险研究[J]. 信息通信技术与政策, 2021(2): 92-96.
|
|
WANG Q . Research on security risks of 5G cloud[J]. Information and Communications Technology and Policy, 2021(2): 92-96.
|
[9] |
曹籽文 . 边缘计算:框架与安全[J]. 保密科学技术, 2019(9): 44-48.
|
|
CAO Z W . Edge computing:framework and security[J]. Secrecy Science and Technology, 2019(9): 44-48.
|
[10] |
尹东明 . MEC构建面向5G网络构架的边缘云[J]. 电信网技术, 2016(11): 43-46.
|
|
YIN D M . MEC build the 5G-oriented edge cloud[J]. Telecommunications Network Technology, 2016(11): 43-46.
|
[11] |
关于加快建立健全绿色低碳循环发展经济体系的指导意见[J]. 中国产经, 2021(8): 19-22.
|
|
Guiding opinions on accelerating the establishment and improvement of green and low-carbon circular development economic system[J]. Chinese Industry & Economy, 2021(8): 19-22.
|
[12] |
董亮, 阚新生, 胡伟雄 ,等. 云平台安全技术架构研究[J]. 电信快报, 2021(6): 14-18.
|
|
DONG L , KAN X S , HU W X ,et al. Research on security technology architecture of cloud platform[J]. Telecommunications Information, 2021(6): 14-18.
|
[13] |
许暖, 韩志峰, 郑瑞刚 . 基于分级分类的安全编排技术在网络安全应急响应中的应用探索[J]. 网络空间安全, 2021,12(S1): 45-53.
|
|
XU N , HAN Z F , ZHENG R G . Practice and exploration in cybersecurity emergency response based on graded and classified security orchestration technology[J]. Cyberspace Security, 2021,12(S1): 45-53.
|
[14] |
赵粤征, 叶建伟, 贠珊 ,等. 基于 SOAR 的安全运营自动化关键技术构建及未来演进方向[J]. 信息技术与网络安全, 2021,40(3): 19-27.
|
|
ZHAO Y Z , YE J W , YUN S ,et al. Key technology construction and future evolution direction of safety operation automation based on SOAR[J]. Cyber Security and Data Governance, 2021,40(3): 19-27.
|