[1] |
PALANKAR M R , IAMNITCHI A , RIPEANU M ,et al. Amazon S3 for science grids:a viable solution?[C]// The 2008 International Workshop on Data-aware Distributed Computing. 2008: 55-64.
|
[2] |
CALDER B , WANG J , OGUS A ,et al. Windows azure storage:a highly available cloud storage service with strong consistency[C]// The Twenty-Third ACM Symposium on Operating Systems Principles. 2011: 143-157.
|
[3] |
MCKUSICK K , QUINLAN S . GFS:evolution on fast-forward[J]. Communications of the ACM, 2010,53(3): 42-49.
|
[4] |
SHVACHKO K , KUANG H , RADIA S ,et al. The Hadoop distributed file system[C]// MASS Storage Systems and Technologies. 2010: 1-10.
|
[5] |
罗象宏, 舒继武 . 存储系统中的纠删码研究综述[J]. 计算机研究与发展, 2012,49(1): 1-11.
|
|
LUO X H , SHU J W . Summary of research for erasure code in storage system[J]. Journal of Computer Research and Development, 2012,49(1): 1-11.
|
[6] |
邬江兴 . 网络空间拟态安全防御[J]. 保密科学技术, 2014(10): 4-10.
|
|
WU J X . Cyber minic security defense[J]. Secrecy Science and Technology, 2014(10): 4-10.
|
[7] |
邬江兴, 张帆, 罗兴国 ,等. 拟态计算与拟态安全防御[J]. 计算机学会通讯, 2015,11(1): 8-14.
|
|
WU J X , ZHANG F , LUO X G ,et al. The meaning and vision of minic computing and minic security defense[J]. Communications of CCF, 2015,11(1): 8-14.
|
[8] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[9] |
罗兴国, 仝青, 张铮 ,等. 拟态防御技术[J]. 中国工程科学, 2016,18(6): 69-73.
|
|
LUO X G , TONG Q , ZHANG Z ,et al. Mimic defense technology[J]. Engineering Sciences, 2016,18(6): 69-73.
|
[10] |
斯雪明, 王伟, 曾俊杰 ,等. 拟态防御基础理论研究综述[J]. 中国工程科学, 2016,18(6): 62-68.
|
|
SI X M , WANG W , ZENG J J ,et al. A review of the basic theory of mimic defense[J]. Engineering Sciences, 2016,18(6): 62-68.
|
[11] |
庞建民, 张宇嘉, 张铮 ,等. 拟态防御技术结合软件多样化在软件安全产业中的应用[J]. 中国工程科学, 2016,18(6): 74-78.
|
|
PANG J M , ZHANG Y J , ZHANG Z ,et al. Applying a combination of mimic defense and software diversity in the software security industry[J]. Engineering Sciences, 2016,18(6): 74-78.
|
[12] |
邬江兴 . 专题导读—拟态计算与拟态安全防御的原意和愿景[J]. 电信科学, 2014,30(7): 1-7.
|
|
WU J X . Meaning and vision of mimic computing and mimic security defense[J]. Telecommunications Science, 2014,30(7): 1-7.
|
[13] |
吴春明 . 动态网络主动安全防御的若干思考[J]. 中兴通讯技术, 2016(1): 34-37.
|
|
WU C M . Proactive security defense of dynamic network[J]. ZTE Technology Journal, 2016(1): 34-37.
|
[14] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[15] |
张铮, 马博林, 邬江兴 . Web 服务器拟态防御原理验证系统测试与分析[J]. 信息安全学报, 2017,2(1): 13-28.
|
|
ZHANG Z , MA B L , WU J X . The test and analysis of prototype of mimic defense in web servers[J]. Journal of Cyber Security, 2017,2(1): 13-28.
|
[16] |
HU Y , LEE P P C , SHUM K W . Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems[C]// IEEE INFOCOM. 2012: 2355-2363.
|
[17] |
TRACEY H , MURIEL M . On randomized network coding[C]// The Annual Allerton Conference on Communication Control and Computing. 2003(3): 11-20.
|
[18] |
MOSHKOVITZ D . An alternative proof of the schwartz-zippel lemma[J]. Electronic Colloquium on Computational Complexity, 2010,17.
|
[19] |
PLANK J . S.Jerasure:a libraryin C/C++ facilitating erasure coding for storage applications-version 1.2,UT-CS-08-627[R]. Department of Computer Science,University of Tennessee, 2008.
|