[1] |
李凤华, 殷丽华, 吴巍 ,等. 天地一体化信息网络安全保障技术研究进展及发展趋势[J]. 通信学报, 2016,37(11): 156-168.
|
|
LI F H , YIN L H , WU W ,et al. Research status and development trends of security assurance for space-ground integration information network[J]. Journal on Communications, 2016,37(11): 156-168.
|
[2] |
LIU J J , SHI Y P , FADLULLAH Z M ,et al. Space-air-ground integrated network:a survey[J]. IEEE Communications Surveys & Tutorials, 2018,20(4): 2714-2741.
|
[3] |
DAS S , LIU Y , ZHANG W ,et al. Semantics-based online malware detection:towards efficient real-time protection against malware[J]. IEEE Transactions on Information Forensics and Security, 2016,11(2): 289-302.
|
[4] |
AMBUSAIDI M A , HE X J , NANDA P ,et al. Building an intrusion detection system using a filter-based feature selection algorithm[J]. IEEE Transactions on Computers, 2016,65(10): 2986-2998.
|
[5] |
SHAMELI-SENDI A , LOUAFI H , HE W B ,et al. Dynamic optimal countermeasure selection for intrusion response system[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(5): 755-770.
|
[6] |
SCHMITZ C , PAPE S . LiSRA:lightweight security risk assessment for decision support in information security[J]. Computers & Security, 2020,90:101656.
|
[7] |
CINQUE M , DELLA C R , PECCHIA A . Contextual filtering and prioritization of computer application logs for security situational awareness[J]. Future Generation Computer Systems, 2020,111: 668-680.
|
[8] |
KHRAISAT A , GONDAL I , VAMPLEW P ,et al. Survey of intrusion detection systems:techniques,datasets and challenges[J]. Cybersecurity, 2019,2(1): 20.
|
[9] |
BRABRA H , MTIBAA A , GAALOUL W ,et al. Toward higher-level abstractions based on state machine for cloud resources elasticity[J]. Information Systems, 2020,90:101450.
|
[10] |
YAO J Y , FAN X N , CAO N . Survey of network security situational awareness[M]. Berlin: Springer, 2019.
|
[11] |
ZHENG G , PENG Y . GlobalFlow:a cross-region orchestration service for serverless computing services[C]// Proceedings of 2019 IEEE 12th International Conference on Cloud Computing. Piscataway:IEEE Press, 2019: 508-510.
|
[12] |
SHIN S , YEGNESWARAN V , PORRAS P ,et al. AVANT-GUARD:scalable and vigilant switch flow management in software-defined networks[C]// Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security. New York:ACM Press, 2013: 413-424.
|
[13] |
SHIN S , PORRAS P , YEGNESWARAN V ,et al. FRESCO:modular composable security services for software-defined networks[C]// Proceedings of the Symposium on Network and Distributed System Security. Piscataway:IEEE Press, 2013: 1-16.
|
[14] |
XU S P , ZHANG Y H , ZHOU Y ,et al. Design and application of a network security model[C]// Proceedings of the 2nd International Symposium on Computer,Communication,Control and Automation. Paris:Atlantis Press, 2013: 2773-2776.
|
[15] |
DEMIRCI M , AMMAR M . Design and analysis of techniques for mapping virtual networks to software-defined network substrates[J]. Computer Communications, 2014,45: 1-10.
|