[1] |
ZHANG Y , VIN H , ALVISI L ,et al. Heterogeneous networking:a new survivability paradigm[C]// The 2001 Workshop on New Security Paradigms. New York:ACM Press, 2001: 33-39.
|
[2] |
STAMP M . Risks of monoculture[J]. Communications of the ACM, 2004,47(3):120.
|
[3] |
张宇嘉, 庞建民, 张铮 ,等. 基于软件多样化的拟态安全防御策略[J]. 计算机科学, 2018,45(2): 215-221.
|
|
ZHANG Y J , PANG J M , ZHANG Z , WU J X . A mimic security defence strategy based on software diversity[J]. Computer Science, 2018,45(2): 215-221.
|
[4] |
庞建民, 张宇嘉, 邬江兴 ,等. 拟态防御技术结合软件多样化在软件安全产业中的应用[J]. 中国工程科学, 2016,18(6): 74-78.
|
|
PANG J M , ZHANG Y J , WU J X ,et al. Applying a combination of mimic defense and software diversity in the software security industry[J]. Strategic Study of Chinese Academy of Engineering, 2016,18(6): 74-78.
|
[5] |
邬江兴 . 网络空间拟态防御原理:广义鲁棒控制与内生安全(上册)[M]. 北京: 科学出版社, 2018.
|
|
WU J X . Principles of mimic defense in cyberspace:generalized robust control and endogenous security (Volume 1)[M]. Beijing: Science PressPress, 2018.
|
[6] |
邬江兴 . 网络空间拟态防御原理:广义鲁棒控制与内生安全(下册)[M]. 北京: 科学出版社, 2018.
|
|
WU J X . Principles of mimic defense in cyberspace:generalized robust control and endogenous security (Volume 2)[M]. Beijing: Science PressPress, 2018.
|
[7] |
张宇嘉, 张啸川, 庞建民 . 代码混淆技术研究综述[J]. 信息工程大学学报, 2017,18(5): 635-640.
|
|
ZHANG Y J , ZHANG X C , PANG J M . Survey on code obfuscation research[J]. Journal of Information Engineering University, 2017,18(5): 635-640.
|
[8] |
张玉凤, 楼芳, 张历 . 面向软件攻击面的Web应用安全评估模型研究[J]. 计算机工程与科学, 2016,38(1): 73-77.
|
|
ZHANG Y F , LOU F , ZHANG L . Security assessment of Web applications based on software attack surface[J]. Computer Engineering &Science, 2016,38(1): 73-77.
|
[9] |
熊鹏程, 范玉顺 . 基于模糊层次分析法的集成软件质量评估模型[J]. 计算机应用, 2006,26(7): 1497-1499.
|
|
XIONG P C , FAN Y S . Integrated software quality evaluation model based on fuzzy analytic hierarchy process[J]. Journal of Computer Applications, 2006,26(7): 1497-1499.
|
[10] |
张杰鑫, 庞建民, 张铮 ,等. 基于非相似余度架构的网络空间安全系统异构性量化方法[J]. 电子与信息学报, 2019,41(7): 1594-1600.
|
|
ZHANG J X , PANG J M , ZHANG Z ,et al. Heterogeneity quantization method of cyberspace security system based on dissimilar redundancy structure[J]. Journal of Electronics and Information Technology, 2019,41(7): 1594-1600.
|
[11] |
RAO C R . Diversity and dissimilarity coefficients:a unified approach[J]. Theoretical Population Biology, 1982,21(1): 24-43.
|
[12] |
张铮, 王立群, 李卫超 . 面向非相似余度信息系统的攻击面模型[J]. 通信学报, 2018,39(S2): 223-230.
|
|
ZHANG Z , WANG L Q , LI W C . Research on formal model for an information system’s attack surface with dissimilar redundant architecture[J]. Journal on Communications, 2018,39(S2): 223-230.
|