[1] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[2] |
吴铤, 胡程楠, 陈庆南 ,等. 基于执行体划分的防御增强型动态异构冗余架构[J]. 通信学报, 2021,42(3): 122-134.
|
|
WU T , HU C N , CHEN Q N ,et al. Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition[J]. Journal on Communications, 2021,42(3): 122-134.
|
[3] |
MCALLISTER D F , SUN C , VOUK M A . Reliability of voting in fault-tolerant software systems for small output-spaces[J]. IEEE Transactions on Reliability, 1990,39(5): 524-534.
|
[4] |
JAMALI N , SAMMUT C . Majority voting:material classification by tactile sensing using surface texture[J]. IEEE Transactions on Robotics, 2011,27(3): 508-521.
|
[5] |
仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[6] |
张文建, 宋克, 谭力波 ,等. 面向拟态判决的可编程语义解析方法[J]. 通信学报, 2020,41(4): 62-69.
|
|
ZHANG W J , SONG K , TAN L B ,et al. Programmable semantic parsing approach for mimic arbitration[J]. Journal on Communications, 2020,41(4): 62-69.
|
[7] |
马博林, 张铮, 刘健雄 . 应用于动态异构Web服务器的相似度求解方法[J]. 计算机工程与设计, 2018,39(1): 282-287.
|
|
MA B L , ZHANG Z , LIU J X . Similarity calculation method applied to dynamic heterogeneous Web server system[J]. Computer Engineering and Design, 2018,39(1): 282-287.
|
[8] |
QI C , WU J X , HU H C ,et al. An intensive security architecture with multi-controller for SDN[C]// Proceedings of 2016 IEEE Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2016: 401-402.
|
[9] |
欧阳城添, 王曦, 郑剑 . 自适应一致表决算法[J]. 计算机科学, 2011,38(7): 130-133.
|
|
OUYANG C T , WANG X , ZHENG J . Adaptive consensus voting algorithm[J]. Computer Science, 2011,38(7): 130-133.
|
[10] |
HU H C , WU J X , WANG Z P ,et al. Mimic defense:a designed-in cybersecurity defense framework[J]. IET Information Security, 2018,12(3): 226-237.
|
[11] |
陆以勤, 黄俊贤, 程喆 ,等. 基于改进AHP-FCE模型的多指标拟态表决算法[J]. 北京邮电大学学报, 2021,44(2): 8-13.
|
|
LU Y Q , HUANG J X , CHENG Z ,et al. A multi-index mimic voting algorithm based on improved AHP-FCE model[J]. Journal of Beijing University of Posts and Telecommunications, 2021,44(2): 8-13.
|
[12] |
ZHOU D C , CHEN H C , CHENG G Z ,et al. SecIngress:an API gateway framework to secure cloud applications based on N-variant system[J]. China Communications, 2021,18(8): 17-34.
|
[13] |
林森杰, 刘勤让, 王孝龙 . 面向拟态防御系统的竞赛式仲裁模型[J]. 计算机工程, 2018,44(4): 193-198.
|
|
LIN S J , LIU Q R , WANG X L . Competitive arbitration model for mimic defense system[J]. Computer Engineering, 2018,44(4): 193-198.
|
[14] |
WANG Y W , WU J X , GUO Y F ,et al. Scientific workflow execution system based on mimic defense in the cloud environment[J]. Frontiers of Information Technology & Electronic Engineering, 2018,19(12): 1522-1536.
|
[15] |
TH?NES J . Microservices[J]. IEEE Software, 2015,32(1): 116.
|
[16] |
AKHSHABI S , NARAYANASWAMY S , BEGEN A C ,et al. An experimental evaluation of rate-adaptive video players over HTTP[J]. Signal Processing:Image Communication, 2012,27(4): 271-287.
|
[17] |
王禛鹏, 扈红超, 程国振 . 一种基于拟态安全防御的 DNS 框架设计[J]. 电子学报, 2017,45(11): 2705-2714.
|
|
WANG Z P , HU H C , CHENG G Z . A DNS architecture based on mimic security defense[J]. Acta Electronica Sinica, 2017,45(11): 2705-2714.
|
[18] |
张铮, 马博林, 邬江兴 . Web 服务器拟态防御原理验证系统测试与分析[J]. 信息安全学报, 2017,2(1): 13-28.
|
|
ZHANG Z , MA B L , WU J X . The test and analysis of prototype of mimic defense in Web servers[J]. Journal of Cyber Security, 2017,2(1): 13-28.
|
[19] |
SCARF H E . Inventory theory[J]. Operations Research, 2002,50(1): 186-191.
|
[20] |
杨益民, 付必胜 . 仓库容量有限条件下的生产销售存贮模型[J]. 系统工程, 2001,19(1): 18-23.
|
|
YANG Y M , FU B S . The storage model about production and sale under the condition of limited-space storehouse[J]. Systems Engineering, 2001,19(1): 18-23.
|