Journal on Communications ›› 2018, Vol. 39 ›› Issue (7): 188-198.doi: 10.11959/j.issn.1000-436x.2018124
• Correspondences • Previous Articles
Qinrang LIU,Senjie LIN,Zeyu GU
Revised:
2018-03-29
Online:
2018-07-01
Published:
2018-08-08
Supported by:
CLC Number:
Qinrang LIU,Senjie LIN,Zeyu GU. Heterogeneous redundancies scheduling algorithm for mimic security defense[J]. Journal on Communications, 2018, 39(7): 188-198.
[1] | 邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10. |
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10. | |
[2] | 扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51. |
HU H C , CHEN F C , WANG Z P . Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10. | |
[3] | 仝青, 张铮, 邬江兴 . 基于软硬件多样性的主动防御技术[J]. 信息安全学报, 2017,2(1): 1-12. |
TONG Q , ZHANG Z , WU J X . The active defense technology based on the software/hardware diversity[J]. Journal of Cyber Security, 2017,2(1): 1-12. | |
[4] | REIS G A , CHANG J , VACHHARAJANI N ,et al. SWIFT:software implemented fault tolerance[C]// International Symposium on Code Generation and Optimization. 2005: 243-254. |
[5] | WANG J , BAO W , ZHU X ,et al. FESTAL:fault-tolerant elastic scheduling algorithm for real-time tasks in virtualized clouds[J]. IEEE Transactions on Computers, 2015,64(9): 2545-2558. |
[6] | 殷进勇, 顾国昌 . 允许多处理机故障的实时任务容错调度算法[J]. 电子与信息学报, 2010,32(2): 444-448. |
YIN J Y , GU G C . A real-time fault-tolerant scheduling algorithm for multiple processor faults[J]. Journal of Electronics & Information Technology, 2010,32(2): 444-448. | |
[7] | 彭浩, 陆阳, 孙峰 ,等. 副版本不可抢占的全局容错调度算法[J]. 软件学报, 2016,27(12): 3158-3171. |
PENG H , LU Y , SUN F ,et al. Faulttolerant global scheduling with non-preemptive backups[J]. Journal of Software, 2016,27(12): 3158-3171. | |
[8] | DAS A , KUMAR A , VEERAVALLI B . Reliability and energy-aware mapping and scheduling of multimedia applications on multiprocessor systems[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(3): 869-884. |
[9] | 吉萌, 余少华, 詹翊春 . 双冗余结构路由器故障恢复模型与方案研究[J]. 通信学报, 2006,27(6): 21-28. |
JI M , YU S H , ZHAN Y C . Research on fault-recovery model and scheme in dual-system redundancy router[J]. Journal on Communications, 2006,27(6): 21-28. | |
[10] | CHEN C Y . Task scheduling for maximizing performance and reliability considering fault recovery in heterogeneous distributed systems[J]. IEEE Transactions on Parallel & Distributed Systems, 2016,27(2): 521-532. |
[11] | 邬江兴, 李军飞 ,等. 一种异构功能等价体调度装置及方法[P]. 中国,CN106161417A,2016-11-23. |
WU J X , LI J F ,et al. A heterogeneous redundancies scheduling equipment and method[P]. 中国,CN106161417A,2016-11-23. | |
[12] | 马海龙, 伊鹏, 江逸茗 ,等. 基于动态异构冗余机制的路由器拟态防御体系结构[J]. 信息安全学报, 2017,2(1): 29-42. |
MA H L , YI P , JIANG Y M ,et al. Dynamic heterogeneous redundancy based router architecture with mimic defenses[J]. Journal of Cyber Security, 2017,2(1): 29-42. | |
[13] | 姚文斌, 杨孝宗 . 相异性软件组件选择算法设计[J]. 哈尔滨工业大学学报, 2003,35(3): 261-264. |
YAO W B , YANG X Z . Design of selective algorithm for diverse software components[J]. Journal of Harbin Institute of Technology, 2003,35(3): 261-264. | |
[14] | 曾国荪, 陈闳中 . 探索计算系统异构性的描述[J]. 计算机科学, 2003,30(12): 16-18. |
ZENG G S , CHEN H Z . Inquiring the description of heterogeneity among computational systems[J]. Computer Science, 2003,30(12): 16-18. | |
[15] | 吴奎, 周献中, 王建宇 ,等. 基于贝叶斯估计的概念语义相似度算法[J]. 中文信息学报, 2010,24(2): 52-57. |
WU K , ZHOU X Z , WANG J Y ,et al. A concept semantic similarity algorithm based on bayesian estimation[J]. Journal of Chinese Information Processing, 2010,24(2): 52-57. | |
[16] | 魏帅, 于洪, 顾泽宇 ,等. 面向工控领域的拟态安全处理机架构[J]. 信息安全学报, 2017,2(1): 54-73. |
WEI S , YU H , GU Z Y ,et al. Architecture of mimic security processor for industry control system[J]. Journal of Cyber Security, 2017,2(1): 1-12. |
[1] | Cheng ZHONG, Hui SUN. Parallel algorithm for sensitive sequence recognition from long-read genome data with high error rate [J]. Journal on Communications, 2023, 44(2): 160-171. |
[2] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[3] | Ye ZHU, Yilin YU, Yingchun GUO. HRDA-Net: image multiple manipulation detection and location algorithm in real scene [J]. Journal on Communications, 2022, 43(1): 217-226. |
[4] | Qiuyang GU, Bao WU, Renyong CHI. Link prediction method based on the similarity of high path [J]. Journal on Communications, 2021, 42(7): 61-69. |
[5] | Suxia ZHU, Shulun LIU, Guanglu SUN. Shape similarity differential privacy trajectory protection mechanism based on relative entropy and K-means [J]. Journal on Communications, 2021, 42(2): 113-123. |
[6] | Xiaoli DAI, Shifeng LIU, Daqing GONG. Text similarity detection method based on NLP [J]. Journal on Communications, 2021, 42(10): 173-181. |
[7] | Jiazhi REN,Hui TIAN,Shaoshuai FAN,Yuanzhuo LIN,Gaofeng NIE,Jilong LI. UAV deployment and caching scheme based on user preference prediction [J]. Journal on Communications, 2020, 41(6): 1-13. |
[8] | Debin WEI,Ting SHEN,Li YANG,Yaowen QI. Network queue scheduling algorithm based on self-similar traffic level grading prediction [J]. Journal on Communications, 2020, 41(4): 182-189. |
[9] | Liming PU,Shuxin LIU,Ruihao DING,Kai WANG. Heterogeneous executor scheduling algorithm for mimic cloud service [J]. Journal on Communications, 2020, 41(3): 17-24. |
[10] | Zhiguo SUN, Xinyue REN, Zengmao CHEN, Ming DIAO. Cooperative spectrum sensing method and performance analysis based on similarity between evidences [J]. Journal on Communications, 2020, 41(12): 139-147. |
[11] | Hongyan WANG,Tuo WANG,Mian PAN,Zumin WANG. Gamma norm minimization based image denoising algorithm [J]. Journal on Communications, 2020, 41(10): 222-234. |
[12] | Lei ZHANG,Peng ZHANG,Wei SUN,Xingdong YANG,Lichao XING. IMM4HT:an identification method of malicious mirror website for high-speed network traffic [J]. Journal on Communications, 2019, 40(7): 87-94. |
[13] | Daoguang DONG,Guosheng RUI,Wenbiao TIAN,Jian KANG,Ge LIU. Nonparametric Bayesian dictionary learning algorithm based on structural similarity [J]. Journal on Communications, 2019, 40(1): 43-50. |
[14] | DONG Daoguang, RUI Guosheng, TIAN Wenbiao, KANG Jian, LIU Ge. Nonparametric Bayesian dictionary learning algorithm based on structural similarity [J]. Journal on Communications, 2018, 99(99): 1-. |
[15] | Jingwei ZHU,Xiaodan WANG,Yafei SONG,Wenlong HUANG. Weighted evidence combination method based on power-Pignistic probability distance [J]. Journal on Communications, 2018, 39(1): 117-125. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|