[1] |
慈林林, 杨明华, 田成平 ,等. 可信网络连接与可信云计算[M]. 北京: 科学出版社, 2015.
|
|
CI L L , YANG M H , TIAN C P ,et al. Trusted network connectivity and trusted cloud computing[M]. Beijing: Science PressPress, 2015.
|
[2] |
沈昌祥, 张焕国, 王怀民 ,等. 可信计算的研究与发展[J]. 中国科学:信息科学, 2010(2): 139-166.
|
|
SHEN C X , ZHANG H G , WANG H M ,et al. Research and development of trusted computing[J]. Scienta Sinica Informations, 2010(2): 139-166.
|
[3] |
沈昌祥, 张焕国, 冯登国 ,等. 信息安全综述[J]. 中国科学:技术科学, 2007,37(2): 129-150.
|
|
SHEN C X , ZHANG H G , FENG D G ,et al. Information security review[J]. Scienta Sinica Technological Sciences, 2007,37(2): 129-150.
|
[4] |
郑南宁 . 人工智能新时代[J]. 智能科学与技术学报, 2019,1(1): 1-3.
|
|
ZHENG N N . The new era of artificial intelligence[J]. Chinese Journal of Intelligent Science and Technology, 2019,1(3): 1-3.
|
[5] |
HOFMEYR S A , FORREST S . Architecture for an artificial immune system[J].,2000,8. Evolutionary Computation, 2000,8.
|
[6] |
FORREST S , BEAUCHEMIN C , HOFMEYR S . Computer immunology[J]. Immunological Reviews, 2010,216(1): 176-197.
|
[7] |
KANUPARTHI A K , ZAHRAN M , KARRI R . Architecture support for dynamic integrity checking[J]. IEEE Transactions on Information Forensics & Security, 2012,7(7): 321-332.
|
[8] |
FERREIRA R S , VARGAS F . ShadowStack :A new approach for secure program execution[J]. Microelectronics Reliability, 2015,55(9-10): 2077-2081.
|
[9] |
ZHANG X D , CLARK M , RATTAN K ,et al. Controller integrity monitoring in adaptive learning systems towards trusted autonomy[J]. IEEE Transactions on Automation Science and Engineering, 2016: 1-11.
|
[10] |
ASOKAN N , MANTYLA J , SERAFAT R . Method and device for verifying the integrity of platform software of an electronic device[P]. 2018.
|
[11] |
GAMBARDELLAL M , DORIGO M . Ant colony system hybridized with a new local search for the sequential ordering problem[J]. INFORMS Journal on Comput., 2014,12(3): 237-255.
|
[12] |
XAYPANYA T , MALINOWSKI R E . Power grid universal detection and countermeasure overlay intelligence ultra latency hypervisor[J]. 2015.
|