[1] 邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. WU J.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)
[2] Hu H,Wu J,Wang Z,et al.Mimic defense:a designed-in cyber security defense framework[J].IET Information Security,2018,12(3):226-237.
[3] 马海龙,伊鹏,江逸茗,等.基于动态异构冗余机制的路由器拟态防御体系结构[J].信息安全学报,2017,2(1):29-42. MAH,YI P,JIANG Y,et al.Dynamic heterogeneous redundancy based router architecture with mimic defenses[J].Journal of Cyber Security,2017,2(1):29-42.(in Chinese)
[4] 扈红超,陈福才,王禛鹏.拟态防御DHR模型若干问题探讨和性能评估[J].信息安全学报,2016,1(4):40-51. HU H,CHEN F,WANG Z.Performance evaluations on DHR for cyberspace mimic defense[J].Journal of Cyber Security,2016,1(4):40-51.(in Chinese)
[5] 张晔.我拟态防御网络挡住"白帽黑客"290万次攻击[N].科技日报,2019-05-24.
[6] 斯雪明.拟态安全理论研究[EB/OL].http://wenku.baidu.com/link?url=nZlsR3REwg_zT8K6svYQy0j14DIUNvpxsux94ns2-ABnh7jnngc-Xb1K3c7QAPD3YmTM94xlf_53dBrjSQrLi6clZZTtp35iMpokhBV1oEW,2014-11-02.
[7] Ma Bolin,Zheng Zhang,Zhu Yongsheng.A formalization research on web server and scheduling strategy for heterogeneity[A].Proceedings of 2016 IEEE Advanced Information Management,Communicates,Electronic and Automation Control Conference[C].Xi'an:IEEE press,2016.1447-1451.
[8] 斯雪明,王伟,曾俊杰,等.拟态防御基础理论研究综述[J].中国工程科学,2016,18(6):62-68. SI X,WANG W,ZENG J,et al.A review of the basic theory of mimic defense[J].Strategic Study of Chinese Academy of Engineering,2016,18(6):62-68.(in Chinese)
[9] 刘勤让,林森杰,顾泽宇.面向拟态安全防御的异构功能等价体调度算法[J].通信学报,2018,39(07):188-198. LIU Q,LIN S,GU Z.Heterogeneous redundancies scheduling algorithm for mimic security defense[J].Journal on Communications,2018,39(07):188-198.(in Chinese)
[10] 仝青,张铮,张为华,邬江兴.拟态防御Web服务器设计与实现[J].软件学报,2017,28(04):883-897. TONG Q,ZHANG Z,ZHANG H,WU J.Design and implementation of mimic defense web server[J].Journal of Software,2017,28(04):883-897.(in Chinese)
[11] Ya-wen WANG,Jiang-xing WU,Yun-fei GUO,Hong-chao HU,Wen-yan LIU,Guo-zhen CHENG.Scientific workflow execution system based on mimic defense in the cloud environment[J].Frontiers of Information Technology & Electronic Engineering,2018,19(12):1522-1537.
[12] 王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017,45(11):2705-2714. WANG Z,HU H,CHENG G.A DNS architecture based on mimic security defense[J].Acta Electronica Sinica,2017,45(11):2705-2714.(in Chinese)
[13] 王禛鹏,扈红超,程国振.MNOS:拟态网络操作系统设计与实现[J].计算机研究与发展,2017,54(10):2321-2333. WANG Z,HU H,CHENG G.Design and implementation of mimic network operating system[J].Journal of Computer Research and Development,2017,54(10):2321-2333.(in Chinese)
[14] 刘彩霞,季新生,邬江兴.一种基于MSISDN虚拟化的移动通信用户数据拟态防御机制[J].计算机学报,2018,41(02):275-287. LIU C,JI X,WU J.A mimic defense mechanism for mobile communication user data based on MSISDN virtualization[J].Chinese Journal of Computers,2018,41(02):275-287.(in Chinese)
[15] Ji X S,Huang K Z,Jin L,et al.Overview of 5G security technology[J].Sci China Inf Sci,2018,61(8):107-131.
[16] 邬江兴.网络空间拟态防御导论[M].北京:科学出版社,2017. WU J.Introduction to Cyberspace Mimic Defense[M].Beijing:Science Press,2017.(in Chinese)
[17] Satoru Miyano,Takeshi Hayashi.Alternating finite automata on ω-words[J].Theoretical Computer Science,1984,32(3):321-330.
[18] R Alur,T Henzinger,O Kupferman.Alternating-time temporal logic[J].Journal of ACM,2002,49(5):672-713.
[19] G Drimmelen.Satisfiability in alternating-time temporal logic[A].IEEE Symposium on Logic in Computer Science[C].US:IEEE press,2003.208-217.
[20] F Stoica,L F Stoica.Implementing an ATL model checker tool using relational algebra concepts[A].201422nd International Conference on Software,Telecommunications and Computer Networks (SoftCOM)[C].Split,Croatia:IEEE press,2014.361-366.
[21] Florin Stoica,Laura Florentina Stoica.Generating an ATL model checker using an attribute grammar[EB/OL].arXiv:1807.08267,https://arxiv.org/abs/1807.08267,2019-02-05. |