共 20 条
- [1] Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program
- [2] COX B, EVANS D, FILIPI A, Et al., N-variant systems: a secretless framework for security through diversity, Conference on USENIX Security Symposium, pp. 1-16, (2006)
- [3] HOFMEYR S A, FORREST S., Architecture for an artificial immune system, Evolutionary Computation, 8, 4, pp. 443-473, (2000)
- [4] KAMPANAKIS P, PERROS H, BEYENE T., SDN-based solutions for moving target defense network protection, The 2014 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 1-6, (2014)
- [5] WU J X., Research on cyber mimic defense, Journal of Cyber Security, 1, 4, pp. 1-10, (2016)
- [6] REN Q, WU J X, HEI L., Research on mimic DNS archi-tectural strategy based on generalized stochastic petri net, Journal of Cyber Security, 4, 2, pp. 37-52, (2019)
- [7] HU H C, CHEN F C, WANG Z P., Perfor-mance evaluations on DHR for cyberspace mimic defense, Journal of Cyber Security, 1, 4, pp. 40-51, (2016)
- [8] ZHANG J X, PANG J M, ZHANG Z., Quantification method for heterogeneity on Web server with mimic construction, Journal of Software, 31, 2, pp. 564-577, (2020)
- [9] ZHANG J X, PANG J M, ZHANG Z, Et al., QoS quantification method for Web server with mimic construction, Computer Science, 46, 11, pp. 109-118, (2019)
- [10] ZHANG J X, PANG J M, ZHANG Z, Et al., Executors scheduling algorithm for Web server with mimic structure, Computer Engineering, 45, 8, pp. 14-21, (2019)