共 99 条
- [1] Wikipedia, PRISM
- [2] Synosys, The heartbleed bug
- [3] Liu Y., Peng W., Su J., A study of IP prefix hijacking in cloud computing networks, Security and Communication Networks, 7, 11, pp. 2201-2210, (2014)
- [4] Zhang J., Hu H., Liu B., Robustness of RED in mitigating LDoS attack, KSII Trans on Internet and Information Systems (TIIS), 5, 5, pp. 1085-1100, (2011)
- [5] Nitrd, Cybersecurity game-change research & development recommendations
- [6] Executive Office of the President, Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program
- [7] Jajodia S., Ghosh A.K., Swarup V., Et al., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, (2011)
- [8] Zhuang R., Zhang S., Deloach S.A., Et al., Simulation-based approaches to studying effectiveness of moving-target network defense, Proc of National Symp on Moving Target Research, pp. 1-12, (2012)
- [9] Zhuang R., Zhang S., Bardas A., Et al., Investigating the application of moving target defenses to network security, Proc of the 6th Int Symp on Resilient Control Systems (ISRCS), pp. 162-169, (2013)
- [10] Zhang X., Li Z., Overview on moving target defense technology, Communications Technology, 46, 6, pp. 111-113, (2013)