[1] WANG Wei,ZENG Junjie,LI Guangsong,et al.Security analysis of dynamic heterogeneous redundant system[J].Computer Engineering,2018,44(10):42-45,50.(in Chinese)王伟,曾俊杰,李光松,等.动态异构冗余系统的安全性分析[J].计算机工程,2018,44(10):42-45,50. [2] CHEN Shuai.Threats and measures of network security for network information system[J].Information Technology,2014(7):204-206.(in Chinese)陈帅.网络信息系统网络安全的威胁与措施[J].信息技术,2014(7):204-206. [3] ZHANG Zhenfeng,REN Weihong,ZHU Jianping.Analysis on security threats and countermeasures of important information systems[J].Netinfo Security,2010(7):25-28.(in Chinese)张振峰,任卫红,朱建平.重要信息系统安全威胁及防范对策分析[J].信息网络安全,2010(7):25-28. [4] JAJODIA S,GHOSH A K,SWARUP V,et al.Moving target defense:creating asymmetric uncertainty for cyber threats[M].Berlin,Germany:Springer,2011. [5] QIAN Chunqin.Some ideas on establishing the enterprise Web information system emergency response and disaster recovery mechanism[J].Security Science and Technology,2016(7):35-38.(in Chinese)钱春沁.建立企业Web信息系统应急响应和灾难恢复机制的若干构想[J].保密科学技术,2016(7):35-38. [6] SI Xueming,WANG Wei,ZENG Junjie,et al.A review of the basic theory of mimic defense[J].Strategic Study of CAE,2016,18(6):62-68.(in Chinese)斯雪明,王伟,曾俊杰,等.拟态防御基础理论研究综述[J].中国工程科学,2016,18(6):62-68. [7] MA Hailong,YI Peng,JIANG Yiming,et al.Dynamic heterogeneous redundancy based router architecture with mimic defenses[J].Journal of Cyber Security,2017,2(1):29-42.(in Chinese)马海龙,伊鹏,江逸茗,等.基于动态异构冗余机制的路由器拟态防御体系结构[J].信息安全学报,2017,2(1):29-42. [8] LEE S,KIM H K,KIM K.Ransomware protection using the moving target defense perspective[J].Computers and Electrical Engineering,2019,78:288-299. [9] WU Jiangxing.Meaning and vision of mimic computing and mimic security defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese)邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):2-7. [10] WU Jiangxing.Research on cyber mimic defense[J].Cyber Security,2016,1(4):1-10.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [11] TONG Qing,ZHANG Zheng,ZHANG Weihua,et al.Design and implementation of mimic defense Web server[J].Journal of Software,2017,28(4):883-897.(in Chinese)仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897. [12] SHE Ping,LI Ningbo,XIE Bing,et al.The model of storage verification under mimic defense theory[J].Digital Technology and Application,2018,36(9):54-56,58.(in Chinese)佘平,李宁波,谢彬,等.面向拟态防御系统的存储校验模型[J].数字技术与应用,2018,36(9):54-56,58. [13] HUO Litian,SHAO Peinan,XU Liding,et al.Resource management and scheduling technology for mimic common operating environment[J].Computer Engineering,2020,46(2):159-169.(in Chinese)霍立田,邵培南,徐李定,等.拟态通用运行环境的资源管理与调度技术[J].计算机工程,2020,46(2):159-169. [14] WU Jiangxing.Introduction to simulated defense in cyberspace[M].Beijing:Science Press,2017.(in Chinese)邬江兴.网络空间拟态防御导论[M].北京:科学出版社,2017. [15] ZKIK K,SEBBAR A,BADDI Y,et al.Secure multipath mutation SMPM in moving target defense based on SDN[J].Procedia Computer Science,2019,151:977-984. [16] WEI Shuai,YU Hong,GU Zeyu,et al.Architecture of mimic security processor for industry control system[J].Journal of Cyber Security,2017,2(1):54-73.(in Chinese)魏帅,于洪,顾泽宇,等.面向工控领域的拟态安全处理机架构[J].信息安全学报,2017,2(1):54-73. [17] CHEN Yanping,LIU Dongliang,GUO Rui.Security and precaution on computer network[C]//Proceedings of 2010 International Conference on Future Information Technology and Management Engineering.Washington D.C.,USA:IEEE Press,2010:1-8. [18] DAI Wei,MA Mingdong,WANG Deyu.Research and optimization of load balancing based on Nginx[J].Computer Technology and Development,2019,29(3):77-80.(in Chinese)戴伟,马明栋,王得玉.基于Nginx的负载均衡技术研究与优化[J].计算机技术与发展,2019,29(3):77-80. [19] LI Guoqiang.A load balancing strategy in microservice architecture[J].Information and Communications,2019(8):84-85.(in Chinese)李国强.一种微服务架构下的负载均衡策略[J].信息通信,2019(8):84-85. [20] VSYAHPUTRA R,SYAHPUTRA R.Study of the effect of load balance in 500 kVA distribution transformers in complex Pt.Perta Arun gas area of 17 Dumai Branch Lhokseumawe city[J].IOP Conference Series:Materials Science and Engineering,2019,536(1):1-9. [21] WANG Junfeng.Research and application of Web news extraction based on structure and visual consistency[D].Hangzhou:Zhejiang University,2010.(in Chinese)王俊峰.基于结构与视觉一致性的网页新闻提取研究及应用[D].杭州:浙江大学,2010. |