[1] WU Jiangxing.Principles of simulated defense in cyberspace:first volume[M].2nd ed.Beijing:Science Press,2018.(in Chinese)邬江兴.网络空间拟态防御原理:上册[M].2版.北京:科学出版社,2018. [2] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [3] WU Jiangxing.Meaning and vision of mimic computing and mimic security defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese)邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):2-7. [4] YUAN Shun,GUO Yuanbo,LIU Wei.Research on voting algorithm in NMR and NVP system[J].Application Research of Computers,2008,25(11):3463-3467.(in Chinese)袁顺,郭渊博,刘伟.NMR及NVP系统中表决算法分析与研究[J].计算机应用研究,2008,25(11):3463-3467. [5] PARHAMI B.Voting algorithms[J].IEEE Transactions on Reliability,1995,44(4):617-629. [6] JAMALI N,SAMMUT C.Majority voting:material classification by tactile sensing using surface texture[J].IEEE Transactions on Robotics,2011,27(3):508-521. [7] KANEKAWA N,MAEJIMA H,KATO H,et al.Dependable onboard computer systems with a new method-stepwise negotiating voting[C]//Proceedings of the 19th International Symposium on Fault-Tolerant Computing.Washington D.C.,USA:IEEE Press,1989:13-19. [8] MCALLISTER D F,SUN C E,VOUK M A.Reliability of voting in fault-tolerant software systems for small output-spaces[J].IEEE Transactions on Reliability,1990,39(5):524-534. [9] ZHOU Haitao,ZHU Jihong.Majority voting algorithm based on self-test[J].Journal of Tsinghua University(Science and Technology),2005,45(4):488-491.(in Chinese)周海涛,朱纪洪.基于自检测的多数一致表决算法[J].清华大学学报(自然科学版),2005,45(4):488-491. [10] LATIF-SHABGAHI G,BENNETT S.Adaptive majority voter:a novel voting algorithm for real-time fault-tolerant control systems[C]//Proceedings of the 25th EUROMICRO Conference.Washington D.C.,USA:IEEE Press,1999:1-10. [11] OUYANG Chengtian,WANG Xi,ZHENG Jian.Adaptive consensus voting algorithm[J].Computer Science,2011,38(7):130-133.(in Chinese)欧阳城添,王曦,郑剑.自适应一致表决算法[J].计算机科学,2011,38(7):130-133. [12] LIN Senjie,LIU Qinrang,WANG Xiaolong.Competitive arbitration model for mimic defense system[J].Computer Engineering,2018,44(4):193-198.(in Chinese)林森杰,刘勤让,王孝龙.面向拟态防御系统的竞赛式仲裁模型[J].计算机工程,2018,44(4):193-198. [13] TONG Qing,ZHANG Zheng,ZHANG Weihua,et al.Design and implementation of mimic defense Web server[J].Journal of Software,2017,28(4):883-897.(in Chinese)仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897. [14] MA Hailong,YI Peng,JIANG Yiming,et al.Dynamic heterogeneous redundancy based router architecture with mimic defenses[J].Journal of Cyber Security,2017,2(1):29-42.(in Chinese)海龙,伊鹏,江逸茗,等.基于动态异构冗余机制的路由器拟态防御体系结构[J].信息安全学报,2017,2(1):29-42. [15] LUO Xingguo,TONG Qing,ZHANG Zheng,et al.Mimic defense technology[J].Strategic Study of CAE,2016,18(6):69-73.(in Chinese)罗兴国,仝青,张铮,等.拟态防御技术[J].中国工程科学,2016,18(6):69-73. [16] ZHANG Xingming,GU Zeyu,WEI Shuai,et al.Markov game modeling of mimic defense and defense strategy determination[J].Journal on Communications,2018,39(10):147-158.(in Chinese)张兴明,顾泽宇,魏帅,等.拟态防御马尔可夫博弈模型及防御策略选择[J].通信学报,2018,39(10):147-158. [17] LI Weichao,ZHANG Zheng,WANG Liqun,et al.A Web threat situation analysis method for mimic structure[J]Computer Engineering,2019,45(8):1-6.(in Chinese)李卫超,张铮,王立群,等.一种拟态构造的Web威胁态势分析方法[J].计算机工程,2019,45(8):1-6. [18] WANG Zhenpeng,HU Hongchao,CHENG Guozhen.A DNS architecture based on mimic security defense[J].Acta Electronica Sinica,2017,45(11):2705-2714.(in Chinese)王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017,45(11):2705-2714. [19] TZENG G H,HUANG J J.Multiple attribute decision making:methods and applications[M].[S.l.]:Chapman and Hall/CRC,2011. [20] WU Kui,ZHOU Xianzhong,WANG Jianyu,et al.A concept semantic similarity algorithm based on Bayesian estimation[J].Journal of Chinese Information Processing,2010,24(2):52-58.(in Chinese)吴奎,周献中,王建宇,等.基于贝叶斯估计的概念语义相似度算法[J].中文信息学报,2010,24(2):52-58. |