[1] CATAN M,COSMO R,EICHE A,et al.Aeolus:mastering the complexity of cloud application deployment[C]//Proceedings of European Conference on Service-Oriented and Cloud Computing.Berlin,Germany:Springer,2013:1-3. [2] DAYARATHNA M,WEN Y,FAN R.Data center energy consumption modeling:a survey[J].IEEE Communications Surveys & Tutorials,2015,18(1):732-794. [3] ARMBRUST M,FOX A,GRIFFITH R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58. [4] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [5] WANG Wei,ZENG Junjie,LI Guangsong,et al.Security analysis of dynamic heterogeneous redundant system[J].Computer Engineering,2018,44(10):42-45,50.(in Chinese)王伟,曾俊杰,李光松,等.动态异构冗余系统的安全性分析[J].计算机工程,2018,44(10):42-45,50. [6] SUN Zhiyong,JI Xinsheng,YOU Wei,et al.A virtual machine dynamic migration method based on redundancy jump[J].Computer Engineering,2020,46(2):21-27,34.(in Chinese)孙志勇,季新生,游伟,等.一种基于冗余跳变的虚拟机动态迁移方法[J].计算机工程,2020,46(2):21-27,34. [7] LI Siqi,LI Yanfei.APT attack detection based on graph algorithm[J].Cyberspace Security,2018,9(6):1-6.(in Chinese)李斯祺,李艳斐.基于图算法的APT攻击检测[J].网络空间安全,2018,9(6):1-6. [8] ZHU Wei,WANG Jun,ZHOU Xunzhao.Hospital cloud computing system based on load resource scheduling scheme balancing[J].Computer Engineering,2018,44(3):37-41,54.(in Chinese)朱炜,王俊,周迅钊.基于负载均衡的医院云计算系统资源调度方案[J].计算机工程,2018,44(3):37-41,54. [9] MILLS K,FILLIBEN J,DABROWSKI C.Comparing virtual machine placement algorithms for on-demand clouds[C]//Proceedings of the 3rd IEEE International Conference on Cloud Computing Technology and Science.Washington D.C.,USA:IEEE Press,2011:91-98. [10] ARZUAGA E,KAELI D R.Quantifying load imbalance on virtualized enterprise servers[C]//Proceedings of the 1st Joint WOSP/SIPEW International Conference on Performance Engineering.Washington D.C.,USA:IEEE Press,2010:235-242. [11] MISHRA M,SABOO A.On theory of virtual machine placement:anomalies in existing methodologies and their mitigation using a novel vector based approach[C]//Proceedings of the 4th IEEE International Conference on Cloud Computing.Washington D.C.,USA:IEEE Press,2011:275-282. [12] CHEN Lihua,SHEN Haiying.Consolidating complementary VMs with spatial/temporal-awareness in cloud datacenters[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2014:1033-1041. [13] LIU Sheng,ZHU Fenghua,LÜ Yisheng,et al.A heuristic orthogonal binary tree search algorithm for three dimensional container loading problem[J].Chinese Journal of Computers,2015,38(8):1530-1543.(in Chinese)刘胜,朱凤华,吕宜生,等.求解三维装箱问题的启发式正交二叉树搜索算法[J].计算机学报,2015,38(8):1530-1543. [14] ZHANG Defu,WEI Lijun,CHEN Qingshan,et al.A combinational heuristic algorithm for the three-dimensional packing problem[J].Journal of Software,2007,18(9):2083-2089.(in Chinese)张德富,魏丽军,陈青山,等.三维装箱问题的组合启发式算法[J].软件学报,2007,18(9):2083-2089. [15] LIU Haikui,JIN Hai,XU Chengzhong,et al.Performance and energy modeling for live migration of virtual machines[J].Cluster Computing,2013,16(2):249-264. [16] ORGERIE A C,ASSUNCAO M D,LEFEVRE L.A survey on techniques for improving the energy efficiency of large-scale distributed systems[J].ACM Computing Surveys,2014,46(4):1-31. [17] VERMA A,KUMAR G,KOLLER R.The cost of reconfiguration in a cloud[C]//Proceedings of the 11th International Middleware Conference Industrial Track.New York,USA:ACM Press,2010:11-16. [18] THOMPSON M,EVANS N,KISEKKA V.Multiple OS rotational environment an implemented moving target defense[C]//Proceedings of the 7th International Symposium on Resilient Control Systems.Washington D.C.,USA:IEEE Press,2014:1-6. [19] MERGENCI C,KORPEOGLU I.Generic resource allocation metrics and methods for heterogeneous cloud infrastructures[J].Journal of Network and Computer Applications,2019,146(1):102-113. [20] SEXTON J,STORLIE C,NEIL J.Attack chain detection[J].Statal Analysis & Data Mining,2015,8(5/6):353-363. |