[1] J. He, Y. Yuan, et al., A function-aware mimic defense theory and its practice,China Communications, 2024, vol. 21, no. 8, pp. 192-210.
[2 ] 邬江兴.网络空间拟态防御导论[M]。北京:科学出版社,2017.
Wu Jiangxing. Introduction to Cyberspace Mimic Defense [M]. Beijing: Science Press, 2017.(in Chinese)
[3] 林森杰,刘勤让,王孝龙.面向拟态防御系统的竞赛式仲裁模型[J].计算机工程,2018,44(04):193- 198
Lin Senjie, Liu Qinrang, Wang Xiaolong. Competitive arbitration model for mimic defense system [J]. Computer Engineering, 2018, 44 (04): 193-198.(in Chinese)
[4] 张铮,马博林,邬江兴.web服务器拟态防御原理验证系统测试与分析[J].信息安全学报,2017,2(01):13-28.
Zhang Zheng, Ma Bolin, Wu Jiangxing. Testing and analysis of the verification system for the principle of web server mimic defense [J]. Journal of Information Security, 2017,2 (01): 13-28.(in Chinese)
[5] 樊永文. 基于拟态防御的数据保护安全架构研究[D].郑州大学,2019.
Fan Yongwen Research on data protection security architecture based on mimic defense [D]. Zhengzhou University, 2019.(in Chinese)
[6] 陈双喜. 面向Web应用的拟态防御技术研究[D]. (博士专业学位论文),杭州:浙江大学,2022.
Chen Shuangxi Research on Pseudomorphic Defense Technology for Web Applications [D] (Doctoral Dissertation), Hangzhou: Zhejiang University, 2022.(in Chinese)
[7] 王瑞民,省永续,宋伟,等. 面向拟态云的异构执行体安全调度算法[J]. 信息网络安全,2023, 3:45-55.
Wang Ruimin, Shen Yongxu, Song Wei, et al. Secure Scheduling Algorithm for Heterogeneous Executors for Mimic Clouds[J].Net Info Security, 2023, 3:45-55. (in Chinese)
[8] 张振嘉,甘刚. 基于多变量的执行体动态调度算法[J].
成都信息工程大学学报,2024, 39 (1):28-36.
Zhang Zhenjia, Gan Gang. Multi variable based dynamic scheduling algorithm for executing agents [J]. Journal of Chengdu University of Information Technology, 2024, 39 (1): 28-36. (in Chinese)
[9] 于洪,刘勤让,魏帅,等. 高可靠信息系统非相似冗余架
构中的执行体同步技术[J]. 电子与信息学报,2024, 46 (5):2122-2136.
Yu Hong, Liu Qinrang, Wei Shuai, et al. Executer Synchronization in Highly Reliable Information System with Dissimilar Redundancy Architecture [J] Journal of Electronics & Information Technology, 2024, 46 (5): 2122-2136. (in Chinese)
[10] 刘勤让,林森杰,顾泽宇.面向拟态安全防御的异构功能等价体调度算法[J].通信学报,2018,39(07):188-198.
Liu Qinrang, Lin Senjie, Gu Zeyu. Scheduling algorithm of heterogeneous functional equivalents for mimic security defense [J]. Journal of Communications, 2018,39 (07): 188-198.(in Chinese)
[11] 马海龙,伊鹏,江逸茗,贺磊.基于动态异构冗余机制的路由器拟态防御体系结构[J].信息安全学报,2017,2(01):29-42
Ma Hailong, Yi Peng, Jiang Yiming, He Lei. Router mimic defense architecture based on dynamic heterogeneous redundancy mechanism [J]. Journal of Information Security, 2017, 2 (01): 29-42.(in Chinese)
[12] 仝青,张铮,张为华,等.拟态防御 Web 服务器设计与实现[J].软件学报,2017,28(04):883-897.
Tong Qing, Zhang Zheng, Zhang Weihua, et al. Design and implementation of mimic defense Web server [J]. Journal of Software Science, 2017,28 (04): 883-897.(in Chinese)
[13] 李卫超,张铮,王立群, 等.一种拟态构造的 Web 威胁态势分析方法[J].计算机工程,2019,45(08):1-6.
Li Weichao, Zhang Zheng, Wang Liqun, et al. A Web threat situation analysis method based on mimic structure [J]. Computer Engineering, 2019, 45 (08): 1-6 .(in Chinese)
[14] 宋歌,杨哲明,周豪睿,等. 拟态主动防御中的多模裁决攻击与防御策略[J]. 电子技术,2022,51(6):38-41.
Song Ge, Yang Zheming, Zhou Haorui, et al. Study on Multi-mode Decision Attack and Defense Strategy in Active CMD[J]. Electronic Technique, 2022, 51 (6): 38-41. (in Chinese)
[15] 李晨光. 基于 Netty 分布式面向多元化的实时信令推送系统设计与实现[D].(硕士专业学位论文),北京:北京交通大学,2023.
Li Chengguang. Design and implementation of the distributed real-time messages and instructions push system for diversified scences based on Netty [D].(Master's Thesis), Beijing: Beijing Jiaotong University, 2023. (in Chinese)
[16] 范利良,高平,姚鑫,等. 基于 Netty 的智能抄表系统的设计与实现[J]. 智能处理与应用,2024,9:139-141.
Fan Liliang, Gao Ping, Yao Xin, etc. Design and Implementation of an Intelligent Meter Reading System Based on Netty [J] Intelligent Processing and Application, 2024, 9:139-141. (in Chinese)
[17] 杨建. Netty的MQTT协议消息系统的设计与实现[J]. 科技资讯,2023,17:39-42.
Yang Jian. Design and Implementation of Netty's MQTT Protocol Message System [J] SCIENCE & TECHNOLOGY INFORMATION, 2023, 17:39-42. (in Chinese)
[18] 李立. 基于关系模型的机载导航数据库快速解析生成方法[J]. 航空工程进展,2019,10(6):867-872.
Li Li. The fast parsing and generating method of airborne navigation database based on relation model [J]. Advances in Aeronautical Science and Engineering. 2019,10(6): 867-872. (in Chinese)
[19] 练金栋,陈志,岳文静,等. 面向多源异构数据库的SQL解析与转换方法研究[J]. 软件导刊, 2023,22(12): 124-131.
Lian Jindong, Chen Zhi, Yue Wenjing, et al. Research on SQL parsing and transformation method for multi-source heterogeneous databases [J]. Software Guide, 2023, 22 (12): 124-131. (in Chinese)
[20] 王剑,鲍远松,孔晓阳. 一种实时数据库系统表达式快速解析方法[J]. 信息技术与标准化,2020,7:40-42.
Wang Jian, Bao Yuansong, Kong Xiaoyang. Fast Expression Parser in a Real-Time Database System[J]. Information Technology and Standardization, 2020, 7:40-42. (in Chinese)
[21] 戴人杰. 拟态通用运行环境裁决机制研究. [D].(硕士学位论文),北京:中国电子科技集团公司电子科学研究院,2022.
Dai Renjie. Research on voting mechanism of MCOE[D]. (Master's thesis), Beijing: Electronic Science Research Institute of China Electronics Technology Group Corporation, 2022. (in Chinese)
[22] 杨汶佼,刘星宇,张奕,等. 一种针对拟态工业控制器的裁决及调度方法. [J]. 信息安全研究,2022, 8(6): 534-544.
Yang Wenjiao, Liu Xingyu, Zhang Yi, et al. A method for Arbitration and scheduling of mimicry industrial controllers [J]. Journal of Information Security Research, 2022, 8 (6): 534-544. (in Chinese)
[23] 秦绪豪. 拟态Web服务输出裁决算法研究. [D].(硕士学位论文),北京:中国电子科技集团公司电子科学研究院,2023.
Qin Xuhao. Research on ruling algorithm of mimic web service output[D]. (Master's thesis), Beijing: Electronic Science Research Institute of China Electronics Technology Group Corporation, 2023. (in Chinese)
[24]M.B.Yassein,M.Q.Shatnawi, S.Aljwarneh, and R.Al-Hatmi,“Internet of things: Survey and open issues of MQTT protocol,” in Proc. Int. Conf. Engineering & MIS, Monastir, Tunisia, 2017, pp. 1-6.
[25]ARAUJOR,LUISG,DANIEL M B.Program-Aware Fuzzing for MQTT Applications[C]∥Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis.2020:582-586.
[26] Lippmann R , Haines J W , Fried D J , et al. Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation[C]// Recent Advances in Intrusion Detection, Third International Workshop, RAID 2000, Toulouse, France, October 2-4, 2000, Proceedings. Springer Berlin Heidelberg, 2000.
|