Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 480-484.doi: 10.11896/jsjkx.210800048
• Information Security • Previous Articles Next Articles
TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian
CLC Number:
[1] PATRICIU V V,FURTUNA A C.Guide for designing cyber security exercises[C]//World Scientific and Engineering Academy and Society(WSEAS).2009:172-177. [2] HENSHEL D S,DECKARD G M,LUFKIN B,et al.Predictingproficiency in cyber defense team exercises[C]//IEEE.IEEE,2016:776-781. [3] ČELEDA P,ČEGAN J,VYKOPAL J,et al.KYPO-A Platform for Cyber Defence Exercises[J/OL].https://is.muni.cz/repo/1319597/2015-NATO-MSG-133-kypo-platform-cyber-defence-exercises-paper.pdf. [4] CARLISLE M,CHIARAMONTE M,CASWELL D.UsingCTFs for an Undergraduate Cyber Education[C]//2015 USENIX Summit on Gaming,Games,and Gamification in Security Education (3GSE 15).2015. [5] VYKOPAL J,VIZVARY M,OSLEJSEK R,et al.Lessonslearned from complex hands-on defence exercises in a cyber range[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602. [6] WEISS R S,LOCASTO M E,MACHE J.A Reflective Ap-proach to Assessing Student Performance in Cybersecurity Exercises[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602. [7] ANDREOLINI M,COLACINO V G,COLAJANNI M,et al.A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises[J].Mobile Networks & Applications,2020,25(1):236-247. [8] BRAGHIN C,CIMATO S,DAMIANI E,et al.Towards theMonitoring and Evaluation of Trainees' Activities in Cyber Ranges[C]//Hatzivasilis G.,Ioannidis S.(eds) Model-driven Simulation and Training Environments for Cybersecurity.MSTEC 2020.Lecture Notes in Computer Science,Cham:Springer,2020:79-91. [9] FANG B X,JIA Y,LI A P,et al.Cyber Ranges:state-of-the-art and research challenges[J].Journal of Cyber Security,2016,1(3):1-9. [10] WANG Q X,ZHU J H,QIU H.Cybersecurity Lab Tutorial[M].Zhengzhou:Electronic Industry Press,2016. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274. |
[3] | HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[6] | WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9. |
[7] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[8] | FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349. |
[9] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[12] | WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355. |
[13] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[14] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
[15] | PANG Xing-long, ZHU Guo-sheng. Survey of Network Traffic Analysis Based on Semi Supervised Learning [J]. Computer Science, 2022, 49(6A): 544-554. |
|