Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211200296-6.doi: 10.11896/jsjkx.211200296
• Information Security • Previous Articles Next Articles
LIU Wen-he, JIA Hong-yong, PAN Yun-fei
CLC Number:
[1]National Science and Technology Council.“Trustworthy cyberspace:Strategic plan for the federal cybersecurity research and development program”[OL].https://www.nitrd.gov/SUBCOMMITTEE/csia/ed_Cybersecurity_RD_Strategic_Plan_2011.pdf. [2]SHI L Y,JIA C F,LYU S W.Research onendhopping for active network confrontation [J].Journal on Communications,2008(2):106-110. [3]WU J X.Research on Cyber Mimic Defense[J].Journal of Cyber Security,2016,1(4):1-10. [4]WU JX,LI J F,ZHANG F,et al.A heterogeneous redundancies scheduling equipment and method[P].China,CN106161417A,2016-11-23. [5]LIU Q R,LIN S J,GU Z Y.Heterogeneous redundancies scheduling algorithm for mimic security defense[J].Journal on Communications,2018,39(7):188-198. [6]PU LM,LIU S X,DING R H,et al.Heterogeneous executor scheduling algorithm for mimic cloud service[J].Journal on Communications,2020,41(3):17-24. [7]GAO Y,ZI C C,FENG S F,et al.Security Scheduling Algorithm for Web Gateways Based on Mimicry Defense Theory[J].Journal of Chinese Computer Systems,2021,42(9):1913-1919. [8]ZHU Z B,LIU Q R,LIU D P,et al.Research progress of mimic multi-execution scheduling algorithm[J].Journal on Communications,2021,42(5):179-190. [9]WEI S,YU H,GU Z Y,et al.Architecture of mimic securityprocessor for industry control syste[J].Journal of Cyber Security,2017,2(1):54-73. [10]LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient basedlearning applied to document recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324. [11]FIRST.Common vulnerability scoring system(Version-3.1)[EB/OL].(2019-01-01)[2021-03-16].https://www.first.org/cvss/calculator/3.1. [12]GHARIB A,SHARAFALDIN I,LASHKARI A H,et al.AnEvaluation Framework for Intrusion Detection Dataset [C]//2016 International Conference on Information Science and Security(ICISS).IEEE,2017. [13]LIU M J,WANG X F,HUANG Y L.Preprocessing in data mi-ning[J].Computer Science,2000,27(4):56-59. [14]HU H C,CHEN F C,WANG Z P.Performance evaluationsonDHR for cyberspace mimic defense[J].Journal of Cyber Security,2016,1(4):40-51. [15]WU J X.Robust control and endogenous safety[J].CivIntegration on Cyberspace,2018(3):23-27. |
[1] | DOU Jia-wei. Privacy-preserving Hamming and Edit Distance Computation and Applications [J]. Computer Science, 2022, 49(9): 355-360. |
[2] | GUO Zheng-wei, FU Ze-wen, LI Ning, BAI Lan. Study on Acceleration Algorithm for Raw Data Simulation of High Resolution Squint Spotlight SAR [J]. Computer Science, 2022, 49(8): 178-183. |
[3] | GAO Ya, ZHAO Ning, LIU Wen-qi. Dependence Analysis Among Service Stations in Tandem Queueing Systems [J]. Computer Science, 2022, 49(7): 304-309. |
[4] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[5] | ZHANG Ming-xin. Conceptual Model for Large-scale Social Simulation [J]. Computer Science, 2022, 49(4): 16-24. |
[6] | XIE Hao-shan, LIU Xiao-nan, ZHAO Chen-yan, HE Ming, SONG Hui-chao. Classical Simulation Realization of HHL Algorithm Based on OpenMP Parallel Model [J]. Computer Science, 2022, 49(11A): 211200028-5. |
[7] | YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290. |
[8] | CHENG Yu, LIU Tie-jun, TANG Yuan-gui, WANG Jian, JIANG Zhi-bin, QI Sheng. Underwater Robert Visual Simulation Based on UNITY3D [J]. Computer Science, 2021, 48(6A): 281-284. |
[9] | YANG Lin, WANG Yong-jie. Application and Simulation of Ant Colony Algorithm in Continuous Path Prediction of Dynamic Network [J]. Computer Science, 2021, 48(6A): 485-490. |
[10] | XIANG Chang-sheng, CHEN Zhi-gang. Chaotic Prediction Model of Network Traffic for Massive Data [J]. Computer Science, 2021, 48(5): 289-293. |
[11] | ZENG Wei-liang, HAN Yu, HE Jin-yuan, WU Miao-sen, SUN Wei-jun. Simulation Analysis on Dynamic Ridesharing Efficiency of Shared Autonomous Taxi [J]. Computer Science, 2021, 48(2): 257-263. |
[12] | JIANG Hua-nan, ZHANG Shuai, LIN Yu-fei, LI Hao. Simulation Optimization and Testing Based on Gazebo of MPI Distributed Parallelism [J]. Computer Science, 2021, 48(11A): 672-677. |
[13] | CUI Xiang, LI Xiao-wen, CHEN Yi-feng. Communication Optimization Method of Heterogeneous Cluster Application Based on New Language Mechanism [J]. Computer Science, 2020, 47(8): 17-15. |
[14] | CHENG Sheng-gan, YU Hao-ran, WEI Jian-wen, James LIN. Design and Optimization of Two-level Particle-mesh Algorithm Based on Fixed-point Compression [J]. Computer Science, 2020, 47(8): 56-61. |
[15] | ZHUANG Yi, YANG Jia-hai. Multi-source Tree-based Scheduling Algorithm for Deadline-aware P2MP Inter-datacenter Transfers [J]. Computer Science, 2020, 47(7): 213-219. |
|