Computer Science ›› 2018, Vol. 45 ›› Issue (9): 183-186.doi: 10.11896/j.issn.1002-137X.2018.09.030
• Information Security • Previous Articles Next Articles
WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming
CLC Number:
[1]吴世忠,郭涛,董国伟,等.软件漏洞分析技术[M].北京:科学出版社,2014. [2]WU J X.Meaning and Vision of Mimic Computing and Mimic Security Defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese) 邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):2-7. [3]WU J X.Mimic Security Defense in Cyber Space[J].Secrecy Science and Technology,2014(10):4-9.(in Chinese) 邬江兴.网络空间拟态安全防御[J].保密科学技术,2014(10):4-9. [4]WU J X.Research on Cyber Mimic Defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese) 邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [5]MARVIN R.System Reliability Theory:Models,Statistical Me-thods,and Applications(Second Edition)[M].Beijing:National Defend Industry Press,2011.(in Chinese) MARVIN R.系统可靠性理论:模型、统计方法及应用(第2版)[M].北京:国防工业出版社,2011. [6]SUN H Y,LIU B,CAO X L.Research on reliability and security of vote redundancy system[J].Journal of Electronic Measurement and Instrument,2011,25(7):661-664.(in Chinese) 孙怀义,刘斌,曹晓莉.表决冗余系统可靠性与安全性研究[J].电子测量与仪器学报,2011,25(7):661-664. [7]LI C Y,CHEN X,YI X S,et al.Analysis of k—out-of-n:G systems subject to common cause failures based on Markov process[J].Systems Engineering and Electronics,2009,31(11):2789-2792.(in Chinese) 李春洋,陈循,易晓山,等.基于马尔可夫过程的k/n(G)系统共因失效分析[J].系统工程与电子技术,2009,31(11):2789-2792. [8]LIU Y,LI R Z,ZHANG G B.Reliability analysis of k/n(G) Markov system with non-homogenous units[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2015,43(3):17-21.(in Chinese) 刘英,李荣祖,张根保.非同型单元k/n(G)马尔可夫系统可靠性分析[J].华中科技大学学报(自然科学版),2015,43(3):17-21. [9]YIN L H,FANG B X.Security Attributes Analysis for Intrusion Tolerant Systems[J].Chinese Journal of Computers,2006,29(8):1505-1512.(in Chinese) 殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. [10]MADAN B B,GOSEVA-POPSTOJANOVA K,VAIDYANAT-HAN K,et al.A method for modeling and quantifying the securi-ty attributes of intrusion tolerant systems [J].Performance Evaluation,2004,56(1-4):167-186. [11]ZANG H W,HAN W,GAO D Y.Dissimilar redundancy computer system and reliability analysis[J].Journal of Harbin Institute of Technology,2008,40(3):492-494.(in Chinese) 臧红伟,韩炜,高德远.非相似余度计算机系统及其可靠性分析[J].哈尔滨工业大学学报,2008,40(3):492-494. [12]YE Y,XU X S,JIA Y,et al.An Attack Graph-Based Probabilistic Computing Approach of Network Security[J].Chinese Journal of Computers,2010,33(10):1987-1996.(in Chinese) 叶云,徐锡山,贾焰,等.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996. |
[1] | XIE Bai-lin, LI Qi, KUANG Jiang. Microblog Popular Information Detection Based on Hidden Semi-Markov Model [J]. Computer Science, 2022, 49(6A): 291-296. |
[2] | ZHOU Qin, LUO Fei, DING Wei-chao, GU Chun-hua, ZHENG Shuai. Double Speedy Q-Learning Based on Successive Over Relaxation [J]. Computer Science, 2022, 49(3): 239-245. |
[3] | ZHANG Fan, GONG Ao-yu, DENG Lei, LIU Fang, LIN Yan, ZHANG Yi-jin. Wireless Downlink Scheduling with Deadline Constraint for Realistic Channel Observation Environment [J]. Computer Science, 2021, 48(9): 264-270. |
[4] | YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290. |
[5] | WANG Ying-kai, WANG Qing-shan. Reinforcement Learning Based Energy Allocation Strategy for Multi-access Wireless Communications with Energy Harvesting [J]. Computer Science, 2021, 48(7): 333-339. |
[6] | FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346. |
[7] | LUO Jing-jie, WANG Yong-li. ADCSM:A Fine-grained Driving Cycle Model Construction Method [J]. Computer Science, 2021, 48(6A): 289-294. |
[8] | ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300. |
[9] | WU Pei-pei, WU Zhao-xian, TANG Wen-bing. Real-time Performance Analysis of Intelligent Unmanned Vehicle System Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(11A): 147-153. |
[10] | YU Li, DU Qi-han, YUE Bo-yan, XIANG Jun-yao, XU Guan-yu, LENG You-fang. Survey of Reinforcement Learning Based Recommender Systems [J]. Computer Science, 2021, 48(10): 1-18. |
[11] | MA Chuang, YUAN Ye and YOU Hai-sheng. Agricultural Product Output Forecasting Method Based on Grey-Markov Model [J]. Computer Science, 2020, 47(6A): 535-539. |
[12] | WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254. |
[13] | SONG Chang,YU Ke,WU Xiao-fei. Fake Account Detection Method in Online Social Network Based on Improved Edge Weighted Paired Markov Random Field Model [J]. Computer Science, 2020, 47(2): 251-255. |
[14] | ZHANG Cheng-wei, LUO Feng-e, DAI Yi. Prediction Method of Flight Delay in Designated Flight Plan Based on Data Mining [J]. Computer Science, 2020, 47(11A): 464-470. |
[15] | ZHANG Jing, YANG Jian, SU Peng. Survey of Monosyllable Recognition in Speech Recognition [J]. Computer Science, 2020, 47(11A): 172-174. |
|