Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231000005-6.doi: 10.11896/jsjkx.231000005
• Information Security • Previous Articles Next Articles
ZHAO Jia, GU Liang, WU Yao, DU Feng
CLC Number:
[1]WU J X.Research on mimicry defense in Cyberspace[J].Journal of Information Security,2016(4):1-10. [2]TONG Q,ZHANG Z,WU J X.Active defense technology based on software and hardware diversity[J].Journal of Information Security,2017,2(1):1-12. [3]YAO W B,YANG X Z.Different software component selection algorithm design[J].Journal of Harbin Institute of Technology,2003(3):261-264. [4]QIU D H,LI H,SUN J L.Measuring software similarity based on structure and property of class diagram[C]//Sixth International Conference on Advanced Computational Intelligence.IEEE,2013:75-80. [5]GAO M,LUO J,ZHOU H Y,et al.A differential feedbackscheduling decision algorithm based on mimicry defense[J].Telecommunication Science,2019,36(5):73-82. [6]LIU Q R,LIN S J,GU Z Y.Heterogeneous functional-equivalent block scheduling algorithm for mimicry security defense[J].Journal of Communications,2018,39(7):188-198. [7]TWU P,MOSTOFI Y,EGERSTEDT M.A measure of heterogeneity in multi-agent systems[C]//2014 American Control Conference.IEEE,2014:3972-3977. [8]YUE Y Y,FU X,DENG S.Multi-access edge Computing Server heterogeneity quantification Method based on mimicry defense[J].Computer Applications and Software,2019,40(6):276-281,349. [9]ZHANG J X,PANG J M,ZHANG Z,et al.A quantizationmethod for heterogeneity of network security systems based on dissimilar redundancy architecture[J].Journal of Electronics and Information Technology,2019,41(7):1594-1600. [10]ZHANG J X,PANG J M,ZHANG Z.A quantitative method for heterogeneity of Web servers based on mimicry construction[J].Journal of Software,2019,31(2):564-577. [11]LI J J.Research on Evaluation Method and Technology of mi-micry security information System[J].Information Technology and Network Security,2019,38(4):33-36. [12]WANG X M,YANG W H,ZHANG W,et al.Research onScheduling strategy of mimicry Web server based on BSG[J].Journal of Communications,2018,39(S2):112-120. [13]WU Z Q,WEI J.Heterogeneous executors scheduling algorithm for mimic defense systems[C]//2019 IEEE 2nd International Conference on Computer and Communication Engineering.Piscataway:IEEE Press,2019:279-284. [14]ZHANG Y J,YANG Y P,ZHOU Y,et al.State assessment of urban security development based on ANP-BP neural network[J].Journal of Xi 'an University of Science and Technology,2022,42(6):1104-1113. [15]LIU H.Research on Heterogeneous Software Deployment Stra-tegy for mimicry Defense System[D].Information Engineering University of Strategic Support Forces,2020. [16]WANG M,FU W H,WANG B T,et al.Optimization of mimicry defense strategy based on Evolutionary game [J].Application Research of Computers,2024,41(2):576-581. [17]JIANG D M,DING L.ANP-BP highway tunnel fire risk assessment model and its application[J].Journal of Qingdao University of Technology,2018,39(5):111-116. [18]WANG L F.Theory and Algorithm of Network Analysis Method(ANP)[J].Systems Engineering Theory & Practice,2001(3):44-50. [19]HUANG Y T,HUANG X B.BP neural network optimizationbased on ANP and Sparrow search algorithm for prefabricated building schedule risk assessment[J].Journal of Engineering Management,2019,36(6):36-41. |
[1] | XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398. |
[2] | WANG Zihang, YANG Min, WEI Zichong. Application of Parameter Decoupling in Differentially Privacy Protection Federated Learning [J]. Computer Science, 2024, 51(11): 379-388. |
[3] | ZHANG Changfan, MA Yuanyuan, LIU Jianhua, HE Jing. Dual Gating-Residual Feature Fusion for Image-Text Cross-modal Retrieval [J]. Computer Science, 2023, 50(6A): 220700030-7. |
[4] | XIONG Haojie, WEI Yi. Study on Multibeam Sonar Elevation Data Prediction Based on Improved CNN-BP [J]. Computer Science, 2023, 50(6A): 220100161-4. |
[5] | CHEN Haiyan, ZHU Junlin, WANG Ping. Study on Prediction Modeling and Compensation of Circular Target Center Positioning Error Based on GA-BP [J]. Computer Science, 2023, 50(11A): 221100170-5. |
[6] | ZOU Chenwei, YAO Rao. Study on Ultrasonic Phased Array Defect Detection Based on Machine Vision [J]. Computer Science, 2023, 50(11A): 230200150-6. |
[7] | LI Xia, MA Qian, BAI Mei, WANG Xi-te, LI Guan-yu, NING Bo. RIIM:Real-Time Imputation Based on Individual Models [J]. Computer Science, 2022, 49(8): 56-63. |
[8] | LIU Bao-bao, YANG Jing-jing, TAO Lu, WANG He-ying. Study on Prediction of Educational Statistical Data Based on DE-LSTM Model [J]. Computer Science, 2022, 49(6A): 261-266. |
[9] | XU Jia-nan, ZHANG Tian-rui, ZHAO Wei-bo, JIA Ze-xuan. Study on Improved BP Wavelet Neural Network for Supply Chain Risk Assessment [J]. Computer Science, 2022, 49(6A): 654-660. |
[10] | ZHOU Hai-yu, ZHANG Dao-qiang. Multi-site Hyper-graph Convolutional Neural Networks and Application [J]. Computer Science, 2022, 49(3): 129-133. |
[11] | XIA Jing, MA Zhong, DAI Xin-fa, HU Zhe-kun. Efficiency Model of Intelligent Cloud Based on BP Neural Network [J]. Computer Science, 2022, 49(2): 353-367. |
[12] | CHENG Fan, WANG Rui-jin, ZHANG Feng-li. Federated Learning Optimization Method for Dynamic Weights in Edge Scenarios [J]. Computer Science, 2022, 49(12): 53-58. |
[13] | JIN Yu-yan, YU Tian-hao, WANG Song-bo, LIN Wei-wei, PAN Yu-cong. CPU Power Model for ARM Architecture Cloud Servers [J]. Computer Science, 2022, 49(10): 59-65. |
[14] | CHENG Tie-jun, WANG Man. Network Public Opinion Trend Prediction of Emergencies Based on Variable Weight Combination [J]. Computer Science, 2021, 48(6A): 190-195. |
[15] | GUO Fu-min, ZHANG Hua, HU Rong-hua, SONG Yan. Study on Method for Estimating Wrist Muscle Force Based on Surface EMG Signals [J]. Computer Science, 2021, 48(6A): 317-320. |
|