Computer Science ›› 2025, Vol. 52 ›› Issue (5): 375-383.doi: 10.11896/jsjkx.240500033
• Information Security • Previous Articles Next Articles
LI Yuanbo1,2, HU Hongchao1, YANG Xiaohan1, GUO Wei1, LIU Wenyan1,3
CLC Number:
[1]ZHOU X,PENG X,XIE T,et al.Fault Analysis and Debugging of Microservice Systems:Industrial Survey,Benchmark System,and Empirical Study[J].IEEE Transactions on Software Engineering,2021,47(2):243-260. [2]KHAN M,TAHERI J,Al-DULAIMY A,et al.PerfSim:A Performance Simulator for Cloud Native Computing[J].IEEE Transactions on Cloud Computing,2021,11(2):1395-1413. [3]AROUK O,NIKAEIN N.Kube5G:A Cloud-Native 5G Service Platform[C]// Proceedings of Global Communications Confe-rence(GLOBECOM).IEEE,2020:1-8. [4]ZHAO P,WU L,HONG Z,et al.Research on Multi-cloud Access Control Policy Integration Framework[J].China Communications,2019,16(9):222-234. [5]PEREIRA-VALE A,FERNANDEZ E B,MONGE R,et al.Security in Microservice-based Systems:A Multivocal Literature Review[J].Computers & Security,2021,103:102200. [6]LI C,LIU J,WANG M,et al.Fault-tolerant Scheduling and Data Placement for Scientific Workflow Processing in Geo-distributed Clouds[J].Journal of Systems and Software,2022,187:111227. [7]WEN Z,QASHA R,LI Z,et al.Dynamically Partitioning Workflow Over Federated Clouds for Optimising the Monetary Cost and Handling Run-time Failures[J].IEEE Transactions on Cloud Computing,2020,8(4):1093-1107. [8]ZHOU X,ZHANG G,SUN J,et al.Minimizing Cost andMakespan for Workflow Scheduling in Cloud Using Fuzzy Domi-nance Sort Based HEFT[J].Future Generation Computer Systems,2019,93:278-289. [9]WU Q,ISHIKAWA F,ZHU Q,et al.Deadline-Constrained Cost Optimization Approaches for Workflow Scheduling in Clouds[J].IEEE Transactions on Parallel and Distributed Systems,2017,28(12):3401-3412. [10]ARABNEJAD V,BUBENDORFER K,NG B.Dynamic Multi-workflow Scheduling:A Deadline and Cost-aware Approach for Commercial Clouds[J].Future Generation Computer Systems,2019,100:98-108. [11]ZHOU Z,YU S,CHEN W,et al.CE-IoT:Cost-effective Cloud-edge Resource Provisioning for Heterogeneous IoT Applications[J].IEEE Internet of Things Journal,2020,7(9):8600-8614. [12]WANG S,DING Z,JIANG C.Elastic Scheduling for Microservice Applications in Clouds[J].IEEE Transactions on Parallel and Distributed Systems,2021,32(1):98-115. [13]LI W,LI X,RUIZ R.Scheduling Microservice-based Workflows to Containers in on-demand Cloud Resources[C]//2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design(CSCWD).IEEE,2021:61-66. [14]YAO G,DING Y,REN L,et al.An Immune System-inspiredRescheduling Algorithm for Workflow in Cloud Systems[J].Knowledge-Based Systems,2016,99:39-50. [15]GILL S S,BUYYA R.SECURE:Self-protection Approach in Cloud Resource Management[J].IEEE Cloud Computing,2018,5(1):60-72. [16]YAO G,DING Y,HAO K.Using Imbalance Characteristic for Fault-tolerant Workflow Scheduling in Cloud Systems[J].IEEE Transactions on Parallel and Distributed Systems,2017,28(12):3671-3683. [17]ZHOU C,WANG T,LI L,et al.Makespan and Security-aware Workflow Scheduling for Cloud Service Cost Minimization Using Firefly Optimizer[C]//International Conference on Algorithms and Architectures for Parallel Processing.Springer Nature Switzerland,2023:620-641. [18]MENG S,HUANG W,YIN X,et al.Security-aware DynamicScheduling for Real-time Optimization in Cloud-based Industrial Applications[J].IEEE Transactions on Industrial Informatics,2021,17(6):4219-4228. [19]DING Y,YAO G,HAO K.Fault-tolerant Elastic Scheduling Algorithm for Workflow in Cloud Systems[J].Information Sciences,2018,393:47-65. [20]WANG Y,GUO Y,GUO Z,et al.Protecting Scientific Workflows in Clouds with an Intrusion Tolerant System[J].IET Information Security,2020,14(2):157-165. [21]LI H,GUO Y,SUN P,et al.An Optimal Defensive Deception Framework for the Container-based Cloud with Deep Reinforcement Learning[J].IET Information Security,2022,16(3):178-192. [22]ZHOU D,CHEN H,CHENG G.A Security Containers Placement Algorithm Based on DQN for Microservices to Defend Against Co-Resident Threat[C]//2023 8th International Confe-rence on Computer and Communication Systems(ICCCS).IEEE,2023:683-688. |
[1] | ZHENG Longhai, XIAO Bohuai, YAO Zewei, CHEN Xing, MO Yuchang. Graph Reinforcement Learning Based Multi-edge Cooperative Load Balancing Method [J]. Computer Science, 2025, 52(3): 338-348. |
[2] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
[3] | HUO Xingpeng, SHA Letian, LIU Jianwen, WU Shang, SU Ziyue. Windows Domain Penetration Testing Attack Path Generation Based on Deep Reinforcement Learning [J]. Computer Science, 2025, 52(3): 400-406. |
[4] | XU Donghong, LI Bin, QI Yong. Task Scheduling Strategy Based on Improved A2C Algorithm for Cloud Data Center [J]. Computer Science, 2025, 52(2): 310-322. |
[5] | WANG Tianjiu, LIU Quan, WU Lan. Offline Reinforcement Learning Algorithm for Conservative Q-learning Based on Uncertainty Weight [J]. Computer Science, 2024, 51(9): 265-272. |
[6] | ZHOU Wenhui, PENG Qinghua, XIE Lei. Study on Adaptive Cloud-Edge Collaborative Scheduling Methods for Multi-object State Perception [J]. Computer Science, 2024, 51(9): 319-330. |
[7] | GAO Yuzhao, NIE Yiming. Survey of Multi-agent Deep Reinforcement Learning Based on Value Function Factorization [J]. Computer Science, 2024, 51(6A): 230300170-9. |
[8] | WANG Shuanqi, ZHAO Jianxin, LIU Chi, WU Wei, LIU Zhao. Fuzz Testing Method of Binary Code Based on Deep Reinforcement Learning [J]. Computer Science, 2024, 51(6A): 230800078-7. |
[9] | LI Danyang, WU Liangji, LIU Hui, JIANG Jingqing. Deep Reinforcement Learning Based Thermal Awareness Energy Consumption OptimizationMethod for Data Centers [J]. Computer Science, 2024, 51(6A): 230500109-8. |
[10] | YANG Xiuwen, CUI Yunhe, QIAN Qing, GUO Chun, SHEN Guowei. COURIER:Edge Computing Task Scheduling and Offloading Method Based on Non-preemptivePriorities Queuing and Prioritized Experience Replay DRL [J]. Computer Science, 2024, 51(5): 293-305. |
[11] | LI Junwei, LIU Quan, XU Yapeng. Option-Critic Algorithm Based on Mutual Information Optimization [J]. Computer Science, 2024, 51(2): 252-258. |
[12] | SHI Dianxi, PENG Yingxuan, YANG Huanhuan, OUYANG Qianying, ZHANG Yuhui, HAO Feng. DQN-based Multi-agent Motion Planning Method with Deep Reinforcement Learning [J]. Computer Science, 2024, 51(2): 268-277. |
[13] | ZHAO Xiaoyan, ZHAO Bin, ZHANG Junna, YUAN Peiyan. Study on Cache-oriented Dynamic Collaborative Task Migration Technology [J]. Computer Science, 2024, 51(2): 300-310. |
[14] | WANG Kewen, ZHANG Weiting, LIAO Peixi. Deterministic Transmission Scheduling Mechanism for Mixed Traffic Flows Towards Digital Twin Networks [J]. Computer Science, 2024, 51(12): 37-45. |
[15] | LU Yue, WANG Qiong, LIU Shun, LI Qingtao, LIU Yang, WANG Hongbiao. Reinforcement Learning Algorithm for Charging/Discharging Control of Electric Vehicles Considering Battery Loss [J]. Computer Science, 2024, 51(11A): 231200147-7. |
|