Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 438-441.
• Information Security • Previous Articles Next Articles
CHANG Xiao-lin1,2, FAN Yong-wen1, ZHU Wei-jun1, LIU Yang1
CLC Number:
[1]薛华成.管理信息系统(第六版) [M].北京:清华大学出版社,2012. [2]张梦.基于C/S结构的中小企业人事管理系统的设计与开发[J].计算机科学,2016,43(S1):547-550. [3]AROMS E.NIST Special Publication 800-94 Guide to Intrusion Detection and Prevention Systems(IDPS)[M].USA,CreateSpace,2012. [4] ZHUANG R,QIAN D F,ZHANG W J.A Survey of Intrusion Detection Technology Research[J].Journal of Chinese Computer Systems,2003,24(7):1113-1118. [5]WANG J,KISSEL Z A.Data Encryption Algorithms[M].John Wiley & Sons Singapore Pte.Ltd,2009. [6]CLINCY V,SHAHRIAR H.2018 IEEE 42nd Annual Computer Software and Applications Conference(COMPSAC)- Web Application Firewall:Network Security Models and Configuration[C]∥IEEE Computer Software & Applications Conference.IEEE,2018:835-836. [7]邬江兴.网络空间拟态防御导论[M].北京,科学出版社,2017. [8]邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [9]多国顶尖“白帽黑客”对拟态防御网络设备和系统发起50余万次攻击测试无一次得手[EB/OL].新华网.http://m.xinhuanet.com/2018-05/12/c_129870684.htm,2018. [10]熊斌.基于B/S三层架构OA系统的设计和实现[D].电子科技大学,2011. [11]仝青,张铮,邬江兴.基于软硬件多样性的主动防御技术[J].信息安全学报,2017,2(1):1-12. [12]GARCIA M,BESSANI A N,GASHI I,et al.OS diversity for intrusion tolerance:Myth or reality[C]∥IEEE/IFIP International Conference on Dependable Systems & networks.IEEE Computer Society,2011. [13]周余阳,程光,郭春生,等.移动目标防御的攻击面动态转移技术研究综述[J].软件学报,2018,29(9):2799-2820. [14]仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897. [15]王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017(11):2705-2714. [16]CALLAHAN T,ALLMAN M,RABINOVICH M.On modern DNS behavior and properties[M].ACM,2013. [17]魏帅,于洪,顾泽宇,等.面向工控领域的拟态安全处理机架构[J].信息安全学报,2017,2(1):54-73. [18]扈红超,陈福才,王禛鹏.拟态防御DHR模型若干问题探讨和性能评估[J].信息安全学报,2016,1(4):40-51. [19]吴文青,唐应辉,兰绍军.修理设备可更换的k/n(G)表决可修系统[J].数学学报(中文版),2016,59(6):799-820. [20]柏仲干.复杂系统Bayes可靠性评估方法研究及其应用软件的研制[D].长沙:国防科学技术大学,2003. |
[1] | WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133. |
[2] | CHEN Zhuang, ZOU Hai-tao, ZHENG Shang, YU Hua-long, GAO Shang. Diversity Recommendation Algorithm Based on User Coverage and Rating Differences [J]. Computer Science, 2022, 49(5): 159-164. |
[3] | LIU Yi, MAO Ying-chi, CHENG Yang-kun, GAO Jian, WANG Long-bao. Locality and Consistency Based Sequential Ensemble Method for Outlier Detection [J]. Computer Science, 2022, 49(1): 146-152. |
[4] | YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290. |
[5] | ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254. |
[6] | CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281. |
[7] | ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83. |
[8] | ZHANG Xue-fu, ZENG Pan, JIN Min. Cancer Classification Prediction Model Based on Correlation and Similarity [J]. Computer Science, 2019, 46(7): 300-307. |
[9] | LI Shan-shan, CHEN Li, TANG Yu-ting, WANG Yi-lin, YU Zhong-hua. Automatic Extraction of Diversity Keyphrase by Utilizing Integer Liner Programming [J]. Computer Science, 2019, 46(6A): 56-59. |
[10] | GUAN Xiao-qiang, PANG Ji-fang, LIANG Ji-ye. Randomization of Classes Based Random Forest Algorithm [J]. Computer Science, 2019, 46(2): 196-201. |
[11] | ZHANG Jie-xin, PANG Jian-min, ZHANG Zheng, TAI Ming, LIU Hao. QoS Quantification Method for Web Server with Mimic Construction [J]. Computer Science, 2019, 46(11): 109-118. |
[12] | WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186. |
[13] | SHI Jin-ping,LI Jin,HE Feng-zhen. Diversity Recommendation Approach Based on Social Relationship and User Preference [J]. Computer Science, 2018, 45(6A): 423-427. |
[14] | ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing. Mimic Security Defence Strategy Based on Software Diversity [J]. Computer Science, 2018, 45(2): 215-221. |
[15] | SHAN Tian-yu, GUAN Yu-yang. Differential Evolution Algorithm with Adaptive Population Size Reduction Based on Population Diversity [J]. Computer Science, 2018, 45(11A): 160-166. |
|