共 33 条
- [1] Birman K.P., Schneider F.B., The monoculture risk put into context, Security & Privacy, 7, 1, pp. 14-17, (2009)
- [2] Kewley D.L., Bouchard J.F., DARPA information assurance program dynamic defense experiment summary, IEEE Trans. on Systems, Man, and Cybernetics-Part A: Systems and Humans, 31, 4, pp. 331-336, (2001)
- [3] Jajodia S., Ghosh A.K., Swarup V., Et al., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, (2011)
- [4] Cai G.L., Wang B.S., Wang T.Z., Et al., Research and developmentof moving target defense technology, Journal of Computer Research and Development, 53, 5, pp. 968-987, (2016)
- [5] Wu J.X., Meaning and vision of mimic computing and mimic security defense, Telecommunications Science, 30, 7, pp. 1-7, (2014)
- [6] Wu J.X., Zhang F., Luo X.G., Mimic computing and mimic security defense, Communications of the CCF, 11, 1, pp. 8-14, (2015)
- [7] Tong Q., Zhang Z., Zhang W.H., Wu J.X., Design and implementation of mimic defense Web server, Ruan Jian Xue Bao/Journal of Software, 28, 4, pp. 883-897, (2017)
- [8] Zhang Z., Ma B.L., Wu J.X., The test and analysis of prototype of mimic defense in Web servers, Journal of Cyber Security, 2, 1, pp. 13-28, (2017)
- [9] Shao C.S., Lou W., Yan L.M., Optimization of algorithm of similarity measurement in high-dimensional data, Computer Technology and Development, 21, 2, pp. 1-4, (2011)
- [10] Mitra P., Murthy C.A., Pal S.K., Unsupervised feature selection using feature similarity, IEEE Trans. on Pattern Analysis & Machine Intelligence, 24, 3, pp. 301-312, (2002)