共 25 条
- [1] YANG A M, LU C M, LI J, Et al., Application of meta-learning in cyberspace security: a survey, Digital Communications and Networks, 9, 1, pp. 67-78, (2023)
- [2] WU J X., Development paradigms of cyberspace endogenous safety and security, Science China Information Sciences, 65, 5, (2022)
- [3] SEPCZUK M., Dynamic Web application firewall detection supported by cyber mimic defense approach, Journal of Network and Computer Applications, 213, (2023)
- [4] MOLINA-CORONADO B, MORI U, MENDIBURU A, Et al., Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process, IEEE Transactions on Network and Service Management, 17, 4, pp. 2451-2479, (2020)
- [5] ZHAO R J, GUI G, XUE Z, Et al., A novel intrusion detection method based on lightweight neural network for Internet of things, IEEE Internet of Things Journal, 9, 12, pp. 9960-9972, (2022)
- [6] WU Y H, HU X D., Industrial Internet security protection based on an industrial firewall, Proceedings of the 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), pp. 239-247, (2021)
- [7] WU J X., Research on cyber mimic defense, Journal of Cyber Security, 1, 4, pp. 1-10, (2016)
- [8] WU T, HU C N, CHEN Q N, Et al., Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition, Journal on Communications, 42, 3, pp. 122-134, (2021)
- [9] ZHOU D C, CHEN H C, CHENG G Z, Et al., Design and implementation of adaptive mimic voting device oriented to persistent connection, Journal on Communications, 43, 6, pp. 71-84, (2022)
- [10] ZHANG J, GE Q, XU W H, Et al., Design, implementation and formal verification of BGP proxy for mimic router, Journal on Communications, 44, 3, pp. 33-44, (2023)