1 |
刘小虎, 张恒巍, 马军强, 等. 基于攻防博弈的网络防御决策方法研究综述[J]. 网络与信息安全学报, 2022, 8(1): 1-14.
|
|
LIU Xiaohu, ZHANG Hengwei, MA Junqiang, et al. Research Review of Network Defense Decision-Making Methods Based on Attack and Defense Game[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 1-14.
|
2 |
杨春周, 李慧, 赵志诚, 等. 基于云模型的某信息系统项目建设过程安全风险管理研究[J]. 项目管理技术, 2023, 21(10): 7-12.
|
|
YANG Chunzhou, LI Hui, ZHAO Zhicheng, et al. Research on Security Risk Management of an Information System Project Construction Process Based on Cloud Model[J]. Project Management Technology, 2023, 21(10): 7-12.
|
3 |
王坤, 张玉臣, 董书琴, 等. 基于TOPSIS-灰色关联分析法的网络空间防御能力评估[J]. 现代防御技术, 2023, 51(6): 97-104.
|
|
WANG Kun, ZHANG Yuchen, DONG Shuqin, et al. Cyberspace Defense Capability Assessment Based on TOPSIS-Grey Association Analysis[J]. Modern Defence Technology, 2023, 51(6): 97-104.
|
4 |
赵靖, 杜荔红, 李廷锴. 基于COWA-DEMATEL的军民融合领域协同研发项目风险识别[J]. 管理现代化, 2021, 41(3): 99-103.
|
|
ZHAO Jing, DU Lihong, LI Tingkai. Risk Identification of Collaborative R&D Project of Civil-Military Integration Based on COWA-DEMATEL[J]. Modernization of Management, 2021, 41(3): 99-103.
|
5 |
MAJEED A, ALNAJIM A M, WASEEM A, et al. Deep Learning-Based Symptomizing Cyber Threats Using Adaptive 5G Shared Slice Security Approaches[J]. Future Internet, 2023, 15(6): 193.
|
6 |
LEE S. AI-Based CYBERSECURITY: Benefits and Limitations[J]. Robotics AI Ethics, 2021, 6(1)
|
7 |
刘锋, 张恩宁, 狄宋珍, 等. 一种基于演化博弈的平台动态防御策略[J]. 火力与指挥控制, 2022, 47(12): 128-135.
|
|
LIU Feng, ZHANG Enning, DI Songzhen, et al. A Dynamic Platform Defense Strategy Based on Evolutionary Game[J]. Fire Control & Command Control, 2022, 47(12): 128-135.
|
8 |
王志屹, 王刚, 陈彤睿, 等. 平台动态防御演化博弈模型和状态迁移策略[J]. 空军工程大学学报(自然科学版), 2020, 21(3): 85-92, 98.
|
|
WANG Zhiyi, WANG Gang, CHEN Tongrui, et al. Platform Dynamic Defense Evolution Game Model and State Migration Strategy[J]. Journal of Air Force Engineering University(Natural Science Edition), 2020, 21(3): 85-92, 98.
|
9 |
林霄. 存储转发光交换网络若干关键问题研究[D]. 上海: 上海交通大学, 2018.
|
|
LIN Xiao. Research on Some Key Problems of Store-and-Forward Optical Circuit Switched Network[D]. Shanghai: Shanghai Jiaotong University, 2018.
|
10 |
史春腾, 王文峰. 自组织网络性能丢包率测试方法研究[J]. 中国标准化, 2022(24): 205-209.
|
|
SHI Chunteng, WANG Wenfeng. Research on Measurement Method of Packet Loss Rate in Ad Hoc Network Performance[J]. China Standardization, 2022(24): 205-209.
|
11 |
郑竹萌, 胡如男, 施建雄. 数据单向传输设备关键技术概述及应用[J]. 网信军民融合, 2022(4): 28-33.
|
|
ZHENG Zhumeng, HU Runan, SHI Jianxiong. Overview and Application of Key Technologies for One-Way Data Transmission Equipment[J]. Civil-Military Integration on Cyberspace, 2022(4): 28-33.
|
12 |
张宝亮. 面向节点分类问题的图神经网络防御与攻击关键技术研究[D]. 长春: 吉林大学, 2023.
|
|
ZHANG Baoliang. Research on the Key Techniques of Defense and Attack Against Graph Neural Network for Node Classification[D]. Changchun: Jilin University, 2023.
|
13 |
陶洋, 杜黎明, 申婷婷. 双分支多阶段时空特征融合的加密流量分类方法[J]. 小型微型计算机系统, 2024, 45(6): 1489-1495.
|
|
TAO Yang, DU Liming, SHEN Tingting. Encrypted Traffic Identification Based on Two-Branch Multi-Stage Spatiotemporal Feature Fusion[J]. Journal of Chinese Computer Systems, 2024, 45(6): 1489-1495.
|
14 |
周阳. 基于SDN的网络安全防御关键技术研究[D]. 北京: 北京邮电大学, 2018.
|
|
ZHOU Yang. Research on Network Security Defense Methods Based on SDN[D]. Beijing: Beijing University of Posts and Telecommunications, 2018.
|
15 |
中华人民共和国公安部. 信息安全技术 工业控制系统主机安全防护与审计监控产品安全技术要求: [S]. 北京: 中国标准出版社, 2019.
|
|
The Ministry of Public Security of the People's Republic of China. Information Security Technology Security Technical Requirements for Security Protecting and Audit Monitoring Products for Industrial Control System Host: [S]. Beijing: Standards Press of China, 2019.
|
16 |
LIU Xiaohu, ZHANG Hengwei, DONG Shuqin, et al. Network Defense Decision-Making Based on a Stochastic Game System and a Deep Recurrent Q-Network[J]. Computers & Security, 2021, 111: 102480.
|
17 |
KOTSIAS J, AHMAD A, SCHEEPERS R. Adopting and Integrating Cyber-Threat Intelligence in a Commercial Organisation[J]. European Journal of Information Systems, 2023, 32(1): 35-51.
|
18 |
NOEL S. Impact Analysis for Cyber Defense Optimization[J]. The Journal of Defense Modeling and Simulation, 2023, 20(1): 39.
|
19 |
WENDZEL S, MAZURCZYK W, CAVIGLIONE L, et al. Emerging Topics in Defending Networked Systems[J]. Future Generation Computer Systems, 2022, 128: 317-319.
|
20 |
王萌. 软件定义网络架构的DDoS攻击防御技术研究[D]. 广州: 华南理工大学, 2022.
|
|
WANG Meng. The Research of DDoS Attacks Defense Methods in Software-Defined Networking[D]. Guangzhou: South China University of Technology, 2022.
|
21 |
ENOCH S Y, MOON C Y, LEE D, et al. A Practical Framework for Cyber Defense Generation, Enforcement and Evaluation[J]. Computer Networks, 2022, 208: 108878.
|
22 |
袁俊丽. 涉密科研项目保密管理系统研究[J]. 科技创新与应用, 2023, 13(29): 103-106.
|
|
YUAN Junli. Research on Confidentiality Management System for Classified Scientific Research Projects[J]. Technology Innovation and Application, 2023, 13(29): 103-106.
|
23 |
刘芳, 曹进克. 云服务器虚拟机通信串口数据安全性监控仿真[J]. 计算机仿真, 2023, 40(8): 174-177, 190.
|
|
LIU Fang, CAO Jinke. Cloud Server Virtual Machine Communication Serial Port Data Security Monitoring Simulation[J]. Computer Simulation, 2023, 40(8): 174-177, 190.
|
24 |
朱瑾, 俞璐, 姚昌华, 等. 基于通联关系的通信网络拓扑发现方法[J]. 信息技术与网络安全, 2022, 41(2): 66-72.
|
|
ZHU Jin, YU Lu, YAO Changhua, et al. Communication Network Topology Discovery Method Based on Connection Relation[J]. Information Technology and Network Security, 2022, 41(2): 66-72.
|