[1] |
MELL P, GRANCE T.The NIST Definition of Cloud Computing (draft)[J]. NIST Special Publication, 2011,800(145): 7.
|
[2] |
LIU Peng.Cloud Computing[M].Beijing: Publishing House of Electronics Industry,2011.
|
|
刘鹏. 云计算[M]. 北京: 电子工业出版社,2011.
|
[3] |
WANG Wenbin, LIU Fangzhou, LIU Xue.Software Testing Strategy Based on Cloud Computing Platform[J].Computer CD Software and Applications, 2013(17):53-54.
|
|
王文斌, 刘方舟, 刘雪. 基于云计算平台的软件测试策略[J]. 计算机光盘软件与应用, 2013(17):53-54.
|
[4] |
REESE G. Cloud Applications Architectures, Building Applications and Infrastructure in the Cloud[M].Sebastopol: O’Reilly,2009.
|
[5] |
ZHOU Na, LIN Guoyuan, LI Zhengkui.Multi-level Security Model Based on Noninterference Theory in Cloud[J].Netinfo Security, 2015, 15(12): 21-27.
|
|
周娜, 林果园, 李正奎. 云计算中基于无干扰理论的多级安全模型[J]. 信息网络安全, 2015, 15(12): 21-27.
|
[6] |
GAO J, BAI Xiaoying, TSAI W T. Cloud Testing-issues, Challenges, Needs and Practice[J]. Software Engineering: An International Journal, 2011, 1(1): 9-23.
|
[7] |
YU Lian, LI Xiaohu, LI Zhongjie.Testing Tasks Management in Testing Cloud Environment[C]// IEEE. 2011 IEEE 35th Annual Computer Software and Applications Conference , July 18-22, 2011, Munich, Germany.NJ:IEEE, 2011: 76-85.
|
[8] |
WANG Jun, MENG Fanpeng.Software Testing Based on Cloud Computing[C]// IEEE. 2011 International Conference on Internet Computing & Information Services , September 17-18, 2011, Hong Kong, China.NJ: IEEE, 2011:176-178.
|
[9] |
LI Wenjuan, ZHANG Qifei,PING Lingdi, et al.Cloud Scheduling Algorithm Based on Fuzzy Clustering[J].Journal of China Institute of Communications, 2012, 33(3): 146-154.
|
[10] |
DU Jingjing, ZHAO Pengfei.A Test Case Generation Scheme Based on Cloud Platform[J].Computer and Modernization, 2014(2):36-40.
|
|
杜京京, 赵鹏飞. 一种基于云平台的测试用例生成方案[J]. 计算机与现代化, 2014(2):36-40.
|
[11] |
kuppingercole. Virtualization Security Survey: Security-an Essential Prerequisite for Successful Virtualization[EB/OL]. ,2010-11-30.
|
[12] |
TAO Yuan, HUANG Tao, ZHANG Mohan, et al.Research and Development Trend Analysis of Key Technologies for Cyberspace Security Situation Awareness[J].Netinfo Security,2018,18(8): 79-85.
|
|
陶源, 黄涛, 张墨涵, 等. 网络安全态势感知关键技术研究及发展趋势分析[J]. 信息网络安全, 2018, 18(8): 79-85.
|
[13] |
RIMAL B P, CHOI E, LUMB I.A Taxonomy and Survey of Cloud Computing Systems[C]// IEEE. The Fifth International Joint Conference on INC, August 25-27, 2009, Seoul, South Korea.NJ:IEEE, 2009: 44-51.
|
[14] |
ITKONEN J, RAUTIAINNEN K.Exploratory Testing: a Multiple Case Study[C]// IEEE. 2005 International Symposium on Empirical Software Engineering, November 17-18, 2005, Noosa Heads, Qld., Australia.NJ: IEEE, 2005: 10 .
|
[15] |
LENG Zhijian.Research and Application of Software Automation Testing Method[D].Wuhan: Wuhan University of Technology,2010.
|
|
冷知见. 软件自动化测试方法的研究与应用[D]. 武汉:武汉理工大学,2010.
|
[16] |
HARRISON W J, PEARSON K R.Computing Solutions for Large General Equilibrium Models Using GEMPACK[J]. Computational Economics, 1996, 9(2): 83-127.
|
[17] |
Jean-Francois. Cloud Computing: Weapon of Choice for DDoS? [EB/OL]..
|
[18] |
SHEA R, LIU Jiangchuan.Performance of Virtual Machines under Networked Denial of Service Attacks: Experiments and Analysis[J].IEEE System Journal,2013,7(2): 335-345.
|
[19] |
YAN Chenghua, CHENG Jin, FAN Panxing.Research on the Network Traffic Information Structure Feature Based on Entropy[J].Netinfo Security ,2014,14(3):28-31.
|
|
严承华, 程晋, 樊攀星. 基于信息熵的网络流量信息结构特征研究[J]. 信息网络安全, 2014,14(3):28-31.
|