[1] |
FERREIRA A P, SINNOTT R. A Performance Evaluation of Containers Running on Managed Kubernetes Services[C]// IEEE. 2019 IEEE International Conference on Cloud Computing Technology and Science(CloudCom). New York: IEEE, 2019: 199-208.
|
[2] |
ORDABAYEVA G K, OTHMAN M, KIRGIZBAYEVA B, et al. A Systematic Review of Transition from IPV4 to IPV6[C]// ACM. 6th International Conference on Engineering & MIS 2020. New York: ACM, 2020: 1-15.
|
[3] |
YUAN Lirong. Research on Practical Methods of Cyber Attack Tracing and Traceability[J]. China High and New Technology, 2022(23): 52-54.
|
|
袁利荣. 网络攻击追踪溯源实践方法研究[J]. 中国高新科技, 2022(23):52-54.
|
[4] |
DE GUZMAN F E, GERARDO B D, MEDINA R P. Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal[C]// IEEE. 2019 IEEE 4th International Conference on Computer and Communication Systems(ICCCS). New York: IEEE, 2019: 189-192.
|
[5] |
MOHAMED H, OULDMOHAMED Y, NACERA B. A Single-Packet IP Traceback: Combating DoS-DDoS Attacks[J]. EDPACS, 2022, 66(4): 1-12.
|
[6] |
FAZIO P, TROPEA M, VOZNAK M, et al. On Packet Marking and Markov Modeling for IP Traceback: A Deep Probabilistic and Stochastic Analysis[EB/OL]. (2020-12-09)[2023-08-10]. https://www.sciencedirect.com/science/article/abs/pii/S1389128620311439.
|
[7] |
PATEL H, JINWALA D C. LPM: A Lightweight Authenticated Packet Marking Approach for IP Traceback[J]. Computer Networks, 2018, 140: 41-50.
doi: 10.1016/j.comnet.2018.04.014
URL
|
[8] |
NUR A Y, TOZAL M E. Record Route IP Traceback: Combating DoS Attacks and the Variants[J]. Computers & Security, 2018, 72: 13-25.
doi: 10.1016/j.cose.2017.08.012
URL
|
[9] |
MURUGESAN V, SELVARAJ M S, YANG M H. HPSIPT: A High-Precision Single-Packet IP Traceback Scheme[J]. Computer Networks, 2018, 143: 275-288.
doi: 10.1016/j.comnet.2018.07.013
URL
|
[10] |
LIU Ying, REN Gang, WU Jianping, et al. Building an IPv6 Address Generation and Traceback System with NIDTGA in Address Driven Network[J]. Science China Information Sciences, 2015, 58(12): 1-14.
|
[11] |
KUANG Peng, LIU Ying, HE Lin, et al. IEEE 802.1x-Based User Identity-Embedded IPv6 Address Generation Scheme[J]. Telecommunications Science, 2019, 35 (12): 15-23.
doi: 10.11959/j.issn.1000-0801.2019289
|
|
况鹏, 刘莹, 何林, 等. 基于IEEE 802.1x的嵌入用户身份标识的IPv6地址生成方案[J]. 电信科学, 2019, 35(12):15-23.
doi: 10.11959/j.issn.1000-0801.2019289
|
[12] |
LI Zhitao, LIU Ying, REN Gang, et al. Non-Client Migration Scheme for IPv6 Address Generation System Based on Web Portal[J]. Journal of Southeast University(Natural Science Edition), 2017, 47(S1): 80-85.
|
|
李智涛, 刘莹, 任罡, 等. IPv6地址生成系统基于Web Portal的无客户端迁移方案[J]. 东南大学学报(自然科学版), 2017, 47(S1):80-85.
|
[13] |
LI Dan, QIN Lancheng, WU Jianping, et al. Internet Source Address Verification Method Based on Synchronization and Dynamic Filtering in Address Domain[J]. Telecommunications Science, 2020, 36(10): 21-28.
doi: 10.11959/j.issn.1000-0801.2020289
|
|
李丹, 秦澜城, 吴建平, 等. 基于边界路由动态同步的互联网地址域内真实源地址验证方法[J]. 电信科学, 2020, 36(10):21-28.
doi: 10.11959/j.issn.1000-0801.2020289
|
[14] |
WU Jiangxing. Mimetic Defense Technology to Build Endogenous Security of National Information Cyberspace[J]. Information and Communications Technologies, 2019, 13(6): 4-6.
|
|
邬江兴. 拟态防御技术构建国家信息网络空间内生安全[J]. 信息通信技术, 2019, 13(6):4-6.
|
[15] |
XU Ke, FU Songtao, LI Qi, et al. The Research Progress on Intrinsic Internet Security Architecture[J]. Chinese Journal of Computers, 2021, 44(11): 2149-2172.
|
|
徐恪, 付松涛, 李琦, 等. 互联网内生安全体系结构研究进展[J]. 计算机学报, 2021, 44(11):2149-2172.
|
[16] |
LUO Lunhan, LI Xiang, YU Xinsheng. Development and Application of Endogenous Security Technologies in Cyberspace in the Digital Era[J]. Electronic Technology & Software Engineering, 2021(19): 255-257.
|
|
罗论涵, 李翔, 余新胜. 数字化时代网络空间内生安全技术发展与应用[J]. 电子技术与软件工程, 2021(19):255-257.
|
[17] |
LI Lingshu. Research on Key Technologies of Mimic SaaS Cloud Security Architecture[D]. Zhengzhou: PLA Strategic Support Force Information Engineering University, 2021.
|
|
李凌书. 拟态SaaS云安全架构及关键技术研究[D]. 郑州: 战略支援部队信息工程大学, 2021.
|
[18] |
GUO Junli, XU Mingyang, YUAN Haoyu, et al. Introduction of Endogenous Security of Zero Trust Model[J]. Journal of Zhengzhou University(Natural Science Edition), 2022, 54(6): 51-58.
|
|
郭军利, 许明洋, 原浩宇, 等. 引入内生安全的零信任模型[J]. 郑州大学学报(理学版), 2022, 54(6):51-58.
|
[19] |
DUNKELMAN O, KELLER N, RONEN E, et al. Quantum Time/Memory/Data Tradeoff Attacks[EB/OL]. [2023-08-10]. https://www.xueshufan.com/publication/3217041859.
|
[20] |
ZONG Rui, DONG Xiaoyang, WANG Xiaoyun. Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash[EB/OL]. [2023-08-10]. https://www.xueshufan.com/publication/2982481869.
|