[1] WANG J, WEN R, LI J Q, et al. Detecting and mitigating target link-flooding attacks using SDN[J]. IEEE Transactions on Dependable and Secure Computing, 2019,16(6):944-956.
[2] HONG J B, ENOCH S Y, KIM D S, et al. Dynamic security metrics for measuring the effectiveness of moving target defense techniques[J]. Computers & Security, 2018,79:33-52.
[3] STEINBERGER J, KUHNERT B, DIETZ C, et al. DDoS defense using MTD and SDN[C]// IEEE/IFIP Network Operations and Management Symposium. 2018:1-9.
[4] 邬江兴. 网络空间拟态防御研究[J]. 信息安全学报, 2017,1(4):1-10.
[5] 斯雪明,王伟,曾俊杰,等. 拟态防御基础理论研究综述[J]. 中国工程科学, 2016,18(6):62-68.
[6] 石乐义,贾春福,吕述望. 基于端信息跳变的主动网络防护研究[J]. 通信学报, 2008,29(2):106-110.
[7] 石乐义,郭宏彬,温晓,等. 端信息跳扩混合的主动网络防御技术研究[J]. 通信学报, 2019,40(5):125-135.
[8] DUNLOP M, GROAT S, URBANSKI W, et al. MT6D: A moving target IPv6 defense[C]// Military Communications Conference. 2011:1321-1326.
[9] BELYAEV M, GAIVORONSKI S. Towards load balancing in SDN networks during DDoS-attacks[C]// IEEE International Science and Technology Conference (Modern Networking Technologies). 2014:1-6.
[10]黄俊飞,刘杰. 区块链技术研究综述[J]. 北京邮电大学学报, 2018,41(2):1-8.〖HJ1.18mm〗
[11]LUO Y B, WANG B S, WANG X F, et al. RPAH: Random port and address hopping for thwarting internal and external adversaries[C]// Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA. 2015,1:263-270.
[12]刘江,张红旗,代向东,等. 基于端信息自适应跳变的主动网络防御模型[J]. 电子与信息学报, 2015,37(11):2642-2649.
[13]KAMPANAKIS P, PERROS H, BEYENE T. SDN-based solutions for moving target defense network protection[C]// 2014 IEEE 15th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 2014:1-6.
[14]刘敖迪,杜学绘,王娜,等. 区块链技术及其在信息安全领域的研究进展[J]. 软件学报, 2018,29(7):2092-2115.
[15]CHEN P W, JIANG B S, WANG C H. Blockchain-based payment collection supervision system using pervasive bitcoin digital wallet[C]// 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). 2017:139-146.
[16]WANG H M,ZHENG Z B, XIE S A, et al. Blockchain challenges and opportunities: A survey [J]. International Journal of Web and Grid Services, 2018,14(4):352-375.
[17]JEON J H, KIM K H, KIM J H. Blockchain-based data security enhanced IoT server platform[C]// 2018 International Conference on Information Networking (ICOIN). 2018:941-944.
[18]祝烈煌,高峰,沈蒙,等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017,54(10):2170-2186.
[19]FROMKNECHT C, VELICANU D. A Decentralized Public Key Infrastructure with Identity Retention[R]. Massachusetts Institute of Technology, 2014.
[20]MAGDY Y, KASHKOUSH M S, AZAB M, et al. Anonymous blockchain based routing for moving-target defense across federated clouds[C]// 2020 IEEE 21st International Conference on High Performance Switching and Routing (HPSR). 2020:1-7.
[21]SHARPLES M, DOMINGUE J. The blockchain and Kudos: A distributed system for educational record, reputation and reward[C]// 2016 LNCS. 2016:490-496.
[22]ROUHANI S, DETERS R. Performance analysis of ethereum transactions in private blockchain[C]// 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS). 2017:70-74.
|