Citation: | GUO Wei, ZHANG Fan, WU Zhaoqi, et al. “Confidence Skewing Problem and Its Correction Method in Mimic Arbitration Mechanism”. Chinese Journal of Electronics, vol. 29 no. 3. doi: 10.1049/cje.2020.03.010 |
National Science and Technology Council, “Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program”, accessed on: Dec.2011. Available: https://www.nitrd.gov/SUBCOMMITTEE/csia/ed_Cybersecurity_RD_Strategic_Plan_2011.pdf.
|
H. Okhravi, A Comella, E Robinson, et al., “Creating a cyber moving target for critical infrastructure applications”, International Conference on Critical Infrastructure Protection, Springer, Berlin, Germany, pp.107-123, 2011.
|
J.X. Wu, “Meaning and vision of mimic computing and mimic security defense”, Telecommunications Science, Vol.30, No.7, pp.17, 2014. (in Chinese)
|
T. Hobson, H. Okhravi, D. Bigelow, et al., “On the challenges of effective movement”, Proc. of ACM Workshop Moving Target Defense, Scottsdale, Arizona, USA, pp.41-50, 2014.
|
D. Evtyushkin, D. Ponomarev and N. Abu-Ghazaleh, “Jump over ASLR: Attacking branch predictors to bypass ASLR”, Proc. of IEEE/ACM MICRO, Taipei, China Taiwan, pp.1-13, 2016.
|
K. Z. Snow, F Monrose, L Davi, et al., “Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization”, Proc. of IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp.574-588, 2013.
|
J.X. Wu, “Research on cyber mimic defense”, Journal of Cyber Security, Vol.1, No.4, pp.1-10, 2016. (in Chinese)
|
S.X. Chen, A.B. Wu, S.J. Qi, et al., “Analysis of resource defense model for novel active defense modeling”, Acta Electronica Sinica, Vol.47, No.7, pp.1557-1565, 2019. (in Chinese)
|
B. Parhami, “Voting algorithms”, IEEE Transactions on Reliability, Vol.43, No.4, pp.617-629, 1994
|
G. Latif-Shabgahi, J. M. Bass and S. Bennett, “A taxonomy for software voting algorithms used in safety-critical systems”, IEEE Transactions on Reliability, Vol.53, No.3, pp.319-328, 2004.
|
C. Qi, J.X. Wu, H.C Hu, et al., “An intensive security architecture with multi-controller for SDN”, Proc. of IEEE INFOCOM WKSHPS, San Francisco, CA, USA, pp.401-402, 2016.
|
H.C. Hu, Z.P. Wang, G.Z. Cheng,et al., “MNOS: A mimic network operating system for software defined networks”, IET Information Security, Vol.11, No.6, pp.345-355, 2017.
|
Q. Tong, Z. Zhang, W.H. Zhang, et al., “Design and implementation of mimic defense web server”, Journal of Software, Vol.28, No.4, pp.883-897, 2017. (in Chinese)
|
Y.W. Wang, J.X. Wu, Y.F. Guo, et al., “Scientific workflow execution system based on mimic defense in the cloud environment”, Frontiers of Information Technology and Electronic Engineering, Vol.19, No.12, pp.1522-1536, 2018.
|
H.C. Hu, J.X. Wu, Z.P. Wang, et al., “Mimic defense: a designed-in cybersecurity defense framework”, IET Information Security, Vol.12, No.3, pp.226-237, 2018.
|
Z.P. Wang, H.C. Hu and G.Z. Cheng, “A DNS architecture based on mimic security defense”, Acta Electronica Sinica, Vol.45, No.11, pp.2705-2714, 2017. (in Chinese)
|
B. Li, Q. Zhou, X.M. Si, et al., “Mimic encryption system for network security”, IEEE Access, Vol.6, pp.50468-50487, 2018.
|
H. He, Y.H. TAN, “A Novel Adaptive Wavelet Thresholding with Identical Correlation Shrinkage Function for ECG Noise Removal”, Chinese Journal of Electronics, Vol.27, No.3, pp.507-513, 2018.
|
X.Y. Ye, L.M. Tao and R.H. Sa, “An outdoor small target tracking method based on duo temporal scale motion analysis”, Acta Electronica Sinica, Vol.43, No.7, pp.1257-1265, 2015. (in Chinese)
|
H.W. Huo, M.G. Ye and D.P. Gao, “A memory-efficient multi-dimensional hardware-specific algorithm for packet classification”, Chinese Journal of Electronics, Vol.19, No.4, pp.634-636, 2010.
|
S.L. Wang, H.H. Chi, Z.Q. Yuan, et al., “Emotion recognition using cloud model”, Chinese Journal of Electronics, Vol.28, No.3, pp.470-474, 2019.
|
K. Shvachko, H. Kuang, S. Radia, et al., “The hadoop distributed file system”, MSST, Vol.10, pp.1-10, 2010.
|
F. Bellifemine, F. Bergenti, G. Caire, et al., “Jade a Java agent development framework”, Multi-Agent Programming, Springer, Boston, MA, USA, pp.125-147, 2005.
|