相似文献/References:
[1]许显月 张凤斌.基于两级重定向机制的密网研究和设计[J].计算机技术与发展,2009,(05):158.
XU Xian-yue,ZHANG Feng-bin.Research and Design about Honeynet Based on Two- level Redirect Mechanism[J].,2009,(10):158.
[2]李菲 乔佩利.网络深层防御体系模型的研究和实现[J].计算机技术与发展,2008,(02):159.
LI Fei,QIAO Pei-li.Research and Implementation of Network Defense In- Depth System Model[J].,2008,(10):159.
[3]胡建华,刘鑫朝,李辉.基于. NET的动态实时曲线的绘制方法[J].计算机技术与发展,2013,(03):179.
HU Jian-hua,LIU Xin-chao,LI Hui.Method of Dynamic Real-time Curve Drawing Based on . Net[J].,2013,(10):179.
[4]焦宏宇,何利文,黄俊.基于蜜场的 Openstack 安全系统[J].计算机技术与发展,2018,28(10):92.[doi:10.3969/ j. issn.1673-629X.2018.10.019]
JIAO Hong-yu,HE Li-wen,HUANG Jun.Openstack Security System Based on Honeyfarm[J].,2018,28(10):92.[doi:10.3969/ j. issn.1673-629X.2018.10.019]
[5]刘知竹,冯璐,荀鹏,等.基于分散化序列的联网 ICS 设备搜索技术[J].计算机技术与发展,2018,28(11):1.[doi:10.3969/ j.issn.1673-629X.2018.11.001]
LIU Zhi-zhu,FENG Lu,XUN Peng,et al.Networked ICS Device Search Technique Based on Dispersed Sequence[J].,2018,28(10):1.[doi:10.3969/ j.issn.1673-629X.2018.11.001]
[6]李 阳,赵俊楠,石乐义.基于演化博弈的蜜罐有效性机理证明[J].计算机技术与发展,2020,30(04):105.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 020]
LI Yang,ZHAO Jun-nan,SHI Le-yi.Proof of Honeypot Effectiveness Mechanism Based on Evolutionary Game Theory[J].,2020,30(10):105.[doi:10. 3969 / j. issn. 1673-629X. 2020. 04. 020]
[7]刘 俊,陈 慧,王 军.基于区块链的 ICS 数据安全策略研究[J].计算机技术与发展,2021,31(01):149.[doi:10. 3969 / j. issn. 1673-629X. 2021. 01. 027]
LIU Jun,CHEN Hui,WANG Jun.Research on Data Security Strategy of ICS Based on Blockchain[J].,2021,31(10):149.[doi:10. 3969 / j. issn. 1673-629X. 2021. 01. 027]
[8]高雅卓,刘亚群,邢长友,等.面向网络欺骗防御的攻击诱捕技术研究[J].计算机技术与发展,2022,32(03):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 03. 019]
GAO Ya-zhuo,LIU Ya-qun,XING Chang-you,et al.Research on Network Deception Defense Oriented AttackTrapping Technology[J].,2022,32(10):114.[doi:10. 3969 / j. issn. 1673-629X. 2022. 03. 019]
[9]赵东东,石乐义,谢云飞.基于 CP-ABE 的工业控制系统加密传输方案[J].计算机技术与发展,2022,32(10):94.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 016]
ZHAO Dong-dong,SHI Le-yi,XIE Yun-fei.Encrypted Transmission Scheme of Industrial Control System Based on CP-ABE[J].,2022,32(10):94.[doi:10. 3969 / j. issn. 1673-629X. 2022. 10. 016]
[10]韩子彬.选煤厂工控网络安全实验分析[J].计算机技术与发展,2022,32(S2):162.[doi:10. 3969 / j. issn. 1673-629X. 2022. S2. 029]
HAN Zi-bin.Experimental Analysis of Industrial Control Network Security in Coal Preparation Plant[J].,2022,32(10):162.[doi:10. 3969 / j. issn. 1673-629X. 2022. S2. 029]