《工程(英文)》 >> 2018年 第4卷 第1期 doi: 10.1016/j.eng.2018.01.003
构建新型网络空间安全生态体系 实现从网络大国走向网络强国
a Science and Technology on Communication Information Security Control Laboratory, Jiaxing, Zhejiang 314033, China
b Science and Technology on Electro-Optical Information Security Control Laboratory, Tianjin 300300, China
下一篇 上一篇
摘要
参考文献
[ 1 ] Applegate SD. The principle of maneuver in cyber operations. In: Czosseck C, Ottis R, Ziolkowski K, editors. 2012 4th International conference on cyber conflict: proceedings; 2012 Jun 5–8; Tallinn, Estonia. Tallinn: NATO CCD COE Publications; 2012. p. 1–13. 链接1
[ 2 ] Office of the US Air Force Chief Scientist. Cyber vision 2025: United States air force cyberspace science & technology vision 2012–2015. Report. Washington, DC: US Department of the Air Force; 2012 Dec. Report No.: 2012–0439/460/ 715.
[ 3 ] Cyber Priorities Steering Council. Cyber S&T priority steering council research roadmap. Washington, DC: US Department of Defense; 2011 Nov. 链接1
[ 4 ] Desk N. Cyber maneuvering and morphing—Are defense networks on course to ‘‘self awareness”? [Internet]. Qadima: Defense Update; c2002–2017 [updated 2012 Jul 21; cited 2017 Jul 26]. Available from: http://defense-update.com/ 20120721_raytheon-to-develop-cyber-maneuver-technology-for-us-army. html.
[ 5 ] Marlborough M. Raytheon to develop cyber maneuver technology for US Army: Proactive cyber approach to improve network defense in high-threat environments [Internet]. Waltham: Raytheon Company; c2015 [updated 2012 Jul 16; cited 2017 Jul 26]. Available from: http://raytheon.mediaroom.com/ index.php?s=43&item=2136.
[ 6 ] US Department of Homeland Security. Blueprint for a secure cyber future: the cybersecurity strategy for the homeland security enterprise. Washington, DC: US Department of Homeland Security; 2011 Sep.
[ 7 ] Reitinger P. Enabling distributed security in cyberspace: building a healthy and resilient cyber ecosystem with automated collective action. Washington, DC: US Department of Homeland Security; 2011.
[ 8 ] Dombroski MJ, Carley KM. NETEST: estimating a terrorist network’s structure— Graduate Student Best Paper Award, CASOS 2002 Conference. Comput Math Organ Theory 2002;8(3):235–41. 链接1
[ 9 ] Beraud P, Cruz A, Hassell S, Meadows S. Using cyber maneuver to improve network resiliency. In: Proceedings of the 2011 Military Communications 52 X.-N. Yang et al. / Engineering 4 (2018) 47–52 Conference; 2011 Nov 7–10; Baltimore, MD, USA. Piscataway: Institute of Electrical and Electronics Engineers; 2011. p. 1121–6. 链接1
[10] Defense Advanced Research Projects Agency. Clean-slate design of resilient, adaptive, secure hosts (CRASH): Broad agency announcement [Internet]. Arlington: Defense Advanced Research Projects Agency; 2010 Jun [updated 2010 Jun 1; cited 2017 Jul 26]. Available from: https://www.fbo.gov/index?s= opportunity&mode=form &id= 4022d960a15e87bcaf0fb70101ab53b8&tab = core&_cview=1. 链接1
[11] Tansley AG. The use and abuse of vegetational concepts and terms. Ecology 1935;16(3):284–307. 链接1