2018 Vol.1 Oct. No.5 |
---|
|
Reference: [1] high Kunlun, Wang Zhihao, Anning Yu, et al. Construction of network security immune system [J]. Engineering Science and technology for power monitoring and control system based on trusted computing technology, 2017, 49 (2): 28-35. [2] Tong Qing, Zhang Zheng, Wu Jiang Xing. [J]. Information Security Journal Based on the diversity of hardware and software, 2017, 2 (1): 1-12. [3]. Intrusion detection research and Implementation Based on pattern recognition method, [J]. Hubei mechanization, 2017, 12 (6): 61-61. [4] pottery. Network security active defense technology and application [J]. network security Technology and application, 2017, 56 (5): 28-28. [5] high Kunlun, Wang Zhihao, Anning Yu, et al. Based on trusted computing technology, the network security immune system of power monitoring and control system [J]. Engineering Science and technology, 2017, 49 (2): 28-35. [6] Li Xiujuan. Analysis of the design and implementation of network active defense system, [J]. electronic design engineering, 2017, 25 (1): 27-30. [7] Wang Zhenpeng, Hu Hongchao, Cheng Guozhen, et al. The architecture of mimic defense under the software definition network architecture [J]. network and Information Security Journal, 2017, 3 (10): 52-61. [8] Su Shi Xin, Zhu Zhixiang. Design and implementation of embedded active defense system based on honeypot. Internet of things technology, 2017, 7 (7): 86-88. [9], Anning Yu, Wang Zhi Hao, Zhao Baohua. Research and application of trusted computing technology in power systems [J]. information security research, 2017, 3 (4): 353-358. [10] Chen Jian. Mobile network optimization design for effective intrusion prevention design of intrusion signals [J]. computer simulation, 2017, 34 (7): 277-280. |
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16