Reference: [1]He Yingru. Research on active security defense system of campus network based on honeypot technology [J]. Computer fans, 2016, 12 (4): 21-22. [2]Zhu Chaojun, Zhao Dandan. A Packet Allocation Protection Method for Network Attack Crime Prevention [J]. Science and Technology Bulletin, 2016, 32 (8): 203-206. [3]Dong Xiquan, Lin Li, Zhang Xiaojun, et al. Application of Active Defense Technology in Communication Network Security Engineering [J]. Information Security and Technology, 2016, 7 (1): 80-84. [4]Pujiang, Li Li. Research on network security early warning and defense system based on three-domain model [J]. Information security and technology, 2017, 8 (8): 68-72. [5]Jiang Shuai, Luo Tianxin. Research on detection method of network small disturbance intrusion source location under non-uniform noise environment [J]. Science and Technology and Engineering, 2017, 17 (5): 247-251. [6]Pan Weiwei, Tao Hua. Research on Simulation of attack signal location and recognition in wireless communication networks [J]. Computer simulation, 2016, 33 (11): 320-323. [7]He Chun. Design of Computer Network Security Active Defense Model in Big Data Era [J]. Journal of Ningbo Vocational and Technical College, 2016, 20 (4): 97-99. [8]Zhang Di. Research on the Current Situation and Defense Measures of Network Security Management in Colleges and Universities [J].Electronic Technology and Software Engineering, 2016,56(13): 221-221. [9]Yu Shuke. Research on Target Intrusion Detection Based on Mobile Wireless Sensor Networks [J]. Digital Communication World, 2017, 59 (12): 6-8. [10]Qu Chaocheng, Qi Jianhong. Network Security Defense Model of Metal Trading Based on Attack Detection [J]. World Nonferrous Metals, 2016, 23 (7): 77-78. [11]Huang Ruicheng, HUANGRui-cheng. Simulation Research on Privacy Information Protection of Network Users [J].Computer Simulation, 2017,51(11): 319-322+423. [12]Diao Zhenjun, Zhang Qi, Cao Zijian. Research on Network Anomaly Detection and Defense System Integrating Snort and Agent [J]. Electronic Design Engineering, 2018, 26 (1): 43-47.
|