中小型企业网络安全方案的设计
[1] 金俊才,许超超. 企业级服务器虚拟化性能评估方法[J]. 计算机系统应用, 2015,24(7):1-7. (JIN Juncai,XU Chaochao. Performance evaluation of the enterprise-level virtualization[J]. Computer Systems Applications, 2015,24(7):1-7.)
[2] 朱建明,宋彪,黄启发. 基于系统动力学的网络安全攻防演化博弈模型[J]. 通信学报, 2014,35(1):54-61. (ZHU Jianming, SONG Biao,HUANG Qifa. Evolution game model of offense-defense for network security based on system dynamics[J]. Journal on Communications, 2014,35(1):54-61.)
[3] 文志诚,陈志刚,唐军. 基于时间序列分析的网络安全态势预测[J]. 华南理工大学学报(自然科学版), 2016,44(5):137-143. (WEN Zhicheng,CHEN Zhigang,TANG Jun. Prediction of network security situation on the basis of time series analysis[J]. Journal of South China University of Technology(Natural Science Edition), 2016,44(5):137-143.)
[4] 周诚,李伟伟,莫璇. 一种网络安全脆弱性评估方法[J]. 江苏大学学报(自然科学版), 2017,38(1):68-77. (ZHOU Cheng, LI Weiwei,MO Xuan. A assessment method of network security vulnerability[J]. Journal of Jiangsu University(Natural Science Edition), 2017,38(1):68-77.)
[5] 王栋,陈传鹏,颜佳. 新一代电力信息网络安全架构的思考[J]. 电力系统自动化, 2016,40(2):6-11. (WANG Dong,CHEN Chuanpeng,YAN Jia. Pondering a new-generation security architecture model for power information network[J]. Automation of Electric Power Systems, 2016,40(2):6-11.)
[7] 黄雁,邓元望,王志强. 可入侵检测的移动Ad Hoc网络安全综合评价[J]. 中南大学学报(自然科学版), 2016,47(9):3031-3039. (HUANG Yan,DENG Yuanwang,WANG Zhiqiang. Comprehensive evaluation of security of mobile ad hoc network with intrusion detection[J]. Journal of Central South University(Natural Science Edition), 2016,47(9):3031-3039.)
[8] 陈兴蜀,曾雪梅,王文贤. 基于大数据的网络安全与情报分析[J]. 工程科学与技术, 2017,49(3):1-11. (CHEN Xingshu, ZENG Xuemei,WANG Wenxian. Big data analytics for network security and intelligence[J]. Advanced Engineering Sciences, 2017,49(3):1-11.)
[9] 赵冬梅,李红. 基于并行约简的网络安全态势要素提取方法[J]. 计算机应用, 2017,37(4):1008-1013. (ZHAO Dongmei, LI Hong. Approach to network security situational element extraction based on parallel reduction[J]. Computer Systems Applications, 2017,37(4):1008-1013.)
[10] 孙琳,潘登,刘荻. 基于预约诊疗模式下的医院网络安全设计[J]. 现代电子技术, 2017,40(3):82-84. (SUN Lin,PAN Deng, LIU Di. Design of hospital network security based on reservation and treatment mode[J]. Modern Electronics Technique, 2017,40(3):82-84.)
[12] 杨乐. 分散控制系统信息安全方案探讨[J]. 石油化工自动化, 2017,53(3):1-4. (YANG Le. Discussion on information security design of distributed control system[J]. Automtion in Petro-Chemical Industry, 2017,53(3):1-4.)
[13] 蒋笑冰. 铁路移动办公系统安全防护方案的研究[J]. 铁路计算机应用, 2015,24(9):22-26. (JIANG Xiaobing. Security protection scheme for railway mobile office automation system[J]. Railway Computer Application, 2015,24(9):22-26.)
[14] 张爱玲. 移动运营商网络安全管理平台架构分析与探索[J]. 科技通报, 2017,33(2):90-94. (ZHANG Ailing. Mobile operator's network security management platform architecture analysis and exploration[J]. Bulletin of Science and Technology, 2017,33(2):90-94.)
[15] 何雪海,黄明浩,宋飞. 网络安全用户行为画像方案设计[J]. 通信技术, 2017,50(4):789-794. (HE Xuehai,HUANG Minghao, SONG Fei. User behavior profiling scheme for network security[J]. Communications Technology, 2017,50(4):789-794.)
[16] 罗福强,李瑶,范展源. 灾害与突发事件ICU大数据平台的安全设计[J]. 计算机技术与发展, 2016,26(10):69-72. (LUO Fuqiang,LI Yao,FAN Zhanyuan. Safety design of ICU big data platform for disaster and sudden event[J]. Computer Technology and Development, 2016,26(10):69-72.)
屈正庚, 吕鹏. 中小型企业网络安全方案的设计[J]. 太赫兹科学与电子信息学报, 2019, 17(1): 158. QU Zhenggeng, LYU Peng. Network security scheme design for small and medium-sized enterprises[J]. Journal of terahertz science and electronic information technology, 2019, 17(1): 158.