[1] |
LI J Q, YU F R, DENG G, et al. Industrial Internet:A Survey on the Enabling Technologies,Applications,and Challenges[J]. IEEE Communications Surveys & Tutorials, 2017, 19(3):1504-1526.
|
[2] |
刘奇旭, 陈艳辉, 尼杰硕, 等. 基于机器学习的工业互联网入侵检测综述[J]. 计算机研究与发展, 2022, 59(5):994-1014.
|
|
LIU Qixu, CHEN Yanhui, NI Jieshuo, et al. Survey of Machine Learning-Based Intrusion Detection in Industrial Internet[J]. Journal of Computer Research and Development, 2022, 59(5):994-1014.
|
[3] |
杨秀璋, 彭国军, 李子川, 等. 基于Bert和BiLSTM-CRF的APT攻击实体识别及对齐研究[J]. 通信学报, 2022, 43(6):58-70.
doi: 10.11959/j.issn.1000-436x.2022116
|
|
YANG Xiuzhang, PENG Guojun, LI Zichuan, et al. APT Attack Entity Recognition and Alignment Research Based on Bert and BiLSTM-CRF[J]. Journal of Communications, 2022, 43(6):58-70.
doi: 10.11959/j.issn.1000-436x.2022116
|
[4] |
SHANG L, GUO D, JI Y, et al. Discovering Unknown Advanced Persistent Threat Using Shared Features Mined by Neural Networks[J]. Computer Networks, 2021, 189:107937.
doi: 10.1016/j.comnet.2021.107937
|
[5] |
CHO D X, MAI D H. A Novel Approach for APT Attack Detection Based on Combined Deep Learning Model[J]. Neural Computing and Applications, 2021, 33(20):13251-13264.
doi: 10.1007/s00521-021-05952-5
|
[6] |
ABDULLAYEVA F J. Advanced Persistent Threat Attack Detection Method in Cloud Computing Based on Autoencoder and Softmax Regression Algorithm[J]. Array, 2021, 10:100067.
doi: 10.1016/j.array.2021.100067
|
[7] |
GILMAN E, BARTH D. Zero Trust Networks:Building Security System in Untrusted Network[M]. Beijing: Posts and Telecommunications Press, 2019:1-2.
|
[8] |
NIST Special Publication 800-207. Zero Trust Architecture(2020)[R/OL].[2020-08-16].https://doi.org/10.6028/NIST.SP.800-207.
|
[9] |
CHEN B, QIAO S, ZHAO J, et al. A Security Awareness and Protection System for 5G Smart Healthcare Based on Zero-Trust Architecture[J]. IEEE Internet of Things Journal, 2020, 8(13):10248-10263.
doi: 10.1109/JIOT.2020.3041042
|
[10] |
ZHANG X, CHEN L, FAN J, et al. Power IoT Security Protection Architecture Based on Zero Trust Framework[C]// 2021 IEEE 5th International Conference on Cryptography,Security and Privacy (CSP).Piscataway:IEEE, 2021:166-170.
|
[11] |
MALIHA S, AFRIDA H, FABIHA L, et al. Towards Developing a Secure Medical Image Sharing System Based on Zero Trust Principles and Blockchain Technology[J]. BMC Medical Informatics and Decision Making, 2020, 20(1):1-10.
doi: 10.1186/s12911-019-1002-x
|
[12] |
滕金保, 孔韦韦, 田乔鑫, 等. 基于CNN和LSTM的多通道注意力机制文本分类模型[J]. 计算机工程与应用, 2021, 57(23):154-162.
doi: 10.3778/j.issn.1002-8331.2104-0212
|
|
TENG Jinbao, KONG Weiwei, TIAN Qiaoxin, et al. Multi-Channel Attention Mechanism Text Classification Model Based on CNN and LSTM[J]. Computer Engineering and Applications, 2021, 57(23):154-162.
doi: 10.3778/j.issn.1002-8331.2104-0212
|
[13] |
XIE J, YU F R, HUANG T, et al. A Survey on the Scalability of Blockchain Systems[J]. IEEE Network, 2019, 33(5):166-173.
doi: 10.1109/MNET.001.1800290
|
[14] |
MENG T, ZHAO Y, WOLTER K, et al. On Consortium Blockchain Consistency:A Queueing Network Model Approach[J]. IEEE Transactions on Parallel and Distributed Systems, 2021, 32(6):1369-1382.
doi: 10.1109/TPDS.71
|
[15] |
NAKAMOTO S. Bitcoin:A Peer-to-Peer Electronic Cash System[J]. Decentralized Business Review, 2008:21260.
|
[16] |
何国锋. 零信任安全架构在5G云网中应用防护的研究[J]. 电信科学, 2020, 36(12):123-132.
doi: 10.11959/j.issn.1000-0801.2020325
|
|
HE Guofeng. Research on Application Protection of Zero Trust Security Architecture in 5G Cloud Network[J]. Telecommunication Science, 2020, 36(12):123-132.
doi: 10.11959/j.issn.1000-0801.2020325
|
[17] |
于洁潇, 于丽莹, 杨挺. 基于区块链的电力物联终端信任共识方法[J]. 电力系统自动化, 2021, 45(17):1-10.
|
|
YU Jiexiao, YU Liying, YANG Ting. Blockchain-Based Terminal Trust Consensus Method for Power Things[J]. Automation of Electric Power Systems, 2021, 45(17):1-10.
|
[18] |
JOSANG A, ISMAIL R. The beta reputation system[C]// Proceedings of the 15th Bled electronic commerce conference. Bled: Bled electronic commerce conference, 2002:2502-2511.
|
[19] |
亓法欣, 童向荣, 于雷. 基于强化学习DQN的智能体信任增强[J]. 计算机研究与发展, 2020, 57(6):1227-1238.
|
|
QI Faxin, TONG Xiangrong, YU Lei. Agent Trust Enhancement Based on Reinforcement learning DQN[J]. Journal of Computer Research and Development, 2020, 57(6):1227-1238.
|
[20] |
谢丽霞, 魏瑞炘. 一种面向物联网节点的综合信任度评估模型[J]. 西安电子科技大学学报, 2019, 46(4):58-65.
|
|
XIE Lixia, WEI Ruixin. Comprehensive Trust Evaluation Model for Internet of Things Nodes[J]. Journal of Xidian University, 2019, 46(4):58-65.
|
[21] |
GLASSER J, LINDAUER B. Bridging the Gap:A Pragmatic Approach to Generating Insider Threat Data[C]// 2013 IEEE Security and Privacy Workshops.Piscataway:IEEE, 2013:98-104.
|
[22] |
杨宏宇, 曾仁韵. 一种深度学习的网络安全态势评估方法[J]. 西安电子科技大学学报, 2021, 48(1):83-190.
|
|
YANG Hongyu, ZENG Renyun. Network Security Situation Assessment Method Based on Deep Learning[J]. Journal of Xidian University, 2021, 48(1):83-190.
|