[1] |
GARTNER. Hype Cycle for Application Security,2022[R]. Stanford:GARTNER, 2022.
|
[2] |
中国信息通信研究院. 应用程序接口(API)数据安全研究报告(2020年)[R]. 北京: 中国信息通信研究院, 2020.
|
[3] |
GANNON D, BARGA R, SUNDARESAN N. Cloud-Native Applications[J]. IEEE Cloud Computing, 2017, 4(5):16-21.
|
[4] |
HUSSAIN F, NOYE B, SHARIEH S. Current State of API Security and Machine Learning[J]. IEEE Technology Policy and Ethics, 2019, 4(2):1-5.
|
[5] |
赵娟娟. 基于 OpenResty 的 API 防护系统的设计与实现[D]. 武汉: 武汉轻工大学, 2021.
|
[6] |
BAYE G, HUSSAIN F, ORACEVIC A, et al. API Security in Large Enterprises:Leveraging Machine Learning for Anomaly Detection[C]// 2021 International Symposium on Networks,Computers and Communications (ISNCC).Piscataway:IEEE, 2021:1-6.
|
[7] |
MARTIN-LOPEZ A. Ai-Driven Web API Testing[C]// Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering:Companion Proceedings.Piscataway:IEEE, 2020:202-205.
|
[8] |
DÍAZ-ROJAS J A, OCHARÁN-HERNÁNDEZ J O, PÉREZ-ARRIAGA J C, et al. Web API Security Vulnerabilities and Mitigation Mechanisms:A Systematic Mapping Study[C]// 2021 9th International Conference in Software Engineering Research and Innovation (CONISOFT).Piscataway:IEEE, 2021:207-218.
|
[9] |
WEIR C, HERMANN B, FAHL S. From Needs to Actions to Secure Apps? The Effect of Requirementsand Developer Practices on App Security[C]// 29th USENIX Security Symposium (USENIX Security 20).Berkeley:USENIX, 2020:289-305.
|
[10] |
GORSKI P L, IACONO L L, WERMKE D. Developers Deserve Security Warnings,Too:On the Effect of Integrated Security Advice on Cryptographic API Misuse[C]// Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). New York: ACM, 2018.265-281.
|
[11] |
OLIVEIRA D S, LIN T, RAHMAN M S. API Blindspots:Why Experienced Developers Write Vulnerable Code[C]// Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). New York: ACM, 2018:315-328.
|
[12] |
IMRAN A, FARRUKH H, IBRAHIM M, et al. {SARA}:Secure Android Remote Authorization[C]// 31st USENIX Security Symposium (USENIX Security 22).Berkeley:USENIX, 2022:1561-1578.
|
[13] |
BREWER E A. Kubernetes and the Path to Cloud Native[C]// Proceedings of the Sixth ACM Symposium on Cloud Computing. New York: ACM, 2015:167.
|
[14] |
HENDRICKSON S, STURDEVANT S, HARTER T, et al. Serverless Computation with OpenLambda[C]// 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16).Berkeley:USENIX, 2016:33-39.
|
[15] |
MUHAMMAD A B, ZORAN P. Guidelines for Building A Private Cloud Infrastructure (2012)[R/OL].[2012-12-31]. https://pure.itu.dk/da/publications/guidelines-for-building-a-private-cloud-infrastructure.
|
[16] |
申京, 吴晨光, 郝洋, 等. 面向云计算数据中心的弹性资源调整方法[J]. 南京理工大学学报(自然科学版), 2015, 1:89-93.
|
|
SHEN Jing, WU Chenguang, HAO Yang, et al. Elastic Resource Adjustment Method for Cloud Computing Data Center[J]. Journal of Nanjing University of Technology(Natural Science Edition), 2015, 1:89-93.
|
[17] |
CHANDRAMOULI R, BUTCHER Z. Building Secure Microservices-Based Applications Using Service-mesh Architecture[J]. NIST Special Publication 800, 2020:204A.
|
[18] |
陈真, 乞文超, 贺鹏飞, 等. 云应用程序编程接口安全研究综述:威胁与防护[J]. 电子与信息学报, 2022, 44:1-12.
|
|
CHEN Zhen, QI Wenchao, HE Pengfei, et al. Overview of Cloud Application Programming Interface Security Research:Threats And Protection[J]. Journal of Electronics and Information, 2022, 44:1-12.
|
[19] |
TANG L, OUYANG L, TSAI W T. Multi-Factor Web API Security for Securing Mobile Cloud[C]// 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).Piscataway:IEEE, 2015:2163-2168.
|
[20] |
LI C, WANG L, JI S, et al. Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era (2022)[J/OL].[2022-02-22]. https://arxiv.org/abs/2202.10673.
|
[21] |
李华东, 张学亮, 王晓磊, 等. Kubernetes集群中多节点合作博弈负载均衡策略[J]. 西安电子科技大学学报, 2021, 48(6):16-22.
|
|
LI Huadong, ZHANG Xueliang, WANG Xiaolei, et al. Multi-Node Cooperative Game Load Balancing Strategy in Kubernetes Cluster[J]. Journal of Xidian University, 2021, 48(6):16-22.
|
[22] |
贾召鹏, 方滨兴, 崔翔, 等. ArkHoney:基于协同机制的Web蜜罐[J]. 计算机学报, 2018, 41(2):413-425.
|
|
JIA Shaopeng, FANG Binxing, CUI Xiang, et al. ArkHoney:Web Honeypot Based on Collaboration Mechanism[J]. Journal of Computer Science, 2018, 41(2):413-425.
|