期刊文献+

计算机软件开发中主动防御技术的应用实践

The application practice of active defense technology in computer software development
下载PDF
导出
摘要 为了提高软件开发的稳定性、安全性,可以充分利用主动防御技术。针对软件的实际情况,确定需要服务的应用程序。通过将主动防御技术运用在计算机软件开发中,起到了良好的防御作用,软件的使用也更加安全。文章对主动防御技术的应用进行了分析,为计算机软件开发提供一些参考依据。 In order to improve the stability and security of software development,we can make full use of active defense technology.Identify the applications that need services based on the actual situation of the software.Through the application of active defense technology in computer software development,it plays a good defense role,and the use of software is more secure.This paper analyzes the application of active defense technology and provides some references for the development of computer software.
作者 曾俊义 ZENG Junyi(Huizhou City Vocational College,Huizhou Guangdong 516000,China)
出处 《智能计算机与应用》 2020年第5期228-230,共3页 Intelligent Computer and Applications
关键词 计算机 软件 开发 主动防御技术 Computer Software Development Active defense technology
  • 相关文献

参考文献4

二级参考文献42

  • 1丁杰,高会生,俞晓雯.主动防御新技术及其在电力信息网络安全中的应用[J].电力系统通信,2004,25(8):42-45. 被引量:15
  • 2李飒,毕于深,吕猛,陈建弟.一种基于诱捕型入侵防护的主动式网络安全系统[J].计算机与数字工程,2005,33(12):95-98. 被引量:1
  • 3王慧强,赖积保,朱亮,梁颖.网络态势感知系统研究综述[J].计算机科学,2006,33(10):5-10. 被引量:126
  • 4张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 5Afrand Agah, Das Sajal K. Preventing DoS attacks in wireless sensor networks: A repeated game theory approach [J]. International Journal of Network Security, 2007, 5(2): 145-153.
  • 6Hadi O, Mona M, Chadi A, et al. Game theoretic models for detecting network intrusions [J]. Computer Communications, 2008, 31(10): 1934-1944.
  • 7Liu Yu, Cristian C, Hong Man. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C/OL] // ProcofValuetools's06. 2006= 11-13 E2010 03 08]. http:// citeseerx, ist. psu. edu/viewdoc/summary?doi= 10. 1.1.86. 8169.
  • 8Theodorakopoulos G, Baras J S. Game theoretic modeling of malicious users in collaborative networks [J]. IEEE Journal on Selected Areas in Communications, 2008, 26(7): 1317- 1327.
  • 9Kotenko I. Multi-agent modelling and simulation of cyber attacks and cyber-defense for homeland security [J].Information & Automation, 2007, 11(8): 614-619.
  • 10Chen Y, Boehm B, Sheppard L. Value driven security threat modeling based on attack path analysis [C] ]/Proc of the 40th Annual Hawaii Int Conf on System Sciences. Los Alamitos, CA:IEEE Computer Society, 2007.

共引文献135

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部