涌现视角下的网络空间安全挑战(16)

来源:系统科学学报 【在线投稿】 栏目:期刊导读 时间:2021-07-30
作者:网站采编
关键词:
摘要:[49] Newman M E J. The structure and function of complex networks[J]. SIAM Review, 2003, 45(2): 167-256 [50] Boccaletti S, Latora V, Moreno Y, et al. Complex networks: Structure and dynamics[J]. Physi

[49] Newman M E J. The structure and function of complex networks[J]. SIAM Review, 2003, 45(2): 167-256

[50] Boccaletti S, Latora V, Moreno Y, et al. Complex networks: Structure and dynamics[J]. Physics Reports, 2006, 424(4/5): 175-308

[51] Husted N, Myers S. Mobile location tracking in metro areas: Malnets and others[C] //Proc of the 17th ACM Conf on Computer and Communications Security. New York: ACM, 2010: 85-96

[52] Shashidhar N, Kari C, Verma R. The efficacy of epidemic algorithms on detecting node replicas in wireless sensor networks[J]. Journal of Sensor and Actuator Networks, 2015, 4(4): 378-409

[53] Huang Shuang, Zhou Chunjie, Yang Shuanghua, et al. Cyber-physical system security for networked industrial processes[J]. International Journal of Automation and Computing, 2015, 12(6): 567-578

[54] Royce W W. Managing the development of large software systems: Concepts and techniques[C] //Proc of the 9th Int Conf on Software Engineering. Piscataway, NJ: IEEE, 1987: 328-338

[55] Holland J H. Hidden Order: How Adaptation Builds Complexity[M]. Cambridge, MA: MIT Press. 1995

[56] Mantel H. On the composition of secure systems[C] //Proc of 2002 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2002: 88-101

[57] Waldrop M M. Complexity: The Emerging Science at the Edge of Order and Chaos[M]. New York: Simon and Schuster, 1993

[58] Xu Shouhuai. Emergent behavior in cybersecurity[J]. arXiv preprint arXiv:1502. 05102, 2015

[59] Simon H A. The Sciences of the Artificial[M]. 3rd ed. Cambridge, MA: MIT Press, 1996

[60] Jin Shiyao, Huang Hongbing, Fan Gaojun. Emergence-oriented research on multi-agent systems and its state of arts[J]. Chinese Journal of Computers, 2008, 31(6): 881-895 (in Chinese)

(金士尧, 黄红兵, 范高俊. 面向涌现的多Agent系统研究及其进展[J]. 计算机学报, 2008, 31(6): 881-895)

[61] Fromm J. Ten questions about emergence[J]. arXiv preprint nlin/0, 2005

[62] Fromm J. Types and forms of emergence[J]. arXiv preprint nlin/0, 2005

[63] Holland J H. Emergence: From Chaos to Order[M]. Oxford, UK: OXFORD University Press, 2000

[64] Auyang S Y. Foundations of Complex-system Theories: In Economics, Evolutionary Biology, and Statistical Physics[M]. Cambridge, UK: Cambridge University Press, 1998

[65] Fromm J. On engineering and emergence[J]. arXiv preprint nlin/0, 2006

[66] Pras A, Sperotto A, Moura G C M, et al. Attacks by “anonymous” wikileaks proponents not anonymous, TR-CTIT-10-41[R]. Enschede, Netherlands: Design and Analysis of Communication Systems Group (DACS), 2010

[67] Kolias C, Kambourakis G, Stavrou A, et al. DDoS in the IoT: Mirai and other botnets[J]. Computer, 2017, 50(7): 80-84

[68] Douligeris C, Mitrokotsa A. DDoS attacks and defense mechanisms: Classification and state-of-the-art[J]. Computer Networks, 2004, 44(5): 643-666

[69] Fleizach C, Liljenstam M, Johansson P, et al. Can you infect me now: Malware propagation in mobile phone networks[C] //Proc of the 5th ACM Workshop on Recurring Malcode. New York: ACM, 2007: 61-68

[70] La Polla M, Martinelli F, Sgandurra D. A survey on security for mobile devices[J]. IEEE Communications Surveys & Tutorials, 2013, 15(1): 446-471

[71] Zhang Zhikai, Cho M C Y, Wang Chiawei, et al. IoT security: Ongoing challenges and research opportunities[C] //Proc of the 7th IEEE Int Conf on Service-oriented Computing and Applications. Piscataway, NJ: IEEE, 2014: 230-234

[72] Ramachandran K K, Sikdar B. Dynamics of malware spread in decentralized peer-to-peer networks[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 8(4): 617-623

[73] Shang Yilun, Luo Weiliang, Xu Shouhuai. L-hop percolation on networks with arbitrary degree distributions and its applications[J]. Physical Review E, 2011, 84(3): 0

[74] Ravasz E, Barabási A L. Hierarchical organization in complex networks[J]. Physical Review E, 2003, 67(2): 0

[75] Barabási A L, Albert R. Emergence of scaling in random networks[J]. Science, 1999, 286(5439): 509-512

[76] Barabási AL, Bonabeau E. Scale-free networks[J]. Scientific American, 2003, 288(5): 60-69

[77] Ives B, Walsh K R, Schneider H. The domino effect of password reuse[J]. Communications of the ACM, 2004, 47(4): 75-78

[78] Das A, Bonneau J, Caesar M, et al. The tangled Web of password reuse[C] //Proc of the 21st Network and Distributed System Security (NDSS) Symp. Reston, VA: Internet Society, 2014: 23-26

[79] Seitz T, Hartmann M, Pfab J, et al. Do differences in password policies prevent password reuse?[C] //Proc of the 37th CHI Conf Extended Abstracts on Human Factors in Computing Systems. New York: ACM, 2017: 2056-2063

[80] Florêncio D, Herley C, Van Oorschot P C. Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts[C] //Proc of the 23rd USENIX Security Symp. Berkeley, CA: USENIX Association, 2014: 575-590

[81] Florêncio D, Herley C, Van Oorschot P C. Pushing on string: The don’t care region of password strength[J]. Communications of the ACM, 2016, 59(11): 66-74

文章来源:《系统科学学报》 网址: http://www.xtkxxb.cn/qikandaodu/2021/0730/597.html



上一篇:工程测量开放式虚拟仿真实验系统建设方法研究
下一篇:系统科学视角下提升党员导生培养质量研究以大

系统科学学报投稿 | 系统科学学报编辑部| 系统科学学报版面费 | 系统科学学报论文发表 | 系统科学学报最新目录
Copyright © 2019 《系统科学学报》杂志社 版权所有
投稿电话: 投稿邮箱: