[1]熊涛. 政务云对电子政务的支撑研究[J]. 电子商务, 2018, 5: 31-32.
XIONG Tao. Study on the government cloud support for e-government [J]. E-Business Journal, 2018, 5: 31-32.
[2]梁紫怡. “互联网+”时代电子政务发展趋势初探[J]. 中小企业管理与科技(中旬刊), 2018, 4: 110-111.
LIANG Ziyi. A preliminary study on the development trend of e-government in the “Internet+” era[J]. Management and Technology of SME (Mid Magazine), 2018, 4: 110-111.
[3]新华网舆情监测分析中心. 全国政务新媒体综合影响力报告[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm.
Xinhuanet Public Opinion Monitoring and Analysis Center. National government new media comprehensive impact report[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/yuqing/2016-01/18/c_128638812.htm.
[4]梅宏. 推进“一网、一门、一次”改革 深化“互联网+政务服务”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm.
MEI Hong. Promote “one network, one, once” reform deepen the “Internet + government services”[EB/OL]. [2018-06-30]. http: //www.xinhuanet.com/2018-07/02/c_137295963.htm.
[5]白银元, 刘琼芳, 胡新丽. 中美电子政务发展比较分析[J]. 现代商贸工业, 2013, 25(2): 66-69.
BAI Yinyuan, LIU Qiongfang, HU Xinli. A comparative analysis of the development of e-government between China and the United States[J]. Modern Business Trade Industry, 2013, 25(2): 66-69.
[6]TINHOLT D, VAN DER LINDEN N, GROENEVELD A, et al. eGovernment benchmark 2017[EB/OL]. (2017-11-17)[2018-06-30]. https: //www.capgemini.com/wp-content/uploads/2017/11/2017-egovernment-benchmark_background_v7.pdf.
[7]European Commission. European eGovernment Action Plan 2016-2020[R]. Brussels: European Commission, 2016.
[8]European Union Agency for Network and Information Security(ENISA). Security framework for governmental clouds[R]. Brussels: European Commission, 2015.
[9]吴曼青. 新时代政务信息系统建设的目标、思路与重点[EB/OL]. [2018-07-04].http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml.
WU Manqing. Objectives, ideas and priorities for the construction of a new era of government affairs information system[EB/OL]. [2018-07-04]. http: //cechss.cssn.cn/zhcspd/201807/t20180704_4494896.shtml.
[10]殷利梅. 新加坡电子政务总体规划(2011—2015)及启示[J]. 信息化建设, 2011, 11: 38-41.
YIN Limei. Singapore’s e-government master plan (2011-2015) and its enlightenment[J]. Information Construction, 2011, 11: 38-41.
[11]吴昊, 孙宝文. 当前我国电子政务发展现状、问题及对策实证研究[J]. 国家行政学院学报, 2009, 5: 123-127.
WU Hao, SUN Baowen. Current status, problems and countermeasures of e-government development in China[J]. Journal of National School of Administration, 2009, 5: 123-127.
[12]国家信息安全工程技术研究中心. 电子政务总体设计与技术实现[M]. 北京: 电子工业出版社, 2003.
National Information Security Engineering Technology Research Center. Overall design and technology implementation of e-government [M]. Beijing: Publishing House of Electronics Industry, 2003.
[13]张成福, 唐钧. 电子政务绩效评估: 模式研究与中国战略[J]. 探索, 2004, 2: 36-40.
ZHANG Chengfu, TANG Jun. E-government performance evaluation: Model research and China strategy[J]. Exploration, 2004, 2: 36-40.
[14]HAYES B. Cloud computing[J]. Communications of the ACM, 2008, 51(7): 9-11.
[15]JACOBSON D H. A view on cloud computing[J]. International Journal of Computers & Technology, 2010, 4(2): 50-58.
[16]BUYYA R, YEO C S, VENUGOPAL S, et al. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility[J]. Future Generation Computer Systems, 2009, 25(6): 599-616.
[17]罗军舟, 金嘉晖, 宋爱波, 等. 云计算: 体系架构与关键技术[J]. 通信学报, 2011, 32(7): 3-21.
LUO Junzhou, JIN Jiahui, SONG Aibo, et al. Cloud computing: Architecture and key technologies[J]. Transactions of Communications, 2011, 32(7): 3-21.
[18]SUBASHINI S, KAVITHA V. A survey on security issues in service delivery models of cloud computing[J]. Journal of Network & Computer Applications, 2011, 34(1): 1-11.
[19]BELOGLAZOV A, ABAWAJY J, BUYYA R. Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing[J]. Future Generation Computer Systems, 2012, 28(5): 755-768.
[20]温锐松, 石友康. 基于云计算的电子政务公共平台顶层设计的研究与探索[J]. 电信网技术, 2014, 2: 26-34.
WEN Ruisong, SHI Youkang. Research and exploration of top-level design of electronic government common platform based on cloud computing[J]. Telecommunications Network Technology, 2014, 2: 26-34.
[21]BONOMI F, MILITO R, ZHU J, et al. Fog computing and its role in the internet of things[C]//Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. Helsinki, Finland: ACM, 2012: 13-16.
[22]STOJMENOVIC I, WEN S. The fog computing paradigm: Scenarios and security issues[C]//2014 Federated Conference on Computer Science and Information Systems. Warsaw, Poland: IEEE, 2014: 1-8.
[23]殷康. 从云计算到雾计算[J]. 高科技与产业化, 2014, 10(7): 76-79.
YIN Kang. From cloud computing to fog calculation[J]. High Tech and Industrialization, 2014, 10(7): 76-79.
[24]YI S, LI C, LI Q. A survey of fog computing: Concepts, applications and issues[C]//The Workshop on Mobile Big Data. Hangzhou: ACM, 2015: 37-42.
[25]HE S, DONG M, OTA K, et al. Software-defined efficient service reconstruction in fog using content awareness and weighted graph[C]//2017 IEEE Global Communications Conference. Singapore: IEEE, 2017: 1-6.
[26]SHI W, CAO J, ZHANG Q, et al. Edge computing: Vision and challenges[J]. IEEE Internet of Things Journal, 2016, 3(5): 637-646.
[27]WOOD T, RAMAKRISHNAN K K, HWANG J, et al. Toward a software-based network: Integrating software defined networking and network function virtualization [J]. IEEE Network, 2015, 29(3): 36-41.
[28]BOCCARDI F, HEATH R W, LOZANO A, et al. Five disruptive technology directions for 5G[J]. IEEE Communications Magazine, 2014, 52(2): 74-80.
[29]OSSEIRAN A, BOCCARDI F, BRAUN V, et al. Scenarios for 5G mobile and wireless communications: The vision of the METIS project[J]. Communications Magazine IEEE, 2014, 52(5): 26-35.
[30]WANG C X, HAIDER F, GAO X, et al. Cellular architecture and key technologies for 5G wireless communication networks[J]. Journal of Chongqing University of Posts & Telecommunications, 2014, 52(2): 122-130.
[31]李福昌. 5G技术在4G网络中应用的前景探讨[J]. 通信世界, 2017, 13: 50-52.
LI Fuchang. Discussion on the application of 5G technology in 4G network[J]. Communications, 2017, 13: 50-52.
[32]欧阳秋梅, 吴超. 大数据与传统安全统计数据的比较及其应用展望[J]. 中国安全科学学报, 2016, 26(3): 1-7.
OUYANG Qiumei, WU Chao. Comparison of big data and traditional security statistics and its application prospects[J]. China Safety Science Journal, 2016, 26(3): 1-7.
[33]林龙成, 陈波, 郭向民. 传统网络安全防御面临的新威胁: APT攻击[J]. 信息安全与技术, 2013, 4(3): 20-25.
LIN Longcheng, CHEN Bo, GUO Xiangmin. A new threat to traditional network security defense: APT attack[J]. Information Security & Technology, 2013, 4(3): 20-25.
[34]栾庆林, 卢辉斌. 自适应遗传算法优化神经网络的入侵检测研究[J]. 计算机工程与设计, 2008, 29(12): 3022-3025.
LUAN Qinglin, LU Huibin. Research of intrusion detection based on neural network optimized by adaptive genetic algorithm[J]. Computer Engineering and Design, 2008, 29(12): 3022-3025.
[35]DATTA A, FRANKLIN J, GARG D, et al. A logic of secure systems and its application to trusted computing[C]//30th IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2009: 221-236.
[36]郭瑞. 深度动态防御应对APT攻击[J]. 信息安全与技术, 2014, 9: 67-69.
GUO Rui. Deep dynamic defense against APT attacks[J]. Information Security and Technology, 2014, 9: 67-69.
[37]ROMEIS C, JAEGER J. Dynamic protection security assessment, a technique for blackout prevention[C]//2013 IEEE Grenoble Conference. Grenoble, France: IEEE, 2013: 1-6.
[38]席荣荣, 云晓春, 金舒原, 等. 网络安全态势感知研究综述[J]. 计算机应用, 2012, 32(1): 1-4.
XI Rongrong, YUN Xiaochun, JIN Shuyuan, et al. Review of network security situational awareness research[J]. Journal of Computer Applications, 2012, 32(1): 1-4.
[39]贾焰, 王晓伟, 韩伟红, 等. YHSSAS: 面向大规模网络的安全态势感知系统[J]. 计算机科学, 2011, 38(2): 4-8.
JIA Yan, WANG Xiaowei, HAN Weihong, et al. YHSSAS: Security situation awareness system for large-scale networks[J]. Computer Science, 2011, 38(2): 4-8.
[40]张勇, 谭小彬, 崔孝林, 等. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011, 22(3): 495-508.
ZHANG Yong, TAN Xiaobin, CUI Xiaolin, et al. Network security situational awareness method based on Markov game model[J]. Journal of Software, 2011, 22(3): 495-508.