先每篇单独放在「基础文献笔记」文件夹中,最终整理至文件夹下的README.md 以下是理工类著作的模板,已经包括两种题型的并集,每篇不少于1000字
以下是人文社科类著作的模板,已经包括两种题型的并集,每篇不少于1000字
先每篇单独放在「专业文献笔记」文件夹中,最终整理至文件夹下的README.md 以应对面试为方向进行准备,无字数要求
- ***.敏锐抓住信息化发展历史机遇自主创新推进网络强国建设[J].党建,2018(05):1.
- 沈昌祥,左晓栋.网络空间安全导论[M].北京:电子工业出版社,2018.
- 杨义先,钮心忻.安全简史:从隐私保护到量子密码[M].电子工业出版社,2017.
- 科弗,托马斯.信息论基础[M].阮吉寿,等,译.北京:机械工业出版社,2008.
- 拉森,马克思.数理统计及其应用[M].北京:机械工业出版社,2019.
- 殷俊峰.矩阵分析[M].上海:同济大学出版社,2017.
- 周志华.机器学习[M].北京:清华大学出版社,2016.
- 王燕军,梁治安,崔雪婷.最优化基础理论与方法:第2 版[M].上海:复旦大学出版社,2018.
- 冈萨雷斯,伍兹.数字图像处理:第4 版[M].阮秋琦,阮宇智,译.北京:电子工业出版社,2020.
- 何晗.自然语言处理入门[M].北京:人民邮电出版社,2019.
- GOODFELLOW I, BENGIO Y, COURVILLE A, et al. Deep learning[M]. Cambridge: The MIT Press, 2016.
- GHAFFARIAN S M, SHAHRIARI H R. Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey[J]. ACM Computing Surveys(CSUR), 2017, 50(4): 1-36.
- KHRAISAT A, GONDAL I, VAMPLEW P, et al. Survey of intrusion detection systems: techniques, datasets and challenges[J]. Cybersecurity, 2019, 2(1): 1-22.
- ZHENG Z, XIE S, DAI H, et al. An overview of blockchain technology: Architecture, consensus, and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 2017: 557-564.
- 费孝通.乡土**[M].上海人民出版社, 2013.
- 李泽厚.美的历程[M].北京:生活.读书.新知三联书店,2014.
恶意软件分析与检测
- [22]SOURI A, HOSSEINI R. A state-of-the-art survey of malware detection approaches using data mining techniques[J]. Human-centric Computing and Information Sciences, 2018, 8(01):1-22. wgc
- [40]MONNAPPA K A. Learning malware analysis: explore the concepts, tools, and techniques to analyze and investigate windows malware[M]. Packt Publishing Ltd, 2018. cwx
- [42]SIHWAIL R, OMAR K, ARIFFIN K A Z. A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis[J]. International Journal on Advanced Science, Engineering and Information Technology, 2018, 8(4-2): 1662. hyf
- [43]ARSHAD S, SHAH M A, KHAN A, et al. Android malware detection & protection: a survey[J]. International Journal of Advanced Computer Science and Applications, 2016,7(02): 463-475. YT
- [64]MCLAUGHLIN N, MARTINEZ DEL RINCON J, KANG B J, et al. Deep android malware detection[C]//Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy. 2017: 301-308. cwx
- [65]DAMODARAN A, DI TROIA F, VISAGGIO C A, et al. A comparison of static, dynamic, and hybrid analysis for malware detection[J]. Journal of Computer Virology and Hacking Techniques, 2017, 13(01): 1-12. cwx
- [66]VINAYAKUMAR R, ALAZAB M, SOMAN K P, et al. Robust intelligent malware detection using deep learning[J]. IEEE Access, 2019, 7: 46717-46738. sn
漏洞扫描与检测
- [18]邹权臣,张涛,吴润浦,等.从自动化到智能化:软件漏洞挖掘技术进展[J].清华大学学报:自然科学版, 2018, 58(12):1079-1094.
- [19]郑尧文,文辉,程凯,等.物联网设备漏洞挖掘技术研究综述[J].信息安全学报,2019,4(5):61-75.
- [21]YU M, ZHUGE J, CAO M, et al. A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices[J]. Future Internet, 2020, 12(02): 27. sn
- [24]XIE W , JIANG Y , TANG Y , et al. Vulnerability Detection in IoT Firmware: A Survey[C] IEEE.2017 IEEE 23rd International Conference on Parallel and Distributed Systems(ICPADS). IEEE, 2017. sxh
- [25]NESHENKO N, BOU-HARB E, CRICHIGNO J, et al. Demystifying IoT security: an exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations[J]. IEEE Communications Surveys & Tutorials, 2019, 21(03): 2702-2733. sxh
- [26]MENEGHELLO F, CALORE M, ZUCCHETTO D, et al. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices[J]. IEEE Internet of Things Journal,2019, 6(05): 8182-8201. sxh
- [47]LIU B , SHI L , CAI Z , et al. Software vulnerability discovery techniques: a survey[C]//IEEE. Fourth International Conference on Multimedia Information Networking & Security.IEEE, 2013. ygz
入侵检测
- [23] MANES V J M , HAN H S , HAN C , et al. The Art, Science, and Engineering of Fuzzing: A Survey[J]. IEEE Transactions on Software Engineering, 2019, 47(11):1-23.
- [44]KHRAISAT A, GONDAL I, VAMPLEW P, et al. Survey of intrusion detection systems: techniques, datasets and challenges[J]. Cybersecurity, 2019, 2(01): 1-22. cwx
- [45]RING M , WUNDERLICH S , SCHEURING D , et al. A Survey of Network-based Intrusion Detection Data Sets[J]. Computers & Security, 2019, 86:147-167. ygz(ppt)
- [48]ZARPELAO B B , MIANI R S , KAWAKANI C T , et al. A survey of intrusion detection in Internet of Things[J]. Journal of Network & Computer Applications, 2017, 84(Apr.):25-37. jqy,cwx
- [61]SHARAFALDIN I, LASHKARI A H, GHORBANI A A. Toward generating a new intrusion detection dataset and intrusion traffic characterization[C]//ICISSp. 2018: 108-116. jqy,cwx
- [62]SHONE N, NGOC T N, PHAI V D, et al. A deep learning approach to network intrusion detection[J]. IEEE transactions on emerging topics in computational intelligence, 2018, 2(01): 41-50. sn
- [63]KHRAISAT A, GONDAL I, VAMPLEW P, et al. Survey of intrusion detection systems: techniques, datasets and challenges[J]. Cybersecurity, 2019, 2(01): 1-22. cwx
数据安全
- [17]古德费洛,本吉奥,库维尔.深度学习[M].赵申剑,黎彧君,符天凡,等译.北京:人民邮电出版社,2017.
- [20]丁兆云,刘凯,刘斌,等.网络安全知识图谱研究综述[J].华中科技大学学报:自然科学版,2021,49(07): 79-91.
- [27]埃尔,马哈茂德,普蒂尼.云计算:概念、技术与架构[M].龚奕利,贺莲,胡创,译.北京:机械工业出版社,2017.
- [28]詹金斯,斯蒂芬森.计算机离散数学基础[M].董笑菊,等译.北京:机械工业出版社,2020.
- [39]刘睿瑄,陈红,郭若杨,等.机器学习中的隐私攻击与防御[J].软件学报.2020,31(3):866-892.
- [52]ABADI M, CHU A, GOODFELLOW I, et al. Deep learning with differential privacy[C]//Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 2016: 308-318.
- [51]RISTENPART T, TROMER E, SHACHAM H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds[C]//Proceedings of the 16th ACM conference on Computer and communications security. 2009: 199-212.
密码学与区块链
- [20]丁兆云,刘凯,刘斌,等.网络安全知识图谱研究综述[J].华中科技大学学报:自然科学版,2021,49(07): 79-91.
- [23]MANES V J M , HAN H S , HAN C , et al. The Art, Science, and Engineering of Fuzzing: A Survey[J]. IEEE Transactions on Software Engineering, 2019, 47(11):1-23.
- [35]曾诗钦,霍如,黄韬,等.区块链技术研究综述:原理、进展与应用[J].通信学报.2020,41(01):134-151.
- [46]JUN L , BODONG Z , CHAO Z . Fuzzing: a survey[J]. Cybersecurity, 2018, 1(01):6-19.
- [53]ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger fabric: a distributed operating system for permissioned blockchains[C]//Proceedings of the thirteenth EuroSys conference. 2018: 1-15.
- [54]KOSBA A, MILLER A, SHI E, ET AL. HAWK: The blockchain model of cryptography and privacy-preserving smart contracts[C]//2016 IEEE symposium on security and privacy (SP). IEEE, 2016: 839-858.
- [60]JIANG B, LIU Y, CHAN W K. Contractfuzzer: Fuzzing smart contracts for vulnerability detection[C]//2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2018: 259-269.