张翼英, 阮元龙, 尚静, 等. 面向不完备信息的网络入侵检测方法[J]. 计算机工程与设计, 2022, 43(5): 1224-1231. doi: 10.16208/j.issn1000-7024.2022.05.004
陈晨, 刘曙, 王艺菲, 等. 基于PSOGWO-SVM的网络入侵检测方法[J]. 空军工程大学学报(自然科学版), 2022, 23(2): 97-105. doi: 10.3969/j.issn.1009-3516.2022.02.015
孙海丽, 龙翔, 韩兰胜, 等. 工业物联网异常检测技术综述[J]. 通信学报, 2022, 43(3): 196-210.
任志航. 面向电力客户侧终端网络的高效入侵检测模型研究[J]. 电测与仪表, 2022, 59(5): 149-157. doi: 10.19753/j.issn1001-1390.2022.05.020
XU Z Q, HE D B, HUANG X Y. Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-Server Environments[M]//International Conference on Information and Communications Security. Cham: Springer International Publishing, 2018: 595-605.
AMIN R. Cryptanalysis and Efficient Dynamic 1D Based Remote User Authentication Scheme in Multi-server Environment Using Smart Card [J]. International Journal of Network Security, 2016, 18: 172-181.
LEE C C, LIN T H, CHANG R X. A Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment Using Smart Cards[J]. Expert Systems with Applications, 2011, 38(11): 13863-13870.
LI X, MA J, WANG W, et al. A Novel Smart Card and Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments[J]. Mathematical and Computer Modelling, 2013, 58(1/2): 85-95.
WANG B, MA M D. A Smart Card Based Efficient and Secured Multi-Server Authentication Scheme[J]. Wireless Personal Communications an International Journal, 2013, 68(2): 361-378. doi: 10.1007/s11277-011-0456-7
LU Y R, LI L X, PENG H P, et al. Cryptanalysis and Improvement of a Chaotic Maps-Based Anonymous Authenticated Key Agreement Protocol for Multiserver Architecture[J]. Security and Communication Networks, 2016, 9(11): 1321-1330. doi: 10.1002/sec.1417
李梦菲, 毛莺池, 屠子健, 等. 基于深度确定性策略梯度的服务器可靠性任务卸载策略[J]. 计算机科学, 2022, 49(7): 271-279.
路亚. MEC多服务器启发式联合任务卸载和资源分配策略[J]. 计算机应用与软件, 2020, 37(10): 77-84. doi: 10.3969/j.issn.1000-386x.2020.10.013
任仪. 基于区块链与人工智能的网络多服务器SIP信息加密系统设计[J]. 计算机科学, 2020, 47(S1): 634-638.
余宜诚, 胡亮, 迟令, 等. 一种改进的适用于多服务器架构的匿名认证协议[J]. 吉林大学学报(工学版), 2018, 48(5): 1586-1592. doi: 10.13229/j.cnki.jdxbgxb20171258
陈跃, 王丽雅, 李国富, 张林, 杨甫, 马卓远, 高正. 基于随机森林算法的低煤阶煤层气开发选区预测[J]. 油气藏评价与开发, 2022, 12(4): 596-603, 616.
何新佳, 马中亮, 代淑兰. 基于多目标蝙蝠算法的加农炮内弹道性能优化研究[J]. 弹箭与制导学报, 2022, 42(1): 71-76, 81.
HSIANG H C, SHIH W K. Improvement of the Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environment [J]. Computer Standards&Interfaces, 2009, 31(6): 1118-1123.
WANG D, LI W T, WANG P. Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks [J]. IEEE Transactions on Industrial Informatics, 2018, 14(9): 4081-4092.
WAZID M, DAS A K, ODELU V, et al Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks[J]. IEEE Internet of Things Journal, 2018, 5(1): 269-282.
LU Y, LI L, PENG H, et al. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks[J]. Sensors(Basel, Switzerland), 2016, 16(6): E837.
ALI R, PAL A K, KUMARI S, et al. A secure User Authentication and Key-Agreement Scheme Using Wireless Sensor Networks for Agriculture Monitoring[J]. Future Generation Computer Systems, 2018, 84(C): 200-215.