参考文献
[1]Pu T, Wang X, Cao Y, et al. Power flow adjustment for smart microgrid based on edge computing and multiagent deep reinforcement learning[J]. Journal of Cloud Computing, 2021, 10(1): 113[2]唐杰, 邹陆华, 陈日恒, 等. 风光储混合微电网远程监测系统设计[J]. 传感器与微系统, 2019, 38(7): 105108[3]Khan R, Islam N, Das S K, et al. Energy sustainability—Survey on technology and control of microgrid, smart grid and virtual power plant[J]. IEEE Access, 2021, 9: 104663104694[4]岳俊英, 李存斌. 基于反向传播神经网络的微电网恶意信息数据检测系统设计[J]. 现代电子技术, 2021, 44(18): 1721[5]白雅静. 智能微电网能量管理系统设计与应用[J]. 工业控制计算机, 2021, 34(10): 146148[6]余杰, 李舟军, 张翀斌, 等. 主动Web漏洞扫描中的场景技术研究[J]. 计算机工程与科学, 2010, 32(3): 3134, 65[7]Parvez M, Zavarsky P, Khoury N. Analysis of effectiveness of blackbox Web application scanners in detection of stored SQL injection and stored XSS vulnerabilities[C] Proc of the 10th Int Conf for Internet Technology and Secured Transactions (ICITST). Piscataway, NJ: IEEE, 2015: 186191[8]Vogt P, Nentwich F, Jovanovic N, et al. Cross site scripting prevention with dynamic data tainting and static analysis[C] Proc of the Network and Distributed System Security Symposium(NDSS). Rosten, VA: The Internet Society, 2007: 112[9]Shahriar H, Zulkernine M. Clientside detection of crosssite request forgery attacks[C] Proc of the 21st IEEE Int Symp on Software Reliability Engineering. Piscataway, NJ: IEEE, 2010: 358367[10]陆凯. Web应用程序安全漏洞挖掘的研究[D]. 西安: 西安电子科技大学, 2010[11]Erturk E, Rajan A. Web vulnerability scanners: A case study[J]. arXiv preprint, arXiv:1706.08017, 2017[12]Sagala A, Manurung E. Testing and comparing result scanning using Web vulnerability scanner[J]. Advanced Science Letters, 2015, 21(11): 34583462[13]AlAnhar A, Suryanto Y. Evaluation of Web application vulnerability scanner for modern Web application[C] Proc of 2021 Int Conf on Artificial Intelligence and Computer Science Technology (ICAICST). Piscataway, NJ: IEEE, 2021: 200204[14]Bhushan R, Nath R. Web crawler—A review[J]. International Journal of Advanced Research in Computer Science and Software Engineering, 2013, 8(3): 5457[15]Xie R, Li M, Miao Z, et al. Hash adaptive bloom filter[C] Proc of the 37th IEEE Int Conf on Data Engineering (ICDE). Piscataway, NJ: IEEE, 2021: 636647[16]李志义. 网络爬虫的优化策略探略[J]. 现代情报, 2011, 31(10): 3135[17]黄永华. 应用Socket的微服务之间的通讯[J]. 福建电脑, 2020, 36(2): 6871[18]Chandrashekhar R, Mardithaya M, Thilagam S, et al. SQL injection attack mechanisms and prevention techniques[C] Proc of Int Conf on Advanced Computing, Networking and Security. Berlin: Springer, 2011: 524533[19]颜天佑, 卢灏. 基于端口扫描的变电站主机漏洞检测系统[J]. 信息安全研究, 2022, 8(2): 182189
|