1. Zhang G., Zhou R.: Research on the breakthrough of defense system from the perspective of red team. In: Xu, Z., Parizi, R.M., Loyola-González, O., Zhang, X. (eds.) Cyber Security Intelligence and Analytics. CSIA 2021. Advances in Intelligent Systems and Computing, vol. 1342 (2021). Springer, Cham. https://doi.org/10.1007/978-3-030-70042-3_31
2. Wang, D.: Teaching reform of computer network security course. Chinese and Foreign Entrepreneurs, No. 6, pp. 35–36 (2019)
3. Zhang, G., Wu, H.: The web penetration based SQL injection. In: Hung, J., Yen, N., Chang, J.W. (eds.) Frontier Computing. FC 2019. Lecture Notes in Electrical Engineering, vol. 551 (2020). Springer, Singapore. https://doi.org/10.1007/978-981-15-3250-4_89
4. Zhang, Q.: Exploration on the integration of red blue confrontation and safety supervision. Electron. Des. Eng. 11(8), 36–37 (2015)
5. Zhang, G., Li, W.: A security reinforcement scheme for the server. WOP Educ. Soc. Sci. Psychol. 14, 92–92 (2018). 7