1. Jiangxing, W.: Introduction to Cyber Space Mimicry Defense, vol. I. Science Press, Beijing (2017)
2. Fucai, C., Hongchao, H., et al.: Active Defense Technology of Cyberspace: Science Pressm, Beijing (2018)
3. Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(11), 222–232 (1987)
4. Jajodia, S., Ghosh, A.K., Swarup, V., et al.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Springer Ebooks (2011)
5. Changxiang, S.: Trusted computing builds an active defense security system. Inf. Secur. Commun. Confid. 6, 34 (2016)