[1] |
冯登国, 张敏, 张妍 ,等. 云计算安全研究[J]. 软件学报, 2011,22(1): 71-83.
|
|
FENG D G , ZHANG M , ZHANG Y ,et al. Study of cloud comput-ing security[J]. Journal of Software, 2011,22(1): 71-83.
|
[2] |
ANDERSOR R . Why information security is hard-an economic perspective[EB/OL]. .
|
[3] |
姜伟, 方滨兴, 田志宏 ,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009,32(4): 817-827.
|
|
JIANG W , FANG B X , TIAN Z H ,et al. The testing of network security and the optimal active defense based on offensive and de-fensive game model[J]. Chinese Journal of Computers, 2009,32(4): 817-827.
|
[4] |
HARRINGTON P D . Using noncooperative potential games to improve network security[D]. Stillwater:Oklahoma State Univer-sity, 2010.
|
[5] |
JEANNETTE K W , WING J . Game strategies in network secu-rity[J]. International Journal of Information Security, 2005,4(1-2): 71-86.
|
[6] |
MANSHAEI M H , ZHU Q , ALPCAN T ,et al. Game theory meets network security and privacy[J]. ACM Computing Surveys, 2012,45(3): 533-545.
|
[7] |
VARIAN H . System reliability and free riding[J]. Economics of Information Security Kluwer –, 2004,2(5799): 1-15.
|
[8] |
GROSSKLAGS J , CHRISTIN N , CHUANG J . Secure or insure?:a game-theoretic analysis of information security games[C]// Proceed-ings of the 17th International Conference on World Wide Web,Bei-jing. 2008: 209-218.
|
[9] |
GROSSKLAGS J , JOHNSON B , CHRISTIN N . The price of un-certainty in security games[M]// Economics of Information Security& Privacy. Berlin Heidelberg:Springer, 2010: 9-32.
|
[10] |
GROSSKLAGS J , RADOSAVAC S , CARDENAS A A ,et al. Nudge:intermediaries' role in interdependent network security[J]. Lecture Notes in Computer Science, 2010,6101: 323-336.
|
[11] |
PAL R , HUI P . Modeling internet security investments:tackling topological information uncertainty[C]// Decision and Game The-ory for Security. Berlin Heidelberg:Springer, 2011: 239-257.
|
[12] |
NEYYAN R , PAUL A , DESHWAL M ,et al. Game theory based defense mechanism against flooding attack using puzzle[J]. Emerging Trends in Computer Science & Information Technology Etcsit, 2012(2): 35-40.
|
[13] |
CARROLL T E , GROSU D . A game theoretic investigation of deception in network security[C]// Proceedings of 18th International Conference on Computer Communications and Networks. 2009: 1-6.
|
[14] |
孙蔽, 何德全, 孔祥维 ,等. 运用博弈论探讨信息安全问题[J]. 科技管理研究, 2009,29(1): 233-235.
|
|
SUN W , HE D Q , KONG X W ,et al. Discussing the information security problems by using game theory[J]. Science and Technol-ogy Management Research, 2009,29(1): 233-235.
|
[15] |
刘建波 . 一种基于攻防成本博弈的防御策略评价模型[J]. 计算机技术与发展, 2011,21(10): 229-232.
|
|
LIU J B . A evaluation model of defending strategies based on at-tack-defense cost game[J]. Computer Technology and Development, 2011,21(10): 229-232.
|
[16] |
KUNREUTHER H , HEAL G . Interdependent security[J]. Journal of Risk & Uncertainty, 2003,26(2-3): 231-249.
|
[17] |
LASZKA A , FELEGYHAZI M , BUTTYAN L . A survey of inter-dependent information security games[J]. ACM Computing Sur-veys, 2014,47(2).
|
[18] |
JOHNSONA B,GROSSKLAGSBJ , CHRISTINA N ,et al. Un-certainty in interdependent security games[J]. Decision Game Theory for Security, 2010,6442: 234-244.
|
[19] |
吕俊杰, 邱菀华, 王元卓 . 基于相互依赖性的信息安全投资博弈[J]. 中国管理科学, 2006,14(3): 7-12.
|
|
LV J J , QIU W H , WANG Y Z . The information security investment games based on interdependency[J]. Chinese Journal of Manage-ment Science, 2006,14(3): 7-12.
|
[20] |
吕俊杰, 邱菀华, 王元卓 . 网络安全投资外部性及博弈策略[J]. 北京航空航天大学学报, 2006,32(12): 1499-1502.
|
|
LV J J , QIU W H , WANG Y Z . Network security investment exter-nality and game strategies[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006,32(12): 1499-1502.
|
[21] |
孙蔽, 孔祥维, 何德全 ,等. 基于演化博弈论的信息安全攻防问题研究[J]. 情报科学, 2008(9): 1408-1412.
|
|
SUN W , KONG X W , HE D Q ,et al. Study of information security attack and defend based on evolutionary game theory[J]. Informa-tion Science, 2008(9): 1408-1412.
|
[22] |
DODIS Y , RABIN T . Cryptography and game theory[J]. Algo-rithmic Game Theory, 2007(1).
|
[23] |
KATZ J , . Bridging game theory and cryptography:recent results and future directions[M]// Theory of Cryptography. Berlin Heidel-berg:Springer, 2008: 251-272.
|
[24] |
KOL G , NAOR M . Cryptography and game theory:designing protocols for exchanging information[M]// Theory of Cryptography. Berlin Heidelberg:Springer, 2008: 320-339.
|
[25] |
GOSSNER O , TOMALA T . Secret correlation in repeated games with imperfect monitoring[J]. Mathematics of Operations Research, 2007,32(2): 413-424.
|
[26] |
CABALLERO G P , HERNANDEZ G C , BRUNO C C . A game-theoretic model for two-party cryptographic protocols[C]// International Conference on Information Technology:Coding &Computing. 2004: 773-777.
|
[27] |
田有亮, 彭长根, 马建峰 ,等. 安全协议的博弈论机制[J]. 计算机研究与发展, 2014,51(2): 344-352.
|
|
TIAN Y L , PENG C G , MA J F ,et al. The game mechanism of se-curity protocol[J]. Computer Research and Development, 2014,51(2): 344-352.
|
[28] |
田有亮, 马建峰, 彭长根 ,等. 秘密共享体制的博弈论分析[J]. 电子学报, 2011,39(12): 2790-2795.
|
|
TIAN Y L , MA J F , PENG C G ,et al. The game theory analysis of secret sharing schemes[J]. Acta Electronic Silica, 2011,39(12): 2790-2795.
|
[29] |
张国荣, 印鉴 . 基于博弈论的安全多方求和方法[J]. 计算机应用研究, 2009,26(4): 1497-1499.
|
|
ZHANG G R , YIN J . The methods of secure sum based on game the-ory[J]. Application Research of Computers, 2009,26(4): 1497-1499.
|
[30] |
罗喜召, 钱陪德, 朱艳琴 ,等. 防范秘密攻击的安全计算的博弈论实现[J]. 南京航空航天大学学报, 2012,44(1): 70-74.
|
|
LUO X Z , QIAN P D , ZHU Y Q ,et al. The game theory realization of security computing in prevent secret attacks[J]. Journal of Nanjing University of Aeronautics and Astronautics, 2012,41(1): 70-74.
|
[31] |
ALPCAN T , BACSAR T . An intrusion detection game with limited observations[J]. Proceedings of Int.symp.on Dynamic Games &Applications Sophia Antipolis, 2006,8137: 222-232.
|
[32] |
ALPCAN T,BASAR,TAMER , . A game theoretic approach to decision and analysis in network intrusion detec-tion[C]// Procceedings of the 42nd IEEE Conference on Decision and Control,Maui,HI. 2003: 2595-2600.
|
[33] |
ZHU Q , TEMBINE H , BASAR T . Network security configurations:A nonzero-sum stochastic game approach[C]// Proceedings of the American Control Conference. 2010: 1059-1064.
|
[34] |
AGAH A , DAS S K , BASU K ,et al. Intrusion detection in sensor networks:a non-cooperative game approach[C]// The 3rd IEEE In-ternational Symposium on Network Computing and Applications. 2004: 343-346.
|
[35] |
CHEN L , LENEUTRE J . A Game theoretical framework on intru-sion detection in heterogeneous networks[J]. IEEE Transactions on Information Forensics & Security, 2009,4(2): 165-178.
|
[36] |
朱建明, RAGHUNATHAN S . 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2009,32(4): 828-834.
|
|
ZHU J M , RAGHUNATHAN S . The evaluation model of informa-tion security based on game theory[J]. Chinese Journal of Com-puters, 2009,32(4): 828-834.
|
[37] |
夏子超, 银鹰, 陈晓桦 . 入侵检测系统响应策略的进化博弈论分析[J]. 微计算机信息, 2009(33): 60-61.
|
|
XIA Z C , YIN Y , CHEN X H . The evolutionary game theory analy-sis of intrusion detection system response strategy[J]. Microcom-puter Information, 2009(33): 60-61.
|
[38] |
赵柳榕, 梅姝娥, 仲伟俊 . 虚拟专用网和入侵检测系统最优配置策略的博弈分析[J]. 管理工程学报, 2014,28(4).
|
|
ZHAO L R , MEI S E , ZHONG W J . The game theory analysis of virtual private network and the optimal allocation of intrusion de-tection system[J]. Journal of Industrial Engineering and Engineer-ing Management, 2014,28(4).
|
[39] |
LIAO Q , LI Z , STRIEGEL A . Could firewall rules be public-a game theoretical perspective[J]. Security & Communication Net-works, 2012,5(2): 197-210.
|
[40] |
周华, 周海军, 马建锋 . 基于博弈论的入侵容忍系统安全性分析模型[J]. 电子与信息学报, 2013(8): 1933-1939.
|
|
ZHOU H , ZHOU H J , MA J F . Safety analysis model of intrusion tolerance system bossed on game theory[J]. Journal of Electronics Information Technology, 2013(8): 1933-1939.
|