[1] |
LIANG X , XIAO Y . Game theory for network security[J]. IEEE Communications Surveys & Tutorials, 2013,15(1): 472-486.
|
[2] |
WANG Y Z , YU J Y , WEN Q ,et al. evolutionary game model and analysis methods for network group behavior[J]. Chinese Journal of Computers, 2015.
|
[3] |
FALLAH M S . A puzzle-based defense strategy against flooding attacks using game theory[J]. IEEE Transactions on Dependable &Secure Computing, 2010,7(1): 5-19.
|
[4] |
刘玉岭, 冯登国, 吴丽辉 ,等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012,23(3): 712-723.
|
|
LIU Y L , FENF D G , WU L H ,et al. Performance evaluation of worm attack and defense strategies based on static Bayesian game[J]. Journal of Software, 2012,23(3): 712-723.
|
[5] |
GAO X , ZHU Y F . DDoS defense mechanism analysis based on signaling game model[C]// International Conference on Intelligent Human-Machine Systems and Cybernetics. IEEE, 2013: 414-417.
|
[6] |
张恒巍, 李涛 . 基于多阶段攻防信号博弈的最优主动防御[J]. 电子学报, 2017,45(2): 431-439.
|
|
ZHANG H W , LI T . Optimal active defense based on multi-stage attack-defense signaling game[J]. Acta Electronica Sinica, 2017,45(2): 431-439.
|
[7] |
SHEN S , LI Y , XU H ,et al. Signaling game based strategy of intrusion detection in wireless sensor networks[J]. Computers &Mathematics with Applications, 2011,62(6): 2404-2416.
|
[8] |
ALLAMIGEON X , GAUBERT S , SKOMRA M . Solving generic nonarchimedean semidefinite programs using stochastic game algorithms[C]// The ACM. ACM, 2016: 31-38.
|
[9] |
姜伟, 方滨兴, 田志宏 ,等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010,47(10): 1714-1723.
|
|
JIANG W , FANG B X , TIAN Z H ,et al. Research on defense strategies selection based on attack-defense stochastic game model[J]. Journal of Computer Research and Development, 2010,47(10): 1714-1723.
|
[10] |
王长春, 程晓航, 朱永文 ,等. 计算机网络对抗行动策略的Markov 博弈模型[J]. 系统工程理论与实践, 2014,34(9): 2402-2410.
|
|
WANG C C , CHENG X H , ZHU Y W ,et al. A Markov game model of computer network operation[J]. Systems Engineering - Theory &Practice, 2014,34(9): 2402-2410.
|
[11] |
WEI L , SARWAT A I , SAAD W . Risk assessment of coordinated cyber-physical attacks against power grids:A stochastic game approach[C]// Industry Applications Society Meeting. IEEE, 2016: 1-7
|
[12] |
DING K , DEY S , QUEVEDO D E ,et al. Stochastic game in remote estimation under DoS attacks[J]. IEEE Control Systems Letters, 2017,1(1): 146-151.
|
[13] |
HARSANYI J C. . Games with Incomplete Information Played by“Bayesian” Players,I–III Part I.The Basic Model[M]. Springer Netherlands, 1982: 159-182.
|
[14] |
LEI C , ZHANG H Q , WAN L M ,et al. Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J]. Computer Communications, 2018,116: 184-199.
|
[15] |
SHAPLEY L S . Stochastic Games[J]. Proceedings of the National Academy of Sciences of the United States of America, 1953,39(10): 1095-1100.
|
[16] |
FILAR J , VRIEZE K . Competitive Markov decision processes[J]. Springer Berlin, 1996,36(4): 343-358.
|
[17] |
ZHANG S , OU X , CARAGEA D . Predicting cyber risks through national vulnerability database[J]. Information Systems Security, 2015,24(4-6): 194-206.
|
[18] |
GORDON L , LOEB M , LUCYSHYN W ,et al. 2015 CSI/FBI computer crime and security survey[C]. Proceedings of the 2014 Computer Security Institute// San Francisco:IEEE, 2015. 48-64.
|