[1] |
姜伟, 方滨兴, 田志宏 . 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2013,47(10): 1714-1723.
|
|
JIANG W , FANG B X , TIAN Z H . Research on defense strategies selection based on attack-defense stochastic game model[J]. Journal of Computer Research and Development, 2013,47(10): 1714-1723.
|
[2] |
FALLAH M S . A puzzle-based defense strategy against flooding attacks using game theory[J]. Dependable and Secure Computing, 2016,67(1): 5-19.
|
[3] |
林旺群, 王慧, 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2013,48(2): 306-316.
|
|
LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2013,48(2): 306-316.
|
[4] |
ANDERSON R , . Why information security is hard:an economic perspective[C]// 17th Annual Computer Security Application Conference. Washington,DC,USA:IEEE Computer Society, 2016: 39-40.
|
[5] |
BASUS S , WONG J . A taxonomy of intrusion response systems[J]. International Journal of Information and Computer Security, 2015,1(1/2): 169-184.
|
[6] |
SHEN S G , LI Y J , XU H Y . Signaling game based strategy of intrusion detection in wireless sensor networks[J]. Computers & Mathematics with Applications, 2016,62(6): 2404-2416.
|
[7] |
张恒巍 . 余定坤.韩继红,等.基于攻防信号博弈模型的防御策略选取方法[J]. 通信学报, 2016,37(5): 39-49.
|
|
ZHANG H W , YU D K , HAN J H ,et al. Defense policies selection method based on attack-defense signaling game model[J]. Journal on Communications, 2016,37(5): 39-49.
|
[8] |
朱建明 . 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2015(4): 828-834.
|
|
ZHU J M . Evaluation model of information security technologies based on game theoretic[J]. Chinese Journal of Computers, 2015(4): 828-834.
|
[9] |
张勇 . 基于Markov 博弈模型的网络安全态势感知方法[J]. 软件学报, 2016,22(3): 495-508.
|
|
ZHANG Y . Network security situation awareness approach based on markov game model[J]. Journal of Software, 2016,22(3): 495-508.
|
[10] |
CHENG D , HE F , QI H ,et al. Modeling,analysis and control of networked evolutionary games[J]. IEEE Transactions on Automatic Control, 2015(99): 41-49.
|
[11] |
孙薇 . 基于演化博弈论的信息安全攻防问题研究[J]. 情报科学, 2015(9): 1408-1412.
|
|
SUN W . Research on attack and deference in information security based on evolutionary game[J]. Information Science, 2015(9):14081412.
|
[12] |
朱建明, 宋彪, 黄启发 . 基于系统动力学的网络安全攻防演化博弈模型[J]. 通信学报, 2014,35(1): 54-61.
|
|
ZHU J M , SONG B , HUANG Q F . Evolution game model of offense-defense for network security based on system dynamics[J]. Journal on Communications, 2014,35(1): 54-61.
|
[13] |
王元卓, 于建业, 邱雯 . 网络群体行为的演化博弈模型与分析方法[J]. 计算机学报, 2015,38(2): 282-300.
|
|
WANG Y Z , YU J Y , QIU W . Evolutionary game model and analysis methods for network group behavior[J]. Chinese Journal of Computers, 2015,38(2): 282-300.
|
[14] |
BALKENBORG D , SCHLAG K . On the interpretation of evolutionary stable sets in symmetric and asymmetric games[D]. Mimeo:Bonn University Economics Department. 1994.
|
[15] |
DREW F , JEAN T . Game theory[M]. Boston: Massachusettes Institute of Technology PressPress, 2012.
|