[1] |
HU H , ZHANG H , LIU Y ,et al. Quantitative method for network security situation based on attack prediction[J]. Security & Communication Networks, 2017(4): 1-19.
|
[2] |
HU H , LIU Y , ZHANG H ,et al. Optimal network defense strategy selection based on incomplete information evolutionary game[J]. IEEE Access, 2018,PP(99):1.
|
[3] |
FALLAH M . A puzzle-based defense strategy against flooding attacks using game theory[J]. IEEE Transactions on Dependable & Secure Computing, 2010,7(1): 5-19.
|
[4] |
FILAR J , VRIEZE K . Competitive Markov decision processes[J]. Springer Berlin, 1996,36(4): 343-358.
|
[5] |
姜伟, 方滨兴, 田志宏 ,等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010,47(10): 1714-1723.
|
|
JIANG W , FANG B X , TIAN Z H ,et al. Research on defense strategies selection based on attack-defense stochastic game model[J]. Journal of Computer Research and Development, 2010,47(10): 1714-1723.
|
[6] |
LYE K W , WING J M . Game strategies in network security[J]. International Journal of Information Security, 2005,4(1-2): 71-86.
|
[7] |
WEI L , SARWAT A , SAAD W ,et al. Stochastic games for power grid protection against coordinated cyber-physical attacks[J]. IEEE Transactions on Smart Grid, 2016,PP(99):1.
|
[8] |
ARFAOUI A , LETAIFA A B , KRIBECHE A ,et al. A stochastic game for adaptive security in constrained wireless body area networks[C]// Consumer Communications & NETWORKING Conference. 2018: 1-7.
|
[9] |
LEI C , ZHANG H Q , WAN L M ,et al. Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J]. Computer Communications, 2018,116: 184-199.
|
[10] |
LEI C , MA D H , ZHANG H Q . Optimal strategy selection for moving target defense based on Markov game[J]. IEEE Access, 2017,PP(99):1.
|
[11] |
WATKINS C J C H , DAYAN P . Technical note:Q-learning[J]. Machine Learning, 1992,8(3-4): 279-292.
|
[12] |
刘陶, 何炎祥, 熊琦 . 一种基于Q学习的LDoS攻击实时防御机制及其CPN实现[J]. 计算机研究与发展, 2011,48(3): 432-439.
|
|
LIU T , HE Y X , XIONG Q . A Q-learning based real-time mitigating mechanism against LDoS attack and its modeling and simulation with CPN[J]. Journal of Computer Research and Development, 2011,48(3): 432-439.
|
[13] |
RANDRIANSOLO A S , PYEATT L D . Q-learning:from computer network security to software security[C]// International Conference on Machine Learning and Applications. 2015: 257-262.
|
[14] |
YAN J , HE H , ZHONG X ,et al. Q-learning-based vulnerability analysis of smart grid against sequential topology attacks[J]. IEEE Transactions on Information Forensics & Security, 2017,12(1): 200-210.
|
[15] |
HARSANYI J C , SELTEN R . A general theory of equilibrium selection in games[M]. Boston: MIT PressPress, 1988.
|
[16] |
CORMEN T H , LEISERSON C E , RIVEST R L ,et al. Introduction to algorithms[M]. Boston: MIT PressPress, 2009.
|
[17] |
张恒巍, 李涛 . 基于多阶段攻防信号博弈的最优主动防御[J]. 电子学报, 2017,45(2): 431-439.
|
|
ZHANG H W , LI T . Optimal active defense based on multi-stage attack-defense signaling game[J]. Acta Electronica Sinica, 2017,45(2): 431-439.
|
[18] |
HUNG S M , GIVIGI S N . A Q-learning approach to flocking with UAVs in a stochastic environment[J]. IEEE Transactions on Cybernetics, 2016,47(1): 186-197.
|
[19] |
SZEPESVARI C , LITTMAN M . A unified analysis of value-function-based reinforcement-learning algorithms[J]. Neural Computation, 1999,11(8): 2017-2059.
|
[20] |
GORDON L , LOEB M , LUCYSHYN W ,et al. 2015 CSI/FBI computer crime and security survey[C]// The 2014 Computer Security Institute. 2015: 48-64.
|
[21] |
王震, 袁勇, 安波 ,等. 安全博弈论研究综述[J]. 指挥与控制学报, 2015,1(2): 121-149.
|
|
WANG Z , YUAN Y , AN B ,et al. An overview of security games[J]. Journal of Command and Control, 2015,1(2): 121-149.
|