[1] |
ANDERSON R . Why information security is hard —an economic perspective[A]. Proceedings of 17th Annual Computer Security Application Conference[C]. Washington,DC,USA:IEEE Computer Society, 2001. 39-40.
|
[2] |
HAMILTON S N , MILLER W L , OTT A ,et al. The role of game theory in information warfare[A]. 4th Information Survivability Workshop[C]. Vancouver,Canada,Washington,DC,USA: IEEE Computer Society Press, 2002. 45-46.
|
[3] |
BASUS S , WONG J . A taxonomy of intrusion response systems[J]. International Journal of Information and Computer Security, 2007,1(1/2): 169-184.
|
[4] |
REDDY Y B . A game theory approach to detect malicious nodes in wireless sensor networks[A]. Procof the 3rd International Conference on Sensor Technologies and Application[C]. Washington,DC,IEEE Computer Society, 2009. 462-468.
|
[5] |
SHEN S G , LI Y J , XU H Y . Signaling game based strategy of intrusion detection in wireless sensor networks[J]. Computers & Mathematics with Applications, 2011,62(6): 2404-2416.
|
[6] |
DADSK A . Preventing DoS attacks in wireless sensor net works:a repeated game theory approach[J]. International Journal of Network Security, 2007,5(2): 145-153.
|
[7] |
朱建明 . 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2009,(4): 828-834. ZHU J M . Evaluation model of information security technologies based on game theoretic[J]. Chinese Journal of Computers, 2009,(4): 828-834.
|
[8] |
张勇 . 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2011,22(3): 495-508. ZHANG Y . Network security situation awareness approach based on markov game model[J]. Journal of Softwar, 2011,22(3): 495-508.
|
[9] |
孙薇 . 基于演化博弈论的信息安全攻防问题研究[J]. 情报科学, 2008,(9): 1408-1412. SUN W . Research on attack and deference in information security based on evolutionary game[J]. Chinese Journal of Computers, 2008,(9), 1408-1412.
|
[10] |
姜伟 . 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009,(4): 817-827. JIANG W . Evaluating network security and optimal active defense based on attack-defense game model[J].Chinese Journal of Computers,2009(4),817-827.Chinese Journal of Computers, 2009,(4), 817-827.
|
[11] |
宋彪, 朱建明 . 基于业务流程的ERP信息安全进化熵的风险评估[J]. 通信学报, 2012,33(9): 210-215. SONG B , ZHU J M . Evolution entropy risk assessment of ERP information security based on the business process[J]. Journal of Communication, 2012,33(9): 210-215.
|
[12] |
蔡玲如 . 基于系统动力学的环境污染演化博弈问题研究[J]. 计算机科学, 2009(8): 234-257. CAI L R . System dynamics model for a mixed-strategy game of environmental pollution[J]. Computer Science, 2009(8): 234-257.
|
[13] |
钟远光, 贾晓菁, 李旭等 . 系统动力学[M]. 北京: 科学出版社, 2009. ZHONG Y G , JIA X J , LI X ,et al. System Dynamics[M]. Beijing: Science PressPress, 2009.
|
[14] |
STERMAN J D . Business Dynamics:Systems Thinking and Modeling for A Complex Word[M]. New York: McGraw-HillPress, 2000.
|
[15] |
林旺群 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011,48(2): 306-316. LIN W Q . Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2011,48(2): 306-316.
|
[16] |
杨刚, 薛惠锋 . 高校团队内知识转移的系统动力学建模与仿真[J]. 科学与科学技术管理, 2009,(6): 87-92. YANG G.XUE H F . Modeling and simulation of knowledge transfer in groups of universities using system dynamics[J]. Science of Science and Management of S & T, 2009,(6): 87-92.
|
[17] |
吴传荣, 曾德明, 陈英武 . 高技术企业技术创新网络的系统动力学建模与仿真[J]. 系统工程理论与实践, 2010(4): 587-593. WU C R ZENG D M , CHEN Y W . Modeling and simulation of high-tech enterprises innovation networks using system dynamics[J]. Systems engineering-theory & practice, 2010(4): 587-593.
|
[18] |
DONG-HWAN K , DOAHOON K . A system dynamics model for a mixed-strategy game between police and driver[J]. System Dynamics Review, 1997,(13): 33-52.
|
[19] |
姜永, 陈山枝, 胡博 . 异构无线网络中基于 Stackelberg 博弈的分布式定价和资源分配算法[J]. 通信学报, 2013,34(1): 61-67. JIANG Y , CHEN S Z , HV B . Stackelberg games-based distributed algorithm of pricing and resource allocation in heterogeneous wirelessnetworks[J]. Journal of Communication, 2013,34(1): 61-67.
|
[20] |
杨健 . 云计算安全问题研究综述[J]. 小型微型计算机系统, 2012,(3): 473-479. YANG J . Survey on some security issues of cloud computing[J]. Journal of Chinese Computer Systems, 2012,(3): 473-479.
|