[1] |
张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164.
|
|
ZHANG H G , HAN W B , LAI X J ,et al. Surveyon cyberspace security[J]. Scientia Sinica:Informationis, 2016,46(2): 125-164.
|
[2] |
SHI H , WANG W , KWOK N ,et al. Game theory for wireless sensor network:a survey[J]. Sensors, 2012,12(7): 113-122.
|
[3] |
沈士根, 刘建华, 曹奇英 . 博弈论与无线传感器网络安全[M]. 北京: 清华大学出版社, 2016.
|
|
SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor network security[M]. Beijing: Tsinghua University PressPress, 2016.
|
[4] |
ABDALZAHERM , SEDDIK K , ELSABROUTY M ,et al. Game theory meets wireless sensor network security requirements and threats mitigation:asurvey[J]. Sensors, 2016,16(7): 1-27.
|
[5] |
沈士根, 黄龙军, 胡珂立 ,等. 基于微分博弈的在线社交网络恶意程序传播优化控制方法[J]. 电信科学, 2015,31(10): 66-73.
|
|
SHEN S G , HUANG L J , HU K L ,et al. Differential game-based optimal control method for preventing malware propagation in online social network[J]. Telecommunications Science, 2015,31(10): 66-73.
|
[6] |
沈士根, 冯晟, 周海平 ,等. 基于云计算和动态贝叶斯博弈的WSN恶意程序传播优化抑制方法[J]. 电信科学, 2018,34(9).
|
|
SHEN S G , FENG S , ZHOU H P ,et al. Optimal approach to suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications Science, 2018,34(9).
|
[7] |
沈士根, 周海平, 黄龙军 ,等. 基于最优反应均衡的传感网恶意程序传播抑制方法[J]. 传感技术学报, 2017,30(10): 1589-1595.
|
|
SHEN S G , ZHOU H P , HUANG L J ,et al. Quanta response equilibrium-based method for preventing WSN malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(10): 1589-1595.
|
[8] |
沈士根, 黄龙军, 周海平 ,等. 面向恶意程序传播的异质WSN 稳态可用度评估[J]. 传感技术学报, 2017,30(7): 1100-1105.
|
|
SHEN S G , HUANG L J , ZHOU H P ,et al. Steady-state availability evaluation for heterogeneous WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(7): 1100-1105.
|
[9] |
沈士根, 范恩, 胡珂立 ,等. 面向恶意程序传播的传感网可靠度评估[J]. 电子学报, 2018,46(1): 75-81.
|
|
SHEN S G , FAN E , HU K L ,et al. Reliability evaluation for WSN with malware spread[J]. Acta Electronica Sinica, 2018,46(1): 75-81.
|
[10] |
庄克琛, 张宏, 张琨 ,等. 无线传感器网络中的病毒传播动力学研究[J]. 计算机科学, 2013,40(3): 187-191.
|
|
ZHUANG K C , ZHANG H , ZHANG K ,et al. Analysis of spreading dynamics of virus in wireless sensor network[J]. Computer Science, 2013,40(3): 187-191.
|
[11] |
熊自立, 韩兰胜, 徐行波 ,等. 基于博弈的无线传感器网络入侵检测模型[J]. 计算机科学, 2017,44(S1): 326-332.
|
|
XIONG Z L , HAN L S , XU H B ,et al. Research on intrusion detection of wireless sensor network based on game theory[J]. Computer Science, 2017,44(S1): 326-332.
|
[12] |
周伟伟, 郁滨 . WSN 多阶段入侵检测博弈最优策略研究[J]. 电子与信息学报, 2018,40(1): 63-71.
|
|
ZHOU W W , YU B . Optimal defense strategy in WSN based on the game of multi-stage intrusion detection[J]. Journal of Electronics & Information Technology, 2018,40(1): 63-71.
|
[13] |
CHENG Z . A differential game model between intrusion detection system and attackers for wireless sensor network[J]. Wireless Personal Communications, 2016,90(3): 1211-1219.
|
[14] |
SEDJELMACI H , SENOUCI S , ANSARI N . Intrusion detection and ejection framework against lethal attacks in UAV-aided network:a Bayesian game-theoretic methodology[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(5): 1143-1153.
|
[15] |
王小明, 李成博, 李英姝 . 移动无线传感网恶意数据包传播随机模型[J]. 电子与信息学报, 2013,35(6): 1290-1297.
|
|
WANG X M , LI C B , LI Y Z . A stochastic model of malicious data packet propagation in mobile wireless sensor network[J]. Journal of Electronics & Information Technology, 2013,35(6): 1290-1297.
|
[16] |
曹玉林, 王小明, 何早波 . 移动无线传感网中恶意软件传播的最优安全策略[J]. 电子学报, 2016,44(8): 1851-1857.
|
|
CAO Y L , WANG X M , HE Z B . Optimal security strategy for malware propagation mobile wireless sensor network[J]. Acta Electronica Sinica, 2016,44(8): 1851-1857.
|
[17] |
SINGH A , AWASTHI A , SINGH K ,et al. Modeling and analysis of worm propagation in wireless sensor network[J]. Wireless Personal Communications, 2018,98(3): 2535-2551.
|
[18] |
WANG T , WU Q , WEN S ,et al. Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator network[J]. Sensors, 2017,17(12): 139-155.
|
[19] |
LIU W,LIU,C , YANG Z ,et al. Modeling the propagation of mobile malware on complex network[J]. Communications in Nonlinear Science and Numerical Simulation, 2016(37): 249-264.
|
[20] |
CHRISTOPHE B , LIZA C , CORINNE T . Optimal design and defense of network under link attacks[J]. Journal of Mathematical Economics, 2017(68): 62-79.
|