[1] |
罗军舟, 杨明, 凌振 ,等. 网络空间安全体系与关键技术[J]. 中国科学:信息科学, 2016,46(8): 939-968. LUO J Z , YANG M , LING Z ,et al. Architecture and key technologies of cyberspace security[J]. Scientia Sinica:Informationis, 2016,46(8): 939-968.
|
[2] |
张焕国, 韩文报, 来学嘉 ,等. 网络空间安全综述[J]. 中国科学:信息科学, 2016,46(2): 125-164. ZHANG H G , HAN W B , LAI X J ,et al. Survey on cyberspace security[J]. Scientia Sinica:Informationis, 2016,46(2): 125-164.
|
[3] |
沈士根, 黄龙军, 范恩 ,等. 受恶意程序传染的WSN可生存性评估[J]. 传感技术学报, 2016,29(7): 1083-1089. SHEN S G , HUANG L J , FAN E ,et al. Survivability evaluation for WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2016,29(7): 1083-1089.
|
[4] |
沈士根, 刘建华, 曹奇英 . 博弈论与无线传感器网络安全[M]. 北京: 清华大学出版社, 2016. SHEN S G , LIU J H , CAO Q Y . Game theory meets wireless sensor networks security[M]. Beijing: Tsinghua University PressPress, 2016.
|
[5] |
沈士根, 黄龙军, 周海平 ,等. 面向恶意程序传播的异质WSN 稳态可用度评估[J]. 传感技术学报, 2017,30(7): 1100-1105. SHEN S G , HUANG L J , ZHOU H P ,et al. Steady-state availability evaluation for heterogeneous WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(7): 1100-1105.
|
[6] |
沈士根, 范恩, 胡珂立 ,等. 面向恶意程序传播的传感网可靠度评估[J]. 电子学报, 2018,46(1): 75-81. SHEN S G , FAN E , HU K L ,et al. Reliability evaluation for WSN with malware spread[J]. Acta Electronica Sinica, 2018,46(1): 75-81.
|
[7] |
沈士根, 周海平, 黄龙军 ,等. 基于最优反应均衡的传感网恶意程序传播抑制方法[J]. 传感技术学报, 2017,30(10): 1589-1595. SHEN S G , ZHOU H P , HUANG L J ,et al. Quantal response equilibrium-based method for preventing WSN malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(10): 1589-1595.
|
[8] |
ILLIANO V P , LUPU E C . Detecting malicious data injections in wireless sensor networks:a survey[J]. ACM Computing Surveys, 2015,48(2):33.
|
[9] |
YANG Y , ZHU S , CAO G . Improving sensor network immunity under worm attacks:a software diversity approach[J]. Ad Hoc Networks, 2016,(47): 26-40.
|
[10] |
GHOSAL A , HALDER S . A survey on energy efficient intrusion detection in wireless sensor networks[J]. Journal of Ambient Intelligence and Smart Environments, 2017,9(2): 239-261.
|
[11] |
ZARPEL?O B B , MIANI R S , KAWAKANI C T ,et al. A survey of intrusion detection in Internet of things[J]. Journal of Network and Computer Applications, 2017(84): 25-37.
|
[12] |
曹旭, 曹瑞彤 . 基于大数据分析的网络异常检测方法[J]. 电信科学, 2014,30(6): 152-156. CAO X , CAO R T . Network anomaly prediction method based on big data[J]. Telecommunications Science, 2014,30(6): 152-156.
|
[13] |
柳毅, 洪俊斌 . 基于网络爬虫与页面代码行为的XSS漏洞动态检测方法[J]. 电信科学, 2016,32(3): 87-91. LIU Y , HONG J B . A dynamic detection method based on Web crawler and page code behavior for XSS vulnerability[J]. Telecommunications Science, 2016,32(3): 87-91.
|
[14] |
李传煌, 孙正君, 袁小雍 ,等. 基于深度学习的实时DDoS攻击检测[J]. 电信科学, 2017,33(7): 53-65. LI C H , SUN Z J , YUAN X Y ,et al. Real-time DDoS attack detection based on deep learning[J]. Telecommunications Science, 2017,33(7): 53-65.
|
[15] |
汪来富, 金华敏, 刘东鑫 ,等. 面向网络大数据的安全分析技术应用[J]. 电信科学, 2017,33(3): 112-118. WANG L F , JIN H M , LIU D X ,et al. Application of security analysis technology for network big data[J]. Telecommunications Science, 2017,33(3): 112-118.
|
[16] |
刘建华, 李明禄, 李大志 ,等. 工业无线传感云中面向移动机器人的自适应信任演化机制[J]. 电信科学, 2017,33(6): 86-96. LIU J H , LI M L , LI D Z ,et al. Adaptation trust evolution scheme for mobile robot in industrial wireless sensor-cloud[J]. Telecommunications Science, 2017,33(6): 86-96.
|
[17] |
IQBAL S , MAT KIAH M L , DHAGHIGHI B ,et al. On cloud security attacks:a taxonomy and intrusion detection and prevention as a service[J]. Journal of Network and Computer Applications, 2016(74): 98-120.
|
[18] |
SUN H , WANG X , BUYYA R ,et al. CloudEyes:cloud-based malware detection with reversible sketch for resource- constrained internet of things (IoT) devices[J]. Software- Practice and Experience, 2017,47(3): 421-441.
|
[19] |
王晋东, 余定坤, 张恒巍 ,等. 静态贝叶斯博弈主动防御策略选取方法[J]. 西安电子科技大学学报, 2016,43(1): 144-150. WANG J D , YU D K , ZHANG H W ,et al. Active defense strategy selection based on the static Bayesian game[J]. Journal of Xidian University, 2016,43(1): 144-150.
|
[20] |
刘玉岭, 冯登国, 吴丽辉 ,等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012,23(3): 712-723. LIU Y L , FENG D G , WU L H ,et al. Performance evaluation of worm attack and defense strategies based on static Bayesian game[J]. Journal of Software, 2012,23(3): 712-723.
|
[21] |
沈士根, 黄龙军, 胡珂立 ,等. 基于微分博弈的在线社交网络恶意程序传播优化控制方法[J]. 电信科学, 2015,31(10): 66-73. SHEN S G , HUANG L J , HU K L ,et al. Differential game-based optimal control method for preventing malware propagation in online social network[J]. Telecommunications Science, 2015,31(10): 66-73.
|
[22] |
张恒巍, 李涛 . 基于多阶段攻防信号博弈的最优主动防御[J]. 电子学报, 2017,45(2): 431-439. ZHANG H W , LI T . Optimal active defense based on multi-stage attack-defense signaling game[J]. Acta Electronica Sinica, 2017,45(2): 431-439.
|
[23] |
黄健明, 张恒巍, 王晋东 ,等. 基于攻防演化博弈模型的防御策略选取方法[J]. 通信学报, 2017,38(1): 168-176. HUANG J M , ZHANG H W , WANG J D ,et al. Defense strategies selection based on attack-defense evolutionary game model[J]. Journal of Communications, 2017,38(1): 168-176.
|
[24] |
SPYRIDOPOULOS T , MARASLIS K , MYLONAS A ,et al. A game theoretical method for cost-benefit analysis of malware dissemination prevention[J]. Information Security Journal, 2015,24(4-6): 164-176.
|
[25] |
YUAN Y , SUN F , LIU H . Resilient control of cyber-physical systems against intelligent attacker:a hierarchal stackelberg game approach[J]. International Journal of Systems Science, 2016,47(9): 2067-2077.
|
[26] |
周恒杰, 孙闽红, 钟华 ,等. 基于不完全信息动态博弈的多信道无线网络抗干扰传输[J]. 电信科学, 2018,34(2): 39-45. ZHOU H J , SUN M H , ZHONG H ,et al. Anti-jamming transmission in a multi-channel wireless network based on incomplete information dynamic game[J]. Telecommunications Science, 2018,34(2): 39-45.
|
[27] |
WANG K , DU M , YANG D ,et al. Game-theory-based active defense for intrusion detection in cyber-physical embedded systems[J]. ACM Transactions on Embedded Computing Systems, 2016,16(1): 18-21.
|
[28] |
NAUMAN M , AZAM N , YAO J . A three-way decision making approach to malware analysis using probabilistic rough sets[J]. Information Sciences, 2016(374): 193-209.
|
[29] |
HAYEL Y , ZHU Q . Epidemic protection over heterogeneous networks using evolutionary poisson games[J]. IEEE Transactions on Information Forensics and Security, 2017,12(8): 1786-1800.
|