[1] |
MITROPOULOS D , LOURIDAS P , POLYCHRONAKIS M ,et al. Defending against web application attacks:approaches,challenges and implications[J]. IEEE Transactions on Dependable and Secure Computing, 2017:1.
|
[2] |
ZHENG J , NAMIN A S . A survey on the moving target defense strategies:an architectural perspective[J]. Journal of Computer Science and Technology, 2019,34(1): 207-233.
|
[3] |
CAI G L , WANG B S , XING Q Q . Game theoretic analysis for the mechanism of moving target defense[J]. Frontiers of Information Technology & Electronic Engineering, 2017,18(12): 2017-2034.
|
[4] |
姜伟, 方滨兴, 田志宏 . 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2013,32(4): 818-827.
|
|
JIANG W , FANG B X , TIAN Z H . Defense strategies selection based on attack-defense game model[J]. Chinese Journal of Computers, 2013,47(12): 818-827.
|
[5] |
林旺群, 王慧, 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2013,48(2): 306-316.
|
|
LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2013,48(2): 306-316.
|
[6] |
MANADHATA P K . Game theoretic approaches to attack surface shifting[M]. New York: SpringerPress, 2013: 1-13.
|
[7] |
VADLAMUDI S G , SENGUPTA S , TAGUINOD M ,et al. Moving target defense for web applications using Bayesian Stackelberg games[C]// The 2016 International Conference on Autonomous Agents& Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 2016: 1377-1378.
|
[8] |
LEI C , ZHANG H Q , WAN L M ,et al. Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J]. Computer Communications, 2018,116: 184-199.
|
[9] |
MALEKI H , VALIZADEH M H , KOCH W ,et al. Markov modeling of moving target defense games[J]. Journal of Cryptology, 2016: 47-83.
|
[10] |
JAJODIA S , GHOSH A K , SWARUP V ,et al. Moving target defense:creating asymmetric uncertainty for cyber threats[J]. Springer Ebooks, 2011,54.
|
[11] |
LEI C , ZHANG H Q , WANG L M ,et al. Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J]. 2018,116: 184-199.
|
[12] |
ZHENG J J , NAMIN A S . A survey on the moving target defense strategies:an architectural perspective[J]. Journal of Computer Science and Technology, 2019,34(1): 207-233.
|
[13] |
谭晶磊, 张红旗, 雷程 ,等. 面向SDN的移动目标防御技术研究进展[J]. 网络与信息安全学报, 2018,4(7): 1-12.
|
|
TAN J L , ZHANG H Q , LEI C ,et al. Research progress on moving target defense for SDN[J]. Chinese Journal of Network and Information Security, 2018,4(7): 1-12.
|
[14] |
DIJK M V , ARI JUELS , ALINA OPREA ,et al. FlipIt:the game of“stealthy takeover”[J]. Journal of Cryptology, 2013,26(4): 655-713.
|
[15] |
ZHENG J , SIAMI NAMIN A . A Markov decision process to determine optimal policies in moving target[C]// The 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018: 2321-2323.
|
[16] |
刘江, 张红旗, 刘艺 . 基于不完全信息动态博弈的动态目标防御最优策略选取研究[J]. 电子学报, 2018,46(1): 82-89.
|
|
LIU J , ZHANG H Q , LIU Y . Research on optimal selection of moving target defense policy based on dynamic game with incomplete information[J]. Acta Electronica Sinica, 2018,46(1): 82-89.
|
[17] |
LEI C , MA D H , ZHANG H Q . Optimal strategy selection for moving target defense based on Markov game[J]. IEEE Access, 2017,PP(99):1.
|
[18] |
BORKOVSKY R N , DORASZELSKI U , KRYUKOV Y . A user’ s guide to solving dynamic stochastic games using the homotopy method[J]. Operation Research, 2015,58(4): 1116-1132.
|
[19] |
CHEN M , SAAD W , YIN C . Virtual reality over wireless networks:quality-of-service model and learning-based resource management[J]. IEEE Transactions on Communications, 2018,66(11): 5621-5635.
|
[20] |
NILIM A , GHAOUI L E . Robust control of Markov decision processes with uncertain transition matrices[J]. Operations Research, 2016,53(5): 780-798.
|
[21] |
SULEIMAN R . On gamesmen and fair men:explaining fairness in non-cooperative bargaining games[J]. Royal Society Open Science, 2018,5(2):171709.
|
[22] |
MANADHATA P K . Game theoretic approaches to attack surface shifting[M]. New York: SpringerPress, 2013: 1-13.
|
[23] |
CLARK A , SUN K , BUSHNELL L ,et al. A game-theoretic approach to IP address randomization in decoy-based cyber defense[C]// International Conference on Decision and Game Theory for Security. Springer, 2015: 3-21.
|