[1] |
ARMBRUST M , FOX A , GRIFFITH R ,et al. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
|
[2] |
HU Y C , PATEL M , SABELLA D ,et al. Mobile edge computing-a key technology towards 5G[R]. 2015.
|
[3] |
LUAN T H , GAO L X , LI Z ,et al. Fog computing:focusing on mobile users at the edge[J]. arXiv Preprint,arXiv:1502.01815, 2015.
|
[4] |
PRABAVATHY S , SUNDARAKANTHAM K , SHALINIE S M . Design of cognitive fog computing for intrusion detection in Internet of things[J]. Journal of Communications and Networks, 2018,20(3): 291-298.
|
[5] |
李韵, 黄辰林, 王中锋 ,等. 基于机器学习的软件漏洞挖掘方法综述[J]. 软件学报, 2020,31(7): 2040-2061.
|
|
LI Y , HUANG C L , WANG Z F ,et al. Survey of software vulnerability mining methods based on machine learning[J]. Journal of Software, 2020,31(7): 2040-2061.
|
[6] |
张玉清, 董颖, 柳彩云 ,等. 深度学习应用于网络空间安全的现状、趋势与展望[J]. 计算机研究与发展, 2018,55(6): 1117-1142.
|
|
ZHANG Y Q , DONG Y , LIU C Y ,et al. Situation,trends and prospects of deep learning applied to cyberspace security[J]. Journal of Computer Research and Development, 2018,55(6): 1117-1142.
|
[7] |
LEE S J , YOO P D , ASYHARI A T ,et al. IMPACT:impersonation attack detection via edge computing using deep autoencoder and feature abstraction[J]. IEEE Access, 2020,8: 65520-65529.
|
[8] |
李忠成, 高惠燕, 张文祥 . 边缘计算中改进 ELM 的高效入侵检测算法[J]. 计算机测量与控制, 2021,29(7): 223-228,234.
|
|
LI Z C , GAO H Y , ZHANG W X . An efficient edge computing intrusion detection algorithm based on improved ELM[J]. Computer Measurement & Control, 2021,29(7): 223-228,234.
|
[9] |
SUDQI K B , ABDUL W A W B , IDRIS M Y I B ,et al. A lightweight perceptron-based intrusion detection system for fog computing[J]. Applied Sciences, 2019,9(1): 178.
|
[10] |
SOUZA C A D , WESTPHALL C B , MACHADO R B ,et al. Hybrid approach to intrusion detection in fog-based IoT environments[J]. Computer Networks, 2020,180: 107417.
|
[11] |
SYVERSON P F , . A different look at secure distributed computation[C]// Proceedings of the 10th IEEE Workshop on Computer Security Foundations. Piscataway:IEEE Press, 1997: 109-115.
|
[12] |
陈赵懿, 高秀峰, 王帅 . 攻防博弈下的Ad hoc网络风险预测[J]. 火力与指挥控制, 2020,45(8): 16-21.
|
|
CHEN Z Y , GAO X F , WANG S . Risk prediction of ad hoc network based on game[J]. Fire Control & Command Control, 2020,45(8): 16-21.
|
[13] |
AN X S , LIN F H , XU S G ,et al. A novel differential game model-based intrusion response strategy in fog computing[J]. Security and Communication Networks, 2018,2018: 1-9.
|
[14] |
苗莉 . 边缘计算环境下安全防御模型及算法研究[D]. 北京:北京科技大学, 2019.
|
|
MIAO L . Research on security defense model and algorithm in edge computing[D]. Beijing:University of Science and Technology Beijing, 2019.
|
[15] |
ALPCAN T , BA?AR T , . Network security a decision and game-theoretic approach[M]. Cambridge: Cambridge University Press, 2010.
|
[16] |
石进, 陆音, 谢立 . 基于博弈理论的动态入侵响应[J]. 计算机研究与发展, 2008,45(5): 747-757.
|
|
SHI J , LU Y , XIE L . Dynamic intrusion response based on game theory[J]. Journal of Computer Research and Development, 2008,45(5): 747-757.
|
[17] |
姜伟, 方滨兴, 田志宏 ,等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010,47(10): 1714-1723.
|
|
JIANG W , FANG B X , TIAN Z H ,et al. Research on defense strategies selection based on attack-defense stochastic game model[J]. Journal of Computer Research and Development, 2010,47(10): 1714-1723.
|
[18] |
王元卓, 于建业, 邱雯 ,等. 网络群体行为的演化博弈模型与分析方法[J]. 计算机学报, 2015,38(2): 282-300.
|
|
WANG Y Z , YU J Y , QIU W ,et al. Evolutionary game model and analysis methods for network group behavior[J]. Chinese Journal of Computers, 2015,38(2): 282-300.
|
[19] |
BABAR S D , PRASAD N R , PRASAD R . Game theoretic modelling of WSN jamming attack and detection mechanism[C]// Proceedings of 2013 16th International Symposium on Wireless Personal Multimedia Communications (WPMC). Piscataway:IEEE Press, 2013: 1-5.
|
[20] |
HARSANYI J C . Games with incomplete information played by“Bayesian” players,I-III[J]. Management Science, 2004,50(12): 1804-1817.
|
[21] |
KANTZAVELOU I , KATSIKAS S . A generic intrusion detection game model in IT security[C]// Proceedings of the 5th International Conference on Trust,Privacy and Security in Digital Business. New York:ACM Press, 2008: 151-162.
|
[22] |
NASH J F . Equilibrium points in N-person games[J]. Proceedings of the National Academy of Sciences of the United States of America, 1950,36(1): 48-49.
|
[23] |
DU S G , LI X L , DU J B ,et al. An attack-and-defence game for security assessment in vehicular ad hoc networks[J]. Peer-to-Peer Networking and Applications, 2014,7(3): 215-228.
|