[1] |
LIANG X N , YANG X . Game theory for network security[J]. Com-munications Surveys & Tutorials, 2014,15(1): 472-486.
|
[2] |
ZONOUZ S A , KHURANA H , SANDERS W H . RRE:a game- theo-retic intrusion response and recovery engine[J]. Parallel and Distri-buted Systems, 2014,25(2): 395-406.
|
[3] |
FALLAH M S . A puzzle-based defense strategy against flooding at-tacks using game theory[J]. Dependable and Secure Computing, 2013,67(1): 5-19.
|
[4] |
姜伟, 方滨兴, 田志宏 . 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2013,47(10): 1714-1723. JIANG W , FANG B X , TIAN Z H . Research on defense strategies selection based on attack-defense stochastic game model[J]. Jour-nal of Computer Research and Development, 2013,47(10): 1714-1723.
|
[5] |
LYE K , WING J . Game strategies in network security[J]. International Journal of Information Security, 2015,54(1/2): 71-82.
|
[6] |
WHITE J , PARK J S , KAMHOUA C A , et al. Game theoretic attack analysis in online social network(OSN)services[C]// The 2014 Inter-national Conference on Social Networks Technology. Los Angeles, c2014: 1012-1019.
|
[7] |
WANG CL , MIAO Q , DAI YQ . Network survivability analysis based on stochastic game model[J]. Multimedia Information Networking and Security, 2014,55(10): 199-204.
|
[8] |
YU M , LIU C , QIU X L , et al. Modelling and analysis of phishing attack using stochastic game[J]. Cyberspace Technology, 2013,46(3): 300-305.
|
[9] |
林旺群, 王慧, 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2013,48(2): 306-316. LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2013,48(2): 306-316.
|
[10] |
BURKE D. . Towards a game theory model of information warfare[D]. Montgomery:Air University, 2013.
|
[11] |
刘玉岭, 冯登国, 吴丽辉 . 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估-ABE方案软件学报[J]. 软件学报, 2013,23(3): 712-723. LIU Y L , FENG D G , WU L H . Performance evaluation of worm at-tack and defense strategies based on static Bayesian game[J]. Journal of Software, 2013,23(3): 712-723.
|
[12] |
GAO X , ZHU Y F . DDoS defense menchanism analysis based on signaling game model[C]// The 5th International Conference on the Computer Security Institute. San Francisco, c2013: 414-417.
|
[13] |
LIN J Q , LIU P , JING J W . Using signaling games to model the mul-ti-step attack-defense scenarios on confidentiality[J]. Security Lecture Notes in Computer Science, 2014,39(6): 118-137.
|
[14] |
石乐义, 姜蓝蓝, 贾春福 . 蜜罐诱骗防御机理的博弈理论分析[J]. 电子与信息学报, 2012,34(6): 1420-1424. SHI L Y , JING L L , JIA C F . A game theoretic analysis for the honey-pot deceptive mechanism[J]. Journal of Electronics & Information Technology, 2012,34(6): 1420-1424.
|
[15] |
王元卓, 于建业, 邱雯 . 网络群体行为的演化博弈模型与分析方法[J]. 计算机学报, 2015,38(2): 282-300. WANG Y Z , YU J Y , QIU W . Evolutionary game model and analysis methods for network group behavior[J]. Chinese Journal of Computers, 2015,38(2): 282-300.
|
[16] |
BABAR S D , PRASAD N R , PRASAD R . Game theoretic modeling of WSN jamming attack and detection mechanism[J]. Wire Multi-media Communications, 2013,6983(6): 1-5.
|
[17] |
ROY S , ELLIS C , SHIVA S , et al. A survey of game theory as applied to network security[C]// The 47rd Hawaii International Conference on System Sciences. Washington D C, c2014: 15-24.
|
[18] |
FUDENBERG D , TIROLE J . Game theory[M]. Boston:Massachu-settes Institute of Technology Press, 2012.
|
[19] |
高志伟, 姚尧, 饶飞, 等. 基于漏洞严重程度分类的漏洞预测模型[J]. 电子学报, 2014,41(9): 1785-1787. GAO Z W , YAO Y , RAO F , et al. Predicting model of vulnerabilities based on the type of vulnerability severity[J]. Acta Electronica Sinica, 2014,41(9): 1785-1787.
|
[20] |
KAYODE A B , BABATUNDE I G , HARUNA D I . DGM approach to network attacker and defender strategies[C]// The 19th International Conference for Digital Object. New York, c2014: 313-320.
|
[21] |
GORDON L , LOEB M , LUCYSHYN W , et al. 2014 CSI/FBI com-puter crime and security survey[C]// The Computer Security Institute. San Francisco, c2014: 11-34.
|
[22] |
SI P , ZHANG Q , YV F R . QoS aware dynamic resource management in heterogeneous mobile cloud computing networks[J]. China Com-munications, 2014,41(5): 144-159.
|
[23] |
CVSS:national Nulnerability database version 2.5[EB/OL]. .
|