[1] |
方滨兴 . 从层次角度看网络空间安全技术的覆盖领域[J]. 网络与信息安全学报, 2015,1(1): 1-6.
|
|
FANG B X . A hierarchy model on the research fields of cyberspace security technology[J]. Chinese Journal of Network and Information Security, 2015,1(1): 1-6.
|
[2] |
GORDON L , LOEB M . Budgeting process for information security expenditures[J]. Communications of the ACM, 2018,49(9): 121-125.
|
[3] |
ANDERSON R , . Why information security is hard:an economic perspective[C]// Proceedings of 17th Annual Computer Security Application Conference. Piscataway:IEEE Press, 2019: 39-40.
|
[4] |
ESTEE W , JAN E . Identity deception detection:requirements and a model[J]. Information & Computer Security, 2019,27(4): 562-574.
|
[5] |
BASUS S , WONG J . A taxonomy of intrusion response systems[J]. International Journal of Information and Computer Security, 2019,1(1/2): 169-184.
|
[6] |
王增光, 卢昱, 李玺 . 基于攻防博弈的军事信息网络安全风险评估[J]. 军事运筹与系统工程, 2019,33(2): 35-40.
|
|
WANG Z G , LU Y , LI X . Risk evaluation of military information network security based on offensive and defensive games[J]. Military Operations Research and Systems Engineering, 2019,33(2): 35-40.
|
[7] |
朱建明, 王秦 . 基于博弈论的网络空间安全若干问题分析[J]. 网络与信息安全学报, 2015,1(1): 43-49.
|
|
ZHU J M , WANG Q . Analysis of cyberspace security based on game theory[J]. Chinese Journal of Network and Information Security, 2015,1(1): 43-49.
|
[8] |
JAJODIA S , SUBRAHMANLAN V S , SWARUP V ,et al. Cyber deception[M]. Berlin: SpringerPress, 2016.
|
[9] |
PANG Z H , LIU G P , ZHOU D H ,et al. Secure Networked control under deception attacks[M]. Berlin: SpringerPress, 2019: 147-163.
|
[10] |
张恒巍, 余定坤, 韩继红 ,等. 基于攻防信号博弈模型的防御策略选取方法[J]. 通信学报, 2016,37(5): 51-61.
|
|
ZHANG H W , YU D K , HAN J H ,et al. Defense policies selection method based on attack-defense signaling game model[J]. Journal on Communications, 2016,37(5): 51-61.
|
[11] |
吴昊, 范九伦, 赖成喆 ,等. 基于攻防博弈和蒙特卡洛模拟的网站防御策略选取方法[J]. 通信学报, 2018,39(8): 48-55.
|
|
WU H , FAN J L , LAI C Z ,et al. Website defense strategy selection method based on attack-defense game and Monte Carlo simulation[J]. Journal on Communications, 2018,39(8): 48-55.
|
[12] |
蒋侣, 张恒巍, 王晋东 . 基于信号博弈的移动目标防御最优策略选取方法[J]. 通信学报, 2019,40(6): 128-137.
|
|
JIANG L , ZHANG H W , WANG J D . Optimal strategy selection method for moving target defense based on signaling game[J]. Journal on Communications, 2019,40(6): 128-137.
|
[13] |
FORTI N , BATTISTELLI G , CHISCI L ,et al. Worst-case analysis of joint attack detection and resilient state estimation[C]// IEEE 56th Annual Conference on Decision and Control. Piscataway:IEEE Press, 2018: 182-188.
|
[14] |
RRUSHI J L , . Phantom projector:entrapping malware on machines in production[C]// International Conference on Malicious & Unwanted Software. Piscataway:IEEE Press, 2018: 57-66.
|
[15] |
林旺群, 王慧, 刘家红 . 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2017,48(2): 306-316.
|
|
LIN W Q , WANG H , LIU J H . Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2017,48(2): 306-316.
|
[16] |
王长春, 程晓航, 朱永文 ,等. 计算机网络对抗行动策略的 Markov博弈模型[J]. 系统工程理论与实践, 2017,34(9): 2402-2410.
|
|
WANG C C , CHENG X H , ZHU Y W ,et al. A Markov game model of computer network operation[J]. Systems Engineering -Theory & Practice, 2017,34(9): 2402-2410.
|
[17] |
贾召鹏, 方滨兴, 刘潮歌 ,等. 网络欺骗技术综述[J]. 通信学报, 2017,38(12): 128-143.
|
|
JIA S P , FANG B X , LIU C G ,et al. Survey on cyber deception[J]. Journal on Communications, 2017,38(12): 128-143.
|
[18] |
LYE K W , JEANNETTE W . Markov game strategies in network security[J]. International Journal of Information Security, 2018,4(1): 71-86.
|
[19] |
HERBERT G . Game theory evolving[M]. Boston: Princeton University PressPress, 2015:10.
|
[20] |
BORKOVSKY R N , DORASZELSKI U , KRYUKOV Y . A user’sguide to solving dynamic stochastic games using the homotopy method[J]. Operation Research, 2019,58(4): 1116-1132.
|
[21] |
王元卓, 于建业, 邱雯 . 网络群体行为的演化博弈模型与分析方法[J]. 计算机学报, 2018,38(2): 282-300.
|
|
WANG Y Z , YU J Y , QIU W . Evolutionary game model and analysis methods for network group behavior[J]. Chinese Journal of Computers, 2018,38(2): 282-300.
|
[22] |
姜伟, 方滨兴, 田志宏 . 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2017,47(10): 1714-1723.
|
|
JIANG W , FANG B X , TIAN Z H . Research on defense strategies selection based on attack-defense stochastic game model[J]. Journal of Computer Research and Development, 2017,47(10): 1714-1723.
|
[23] |
中国信息安全测评中心. 国家信息安全漏洞库[R].(2019-10-18)[2020-05-26].
|
|
CNITSEC. China national vulnerability database of information security[R].(2019-10-18)[2020-05-26].
|
[24] |
DORASZELSKI U , ESCOBAR J F . A theory of regular Markov perfect equilibria in dynamic stochastic games genericity,stability and purification[J]. Theoretical Economics, 2019,5(2): 369-402.
|
[25] |
杨峻楠, 张红旗, 张传富 . 基于不完全信息随机博弈的防御决策方法[J]. 网络与信息安全学报, 2018,4(8): 12-20.
|
|
YANG J N , ZHANG H Q , ZHANG C F . Defense decision-making method based on incomplete information stochastic game[J]. Chinese Journal of Network and Information Security, 2018,4(8): 12-20.
|
[26] |
NILIM A , GHAOUI L E . Robust control of Markov decision processes with uncertain transition matrices[J]. Operations Research, 2019,53(5): 780-798.
|
[27] |
张红旗, 杨峻楠, 张传富 . 基于不完全信息随机博弈与 Q-learning的防御决策方法[J]. 通信学报, 2018,39(8): 56-68.
|
|
ZHANG H Q , YANG J N , ZHANG C F . Defense decision-making method based on incomplete information stochastic game and Q-learning[J]. Journal on Communications, 2018,39(8): 56-68.
|