[1] |
HERMANOWSKI D , . Open source security information management system supporting IT security audit[C]// IEEE International Conference on Cybernetics. 2015: 336-341.
|
[2] |
KATIPALLY R , GASIOR W , CUI X ,et al. Multistage attack detection system for network administrators using data mining[C]// BMJ. 2015: 1-4.
|
[3] |
FUDENBERG D , TIROLE J . Game theory[M]. Boston: Massachusettes Institute of Technology PressPress, 2015.
|
[4] |
朱建明, 王秦 . 基于博弈论的网络空间安全问题分析[J]. 通信学报, 2017,32(10): 43-49.
|
|
ZHU J M , WANG Q . Analysis of cyberspace security based on game theory[J]. Journal on Communications, 2017,32(10): 43-49.
|
[5] |
WHITE J , PARK J S , KAMHOUA C A ,et al. Game theoretic attack analysis in online social network (OSN) services[C]// IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 2013: 1012-1019.
|
[6] |
王元卓, 林闯, 程学旗 ,等. 基于随机博弈模型的网络攻防量化分析方法[J]. 计算机学报, 2015,33(9): 1748-1764.
|
|
WANG Y Z , LIN C , CHENG X Q ,et al. Analysis for network attack-defense based on stochastic game model[J]. Chinese Journal of Computers, 2015,33(9): 1748-1764.
|
[7] |
张恒巍, 余定坤, 韩继红 ,等. 基于攻防信号博弈模型的防御策略选取方法[J]. 通信学报, 2016,37(5): 51-61.
|
|
ZHANG H W , YU D K , HAN J H ,et al. Defense policies selection method based on attack-defense signaling game model[J]. Journal on Communications, 2016,37(5): 51-61.
|
[8] |
DAVID W K Y , LEON A P . Differential games theory[M]. New York: Springer PressPress, 2015.
|
[9] |
张恒巍, 李涛 . 基于攻防微分博弈的网络安全防御决策方法[J]. 电子学报, 2017,45(2): 431-439.
|
|
ZHANG H W , LI T . Defense strategy selection method based on attack-defense differential game model[J]. Acta Electronica Sinica, 2017,45(2): 431-439.
|
[10] |
NILIM A , GHAOUI L E . Active defense strategy selection based on differential game[J]. Operations Research, 2016,43(12): 163-169.
|
[11] |
范红旗, 王胜, 付强 . 二人微分对策问题信息模式的数学描述[J]. 电子学报, 2015,42(2): 1355-1361.
|
|
FAN H Q , WANG S , FU Q . Mathematical description for information pattern of stochastic differential games[J]. Acta Electronica Sinica, 2015,42(2): 1355-1361.
|
[12] |
NOWAK M A . Evolutionary dynamics:exploring the equations of life[M]. Boston: Harvard University PressPress, 2015.
|
[13] |
ROESCH M , . Snort-lightweight intrusion detection for networks[C]// The 13th System Administration Conference and Exhibition. 2015: 229-238.
|
[14] |
余定坤, 王晋东, 张恒巍 . 静态贝叶斯博弈主动防御策略选取方法[J]. 西安电子科技大学学报, 2016,43(1): 163-169.
|
|
YU D K , WANG J D , ZHANG H W . Active defense strategy selection based on static Bayesian game[J]. Journal of Xidian University, 2016,43(1): 163-169.
|
[15] |
石乐义, 赵俊楠, 李芹 ,等. 基于信令博弈的网络诱骗防御策略分析与仿真[J]. 系统仿真学报, 2016,28(2): 348-353.
|
|
SHI L Y , ZHAO J N , LI Q ,et al. Signaling game analysis and simulation on network decoy defense strategies[J]. Chinese Journal of System Simulation, 2016,28(2): 348-353.
|
[16] |
林闯, 王元卓, 汪洋 . 基于随机博弈模型的网络安全分析与评价[M]. 北京: 清华大学出版社, 2014.
|
|
LIN C , WANG Y Z , WANG Y . Analysis and evaluation for network security based on stochastic game model[M]. Beijing: Tsinghua University PressPress, 2014.
|
[17] |
LIU F M , DING Y S . Dynamics analysis of stochastic game based trust computing for networks[J]. Application Research of Computers, 2016,33(2): 460-463.
|
[18] |
SUN W , KONG X W , HE D Q ,et al. Research on attack and deference in information security based on stochastic game[J]. ACM Information security Science and technology, 2016,27(9): 1408-1412.
|
[19] |
GORDON L , LOEB M , LUCYSHYN W ,et al. 2016 CSI/FBI computer crime and security survey[C]// The 2016 Computer Security Institute. 2016: 48-66.
|