[1] Bin-Xing F.A hierarchy model on the research fields of cyberspace security technology[J].Chinese Journal of Network & Information Security,2015,1(01):2-7. [2] Jajodia S.Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threats[M].New York:Springer-Verlag,2011.42-45. [3] 蔡桂林,王宝生,王天佐,罗跃斌,王小峰,崔新武.移动目标防御技术研究进展[J].计算机研究与发展,2016,53(05):968-987. CAI G L,WANG B S,WANG T Y,et al.Research on development ofmoving target defense technology[J].Journal of Computer Research and Development,2016,53(05):968-987.(in Chinese) [4] 刘效武,王慧强,吕宏武,禹继国,张淑雯.网络安全态势认知融合感控模型[J].软件学报,2016,27(08):2099-2114. LIU X W,WANG H Q,LV H W,et al.Fusion-based cognitive awareness-control model for network security situation[J].Journal of Software,2016,27(08):2099-2114.(in Chinese) [5] 朱建明,王秦.基于博弈论的网络空间安全若干问题分析[J].网络与信息安全学报,2015,1(01):43-49. ZHU J M,WANG Q.Analysis of cyberspace security based on game theory[J].Chinese Journal of Network and Information Security,2015,1(01):43-49.(in Chinese) [6] Pratyusa K.Manadhata.Game theoretic approaches to attack surface shifting[J].ACM Transactions on Information and System Security,2017,23(2):145-153. [7] Carter K M,Riordan J F,Okhravi H.A game theoretic approach to strategy determination for dynamic platform defenses[A].Proceedings of the First ACM Workshop on Moving Target Defense[C].New York:ACM,2014.21-30 [8] Kambhampati S,et al.Moving target defense for web applications using bayesian stackelberg games:(extended abstract)[A].2016 International Conference on Autonomous Agents and Multiagent Systems[C].Singapore:AAMAS,2016.1377-1378. [9] Filler T,Judas J,Fridrich J.Signaling game model:DDOS defense analysis[J].Journal of Security Engineering,2016,39(3):414-417. [10] Zhang H,Dingkun Y U,Han J,et al.Network security threat assessment based on the signaling game[J].Journal of Xidian University,2016,43(3):137-143.. [11] 张恒巍,余定坤,韩继红,王晋东,李涛.基于攻防信号博弈模型的防御策略选取方法[J].通信学报,2016,37(05):51-61. ZHANG H W,YU D K,HAN J H,et al.Network security threat assessment based on the signaling game[J].Journal on Communications,2016,37(05):51-61.(in Chinese) [12] Okhravi H,Comella A,Robinson E,et al.Creating a cyber moving target for critical infrastructure applications using platform diversity[J].International Journal of Critical Infrastructure Protection,2014,5(1):30-39. [13] Feng X,Zheng Z,Cansever D.A signaling game model for moving target defense[A].INFOCOM 2017-IEEE Conference on Computer Communications[C].Piscataway:IEEE,2017.1-9. [14] Huang S R,Zhang H W,et al.Markov differential game for network defense decision-making method[J].IEEE Access,2018,6:39621-39634 [15] Lei C,Zhang H Q,Wan L M,et al.Incomplete information Markov game theoretic approach to strategy generation for moving target defense[J].Computer Communications,2018,116:184-199. [16] 刘江,张红旗,刘艺.基于不完全信息动态博弈的动态目标防御最优策略选取研究[J].电子学报,2018,46(1):82-89. LIU J,ZHANG H Q,LIU Y.Research on optimal selection of moving target defense policy based on dynamic game with incomplete information[J].Acta Electronica Sinica,2018,46(1):82-89.(in Chinese) [17] Zhu Q,Başar T.Game-theoretic approach to feedback-driven multi-stage moving target defense[A].International Conference on Decision and Game Theory for Security[C].Berlin:Springer,2013.246-263. [18] Manadhata P K,Wing J M.An attack surface metric[J].IEEE Transactions on Software Engineering,2011,37(3):371-386. [19] Drew Fudenberg,Jean Tirole.Game Theory[M].Boston:Massachusetts Institute of Technology Press,2012.270-295. [20] Gao X,Zhu Y F.DDos Defense mechanism analysis based on signaling game model[A].Proceedings of the 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics[C].Piscataway:IEEE Press,2013.414-417. [21] Zangeneh V,Shajari M.A cost-sensitive move selection strategy for moving target defense[J].Computers & Security,2018,75(JUN.):72-91. [22] Sengupta S,Chowdhary A,Huang D,et al.General sum Markov games for strategic detection of advanced persistent threats using moving target defense in cloud networks[A].International Conference on Decision and Game Theory for Security[C].Berlin:Springer,2019.492-512 [23] Maleki H,Valizadeh S,Koch W,et al.Markov modeling of moving target defense games[A].Proceedings of the 2016 ACM Workshop on Moving Target Defense[C].New York:ACM,2016.81-92. [24] Gordon L,Loeb M,Lucyshyn W,Richardson R.2014 CSI/FBI computer crime and security survey[A].Proceedings of the Computer Security Institute[C].San Francisco,California:IEEE Press,2014.11-34. |