[1] Zhu Qiang,Li Fang-hua.Game theory of information security[J].Chinese Journal of Electronics,2015,21(3):1472-1486.
[2] Ocevcic H,Nenadic K,Solic K.Game theory:Active defense model and method[J].IEEE Information and Network Security,2015,51(8):395-406.
[3] Gordon L,Loeb M.Budgeting process for information security expenditures[J].Communications of the ACM,2015,49(11):121-125.
[4] WANG Yu-zhuo,YU Jian-ye,QIU Wen.Evolutionary game model and analysis methods for network group behavior[J].Chinese Journal of Computers,2015,38(2):282-300.
[5] JIANG Wei,FANG Bing-xing.Defense strategies selection based on attack-defense game model[J].Journal of Computer Research and Development,2014,47(12):714-723.
[6] White J,Park J S,Kamhoua C A,Kwiat K A.Game theoretic attack analysis in Online Social Network (OSN) services[A].Proceedings of the 2014 International Conference on Social Networks Technology[C].Los Angeles:IEEE,2014.1012-1019.
[7] WANG Jin-dong,YU Ding-kun,ZHANG Heng-wei.Active defense strategy selection based on static bayesian game[J].Journal of Xidian University,2016,43(1):144-151.
[8] LIU Yu-ling,FENG Deng-guo.Worm attack-defense strategy based on static bayesian game[J].Journal of Software,2014,23(12):712-723.
[9] Burke D.Towards a game theory model of information warfare[D].Montgomery,AL:Air force Institute of Technology,Air University,2015.
[10] Wang Chun-lei,Miao Qing,Dai Yi-qi.Network survivability analysis based on stochastic game model[J].Multimedia Information Networking and Security,2014,55(10):199-204.
[11] Yu Min,Liu Chao,Qiu Xin-liang,Zhao Shuang.Modelling and analysis of phishing attack using Stochastic Game[J].Cyberspace Technology,2015,46(3):300-305.
[12] LIN Wang-qun,WANG Hui,LIU Jia-hong.Research on active defense technology in network security based on non-cooperative dynamic game theory[J].Journal of Computer Research and Development,2014,48(11):306-316.
[13] Filler T,Judas J,Fridrich J.Signaling game model:DDOS defense analysis[J].Journal of Security Engineering,2015,39(3):414-417.
[14] ZHANG Hengwei,Han Ji-hong,Yu Ding-kun.Defense policies selection method based on attack-defense signaling game model[J].Journal on Communications,2016,37(5):39-49.
[15] Steven Tadelis.Game Theory:An Introduction[M].Princeton:Princeton University Press,2014.
[16] Richard Lippmann,Joshua W.Haines.Analysis and results of the DARPA off-line intrusion detection evaluation[A].Proceedings of the 17'th International Workshop on Recent Advances in Intrusion Detection[C].New York:ACM,2014.162-182.
[17] Zhu Jian-min,Song Biao,Huag Qi-fa.Evolution game model of of fense-defense for network security based on system dynamics[J].Journal on Communications,2015,35(1):54-61.
[18] ZHANG Hengwei,LI Tao,WANG Jindong.Optimal active defense using dynamic multi-stage signaling game[J].China Communications,2015,12(2):114-122.
[19] Thomas H.Cormen,Charles E.Leisers on,Ronald L.Rivest.Introduction to Algorithms[M].Boston:MIT Press,2009.
[20] 高志伟,姚尧,饶飞.基于漏洞严重程度分类的漏洞预测模型[J].电子学报,2014,42(9):1285-1287. GAO Zhi-wei,YAO Yao,RAO Fei.Predicting model of vulnerabilities based on the type of vulnerability severity[J].Acta Electronica Sinica,2014,42(9):1785-1787.(in Chinese)
[21] 刘奇旭,张翀斌,张玉清.安全漏洞等级划分关键技术研究[J].电子学报,2015,43(1):1779-1785. LIU Qi-xu,ZHANG Chong-bin,ZHANG Yu-qing.Research on key technology of vulnerability threat classification[J].Acta Electronica Sinica,2015,43(1):1779-1785.(in Chinese)
[22] CVSS.Common Vulnerability Scoring System[DB/OL].http://www.cve.mitre.org/,2014-09-17.
[23] Gordon L,Loeb M,Lucyshyn W,Richardson R.2015 CSI/FBI computer crime and security survey[A].Proceedings of the 2014 Computer Security Institute[C].San Francisco:IEEE,2015.48-64.
[24] SI Pengbo,ZHANG Qian,F.Richard.QoS aware dynamic resource management in heterogeneous cloud computing networks[J].China Communications,2014,41(5):144-159. |