[1] 方滨兴.从层次角度看网络空间安全技术的覆盖领域[J].网络与信息安全学报,2015,1(1):1-6. FANG Bing-xing.A hierarchy model on the research fields of cyberspace security technology[J].Chinese Journal of Network and Information Security,2015,1(1):1-6.(in Chinese)
[2] Gordon L,Loeb M.Budgeting process for information security expenditures[J].Communications of ACM,2016,49(9):121-125.
[3] Drew Fudenberg,Jean Tirole.Game Theory[M].Boston:Massachusetts Institute of Technology Press,2012.
[4] 朱建明,王秦.基于博弈论的网络空间安全若干问题分析[J].网络与信息安全学报,2015,1(1):43-49. ZHU Jian-ming,WANG Qin.Analysis of cyberspace security based on game theory[J].Chinese Journal of Network and Information Security,2015,1(1):43-49.(in Chinese)
[5] Lye K W,Jeannette W.Markov game strategies in network security[J].Information Security,2005,24(1):71-86.
[6] 余定坤,王晋东,张恒巍.静态贝叶斯博弈主动防御策略选取方法[J].西安电子科技大学学报,2016,43(1):163-169. YU Ding-kun,WANG Jin-dong,ZHANG Heng-wei.Active defense strategy selection based on static Bayesian game[J].Journal of Xidian University,2016,43(1):163-169.(in Chinese)
[7] 林旺群,王慧,刘家红.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2013,48(2):306-316. LIN Wang-qun,WANG Hui,LIU Jia-hong.Research on active defense technology in network security based on non-cooperative dynamic game theory[J].Journal of Computer Research and Development,2013,48(2):306-316.(in Chinese)
[8] 张恒巍,王晋东,李涛.基于攻防信号博弈模型的防御策略选取方法[J].通信学报,2016,37(5):32-43. ZHANG Heng-wei,WANG Jin-dong,Li Tao.Defense policies selection method based on attack-defense signaling game model[J].Journal on Communications,2016,37(5):32-43.(in Chinese)
[9] 张恒巍,李涛.基于多阶段攻防信号博弈的最优主动防御[J].电子学报,2017,45(2):431-439. ZHANG Heng-wei,LI Tao.Optimal active defense based on multi-stage attack-defense signaling game[J].Acta Electronica Sinica,2017,45(2):431-439.(in Chinese)
[10] 王元卓,于建业,邱雯.网络群体行为的演化博弈模型与分析方法[J].计算机学报,2015,38(2):282-300. WANG Yuan-zhuo,YU Jian-ye,QIU Wen.Evolutionary game model and analysis methods for network group behavior[J].Chinese Journal of Computers,2015,38(2):282-300.(in Chinese)
[11] 朱建明,宋彪,黄启发.基于系统动力学的网络安全攻防演化博弈模型[J].通信学报,2014,35(1):54-61. ZHU Jian-ming,SONG Biao,HUANG Qi-fa.Evolution game model of offense-defense for network security based on system dynamics[J].Journal on Communications,2014,35(1):54-61.(in Chinese)
[12] SUN Wei,KONG Xiangwei,HE Dequan.Research on attack and deference in information security based on evolutionary game[J].Information Science,2016,27(9),1408-1412.
[13] LIU Fengming,DING Yongsheng.Dynamics analysis of evolutionary game-based trust computing for P2P networks[J].Application Research of Computers,2016,33(8):2460-2463.
[14] 姜伟,方滨兴,田志宏.基于攻防随机博弈模型的防御策略选取研究[J].计算机研究与发展,2013,47(10):1714-1723. JIANG Wei,FANG Bing-xing,TIAN Zhi-hong.Research on defense strategies selection based on attack-defense stochastic game model[J].Journal of Computer Research and Development,2013,47(10):1714-1723.(in Chinese)
[15] 王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2013,33(9):1748-1764. WANG Yuanzhuo,LIN Chuang,CHENG Xueqi,et al.Analysis for network attack-defense based on stochastic game model[J].Chinese Journal of Computers,2013,33(9):1748-1764.(in Chinese)
[16] Herbert Gintis.Game Theory Evolving[M].Boston:Priceton University Press,2015.
[17] 方兆本,廖伯其.随机过程[M].北京:科学出版社,2015. FANG Zhao-ben,LIAO Bo-qi.Stochastic Process[M].Beijing:China Science Press,2015.(in Chinese)
[18] 张勇.基于Markov博弈模型的网络安全态势感知方法[J].软件学报,2016,22(3):495-508. ZHANG Yong.Network security situation awareness approach based on Markov game model[J].Journal of Software,2016,22(3):495-508.(in Chinese)
[19] Borkovsky R N,Doraszelski U,Kryukov Y.A user's guide to solving dynamic stochastic games using the homotopy method[J].Operation Research,2015,58(4):1116-1132.
[20] Doraszelski U,Escobar J F.A theory of regular Markov perfect equilibria in dynamic stochastic games genericity,stability and purification[J].Theoretical Economics,2015,5(2):369-402.
[21] Nilim A,Ghaoui L E.Robust control of Markov decision processes with uncertain transition matrices[J].Operations Research,2016,53(5):780-798.
[22] China National Vulnerability Database of Information Security[DB/OL].http://www.cnnvd.org.cn,2015-05-23/2016-10-26.
[23] Maleki H,Valizadeh M H,Koch W,et al.Markov modeling of moving target defense games[J].Cryptology and Security Engineering,2016,29(10):47-83.
[24] 张恒巍,余定坤.信号博弈网络安全威胁评估方法[J],西安电子科技大学学报,2016,43(3):137-143. ZHANG Heng-wei,YU Ding-kun.Network security threat assessment based on signaling game[J].Journal of Xidian University,2016,43(3):137-143.(in Chinese) |