[1] Moore D,Shannon C,Voelker G M.Budgeting process for information security expenditures[J].Communications of the ACM,2016,49(10):121-125.
[2] Drew Fudenberg,Jean Tirole.Game Theory[M].Boston:Massachusettes Institute of Technology Press,2015.
[3] White J,Park J S,Kamhoua C A,et al.Game theoretic attack analysis in online social network services[A].2016 International Conference on Social Networks Technology[C].Los Angeles:IEEE Press, 2016.312-319.
[4] Shordon L,Meliyt J.Network survivability analysis based on game model[J].Multimedia Information Networking and Security,2016,55(5):199-204.
[5] 张恒巍,李涛.基于多阶段攻防信号博弈的最优主动防御[J].电子学报,2017,45(2):431-439.ZHANG Heng-wei,LI Tao.Optimal active defense based on multi-stage attack-defense signaling game[J].Acta Electronica Sinica,2017,45(2):431-439.(in Chinese)
[6] David W K Yeung,Leon A Petrosyan.Differential Games Theory[M].New York:Springer Press,2014.
[7] Nilim A,Ghaoui L E.Active defense strategy selection based ondifferential game[J].Operations Research,2016,43(12):163-169.
[8] 张恒巍,黄世锐.基于攻防微分博弈的网络安全防御决策方法[J].电子学报,2017,45(6):887-894.ZHANG Heng-wei,HUANG Shi-rui.Network defense decision-making method based on attack-defense differential game[J].Acta Electronica Sinica,2017,45(6):887-894.(in Chinese)
[9] Erwin A,Alex P.Modeling analysis and control of network security based on Markov games[J].IEEE Transactions on Automatic Control,2017,57(5):41-49.
[10] SUN Wei,KONG Xiangwei,HE Dequan,et al.Research on attack and deference in information security based onstochastic game[J].ACM Information security Science and Technology,2015,27(9),1408-1412.
[11] 王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2014,33(9):1748-1764.WANG Yuan-zhuo,LIN Chuang,CHENG Xue-qi,et al.Analysis fornetwork attack-defense based on stochastic game model[J].Chinese Journal of Computers,2014,33(9):1748-1764.(in Chinese)
[12] 范红旗,王胜.二人微分对策问题信息模式的数学描述[J].电子学报,2015,42(2):355-361.FAN Hong-qi,WANG Sheng.Mathematical descriptionfor information pattern of stochastic differential games[J].Acta Electronica Sinica,2015,42(2):355-361.(in Chinese)
[13] Martin A Nowak.Evolutionary Dynamics:Exploring the Equations of Life[M].Boston:Harvard University Press,2013.
[14] Richard Lippmann,Joshua W Haines.Analysis and results of the network intrusion detection evaluation[A].The 19'th International Workshop on Recent Advances in Intrusion Detection[C].New York:ACM Press,2016.162-182.
[15] Nilim A,Ghaoui L E.Robust control of Markov decision processes with uncertain transition matrices[J].Operations Research,2016,53(5):780-798.
[16] Valizadeh M,Koch W.Scalable Simulation Framework on Network[DB/OL].http://www.ssfnet.org,2012-11-08/2017-06-16.
[17] Gordon L,Loeb M,Lucyshyn W,Richardson R.2015 CSI/FBI computer crime and security survey[A].2015 Computer Security Institute[C].San Francisco:IEEE Press,2015.169-179. |