[1] Gordon L,Loeb M.Budgeting process for information security expenditures[J].Communications of the ACM,2016,49(10):121-125.
[2] 王元卓,于建业,邱雯.网络群体行为的演化博弈模型与分析方法[J].计算机学报,2015,38(2):282-300. WANG Yuan-zhuo,YU Jian-ye,QIU Wen.Evolutionary game model and analysis methods for network group behavior[J].Chinese Journal of Computers,2015,38(2):282-300.(in Chinese)
[3] 姜伟,方滨兴,田志宏.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2013,32(4):818-827. JIANG Wei,FANG Bing-xing.Defense strategies selection based on attack-defense game model[J].Chinese Journal of Computers,2013,47(12):818-827.(in Chinese)
[4] 余定坤,王晋东.静态贝叶斯博弈主动防御策略选取方法[J].西安电子科技大学学报,2016,43(1):163-169. YU Ding-kun,WANG Jin-dong.Active defense strategy selection based on static Bayesian game[J].Journal of Xidian University,2016,43(1):163-169.(in Chinese)
[5] WANG Yuan-zhuo,LIN Chuang,CHENG Xue-Qi,FANG Bing-xing.Evolutionary game model and analysis methods for network group behavior[J].Journal of Computer Science and Technology,2014,38(2):282-300.
[6] Wang Chun-lei,Miao Qing,Dai Yi-qi.Network survivability analysis based on stochastic game model[J].Multimedia Information Networking and Security,2015,55(10):199-204.
[7] 张恒巍,余定坤.信号博弈网络安全威胁评估方法[J],西安电子科技大学学报,2016,43(3):137-143. ZHANG Heng-wei,YU Ding-kun.Network security threat assessment based on signaling game[J].Journal of Xidian University,2016,43(3):137-143.(in Chinese)
[8] 张恒巍,王晋东,李涛.基于攻防信号博弈模型的防御策略选取方法[J].通信学报,2016,37(5):32-43. ZHANG Heng-wei,WANG Jin-dong,LI Tao.Defense policies selection method based on attack-defense signaling game model[J].Journal on Communications,2016,37(5):32-43.(in Chinese)
[9] SHEN S G,LI Y J,XU H Y.Signaling game based strategy of intrusion detection in wireless sensor networks[J].Computers & Mathematics with Applications,2015,62(6):2404-2416.
[10] Doraszel A.Preventing DDoS attacks in wireless sensor networks:a repeated game theory approach[J].ACM Transactions on Information and System Security,2015,13(2):145-153.
[11] 张恒巍,李涛.基于多阶段攻防信号博弈的最优主动防御[J].电子学报,2017,45(2):431-439. ZHANG Heng-wei,LI Tao.Optimal active defense based on multi-stage attack-defense signaling game[J].Acta electronica Sinica,2017,45(2):431-439.(in Chinese)
[12] 范红旗,王胜,付强.离散时间二人随机微分对策问题信息模式的数学描述[J].电子学报,2015,43(2):1355-1361. FAN Hong-qi,WANG Sheng,FU Qiang.Mathematical descriptionfor information pattern of stochastic differential games[J].Acta Electronica Sinica,2015,42(2):1355-1361.(in Chinese)
[13] Martin A Nowak.Evolutionary Dynamics:Exploring the Equations of Life[M].Boston:Harvard University Press,2013.
[14] David W K Yeung,Leon A Petrosyan.Differential Games Theory[M].New York:Springer Press,2014.
[15] Gordon L,Loeb M,Lucyshyn W,Richardson R.2015 CSI/FBI computer crime and security survey[A].Proceedings of the 2015 Computer Security Institute[C].San Francisco,USA:IEEE Press,2015.48-64.
[16] Maleki H,Valizadeh M,Koch W.Scalable simulation framework on network[DB/OL].http://www.ssfnet.org,2012-11-08/2016-09-23.
[17] Moore D,Shannon C,Voelker GM.Internet quarantine:Requirements for containing self-propagating code[A].Proceedings of the 22th International Conference of the IEEE Computer and Communications Societies[C].Houston,USA:IEEE Press,2015.169-179. |