[1] ZONOUZ S A, KHURANA H, SANDERS W H. RRE: A Game-theoretic Intrusion Response and Recovery Engine [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 395-406.
[2] LIANG X N, XIAO Y. Game Theory for Network Security [J]. IEEE Communications Surveys & Tutorials, 2013, 15(1): 472-486.
[3] 姜伟, 方滨兴, 田志宏, 等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009, 32(4): 817-825.
JIANG Wei, FANG Bingxing, TIAN Zhihong, et al. Evaluating Network Security and Optimal Active Defense Based on Attack-defense Game Model [J]. Chinese Journal of Computers, 2009, 32(4): 817-825.
[4] 姜伟, 方滨兴, 田志宏, 等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010, 47(10): 1714-1723.
JIANG Wei, FANG Bingxing, TIAN Zhihong, et al. Research on Defense Strategies Selection Based on Attack-defense Stochastic Game Model [J]. Journal of Computer Research and Development, 2010, 47(10): 1714-1723.
[5] YU M, LIU C, QIU X L, et al. Modelling and Analysis of Phishing Attack Using Stochastic Game Nets[C]//International Conference on Cyberspace Technology. London: IET, 2013: 300-305.
[6] WANG C L, MIAO Q, DAI Y Q. Network Survivability Analysis Based on Stochastic Game Model[C]//Proceedings of the 4th International Conference on Multimedia Information Networking and Security. Washington: IEEE Computer Society, 2012: 99-104.
[7] 林旺群, 王慧, 刘佳宏, 等. 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011, 48(2): 306-316.
LIN Wangqun, WANG Hui, LIU Jiahong et.al. Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory [J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
[8] 刘玉岭, 冯登国, 吴丽惠, 等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012, 23(3): 712-723.
LIU Yuling, FENG Dengguo, WU Lihui, et al. Performance Evaluation of Worm Attack and Defense Strategies Based on Static Bayesian Game [J]. Journal of Software, 2012, 23(3):712-723.
[9] NGUYEN K C, ALPCAN T, BASAR T. Security Games with Incomplete Information[C]//2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009: 5199443.
[10] LIU P, ZANG W Y, YU M. Incentive-based Modeling and Inference of Attacker Intent, Objectives, and Strategies[J]. ACM Transactions on Information and System Security, 2005, 8(1): 78-118.
[11] LIU Y, COMANICIU C, MAN H. A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks [C]//Proceedings of the 2006 Workshop on Game Theory for Communications and Networks. New York: ACM, 2006: 1190198.
[12] 陈永强, 付钰, 吴晓平, 等. 基于非零和博弈模型的主动防御策略选取方法[J]. 计算机应用, 2013, 33(5): 1347-1349.
CHEN Yongqiang, FU Yu, WU Xiaoping. et al. Active Defense Strategy Selection Based on Non-zero-sum Attack-defense Game Model [J]. Journal of Computer Applications. 2013, 33(5): 1347-1349.
[13] KAYODE A B, BABATUNDE I G, ISRAEL H D. DGM Approach to Network Attacker and Defender Strategies[C]//8th International Conference for Internet Technology and Secured Transactions. Piscataway: IEEE Computer Society, 2013: 313-320. |