[1] ROESCH M. Snort-Lightweight Intrusion Detection for Networks[C]//Proceedings of the 13th System Administration Conference and Exhibition. Berkeley: USENIX, 1999: 229-238.
[2] 杨宏宇, 江华. 基于攻击图的多Agent网络安全风险评估模型[J]. 计算机科学, 2013, 40(2): 148-152.
YANG Hongyu, JIANG Hua. Multi-agents Network Security Risk Evaluation Model Based on Attack Graph Assocation[J]. Computer Science, 2013, 40(2): 148-152.
[3] 谢丽霞, 仇晓锐, 李学菲. 基于攻击图模型的网络安全风险评估研究[J]. 微电子学与计算机, 2014, 31(7): 77-83.
XIE Lixia, QIU Xiaorui, LI Xuefei. Research on Network Security Risk Assessment Based on Attack Graph Model[J]. Microelectronics and Computer, 2014, 31(7): 77-83.
[4] 张永铮, 方滨兴, 迟悦. 用于评估网络信息系统的风险传播模型[J]. 软件学报, 2007, 18(1): 137-145.
ZHANG Yongzheng, FANG Bingxing, CHI Yue. Risk Propagation Model for Assessing Network Information Systems[J]. Journal of Software, 2007, 18(1): 137-145.
[5] FALLAH M S. A Puzzle-based Defense Strategy Against Flooding Attacks Using Game Theory[J]. Dependable and Secure Computing, 2010, 7(1): 5-19.
[6] LYE K, WING J. Game Strategies in Network Security[J]. International Journal of Information Security, 2005, 4(1/2): 71-82.
[7] 姜伟, 方滨兴, 田志宏,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009, 32(4): 817-825.
JIANG Wei, FANG Bingxing, TIAN Zhihong, et al. Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model [J]. Chinese Journal of Computers, 2009, 32(4): 817-825.
[8] WHITE J, PARK J S, KAMHOUA C A, et al. Game Theoretic Attack Analysis in Online Social Network(OSN) Services[C]//IEEE/ACM International Conference on Social Networks Analysis and Mining. New York: ACM, 2013: 1012-1019.
[9] 林旺群, 王慧, 刘佳宏, 等. 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011, 48(2): 306-316.
LIN Wangqun, WANG Hui, LIU Jiahong, et al. Research on Active Defense Technology in Network Security Based on Non-cooperative Dynamic Game Theory [J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
[10] 刘玉岭, 冯登国, 吴力辉, 等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012, 23(3): 712-723.
LIU Yuling, FENG Dengguo, WU Lihui, et al. Performance Evaluation of Worm Attack and Defense Strategies Based on Static Bayesian Game [J]. Journal of Software, 2012, 23(3): 712-723.
[11] GAO X, ZHU Y F. DDoS Defense Menchanism Analysis Based on Signaling Game Model[C]//Proceedings of the 5th Interantional Conference on Intelligent Human-Machine Systems and Cybernetics. Washington: IEEE Computer Society, 2013: 414-417.
[12] BABAR S D, PRASAD N R, PRASAD R. Game Theoretic Modelling of WSN Jamming Attack and Detection Mechanism[C]//Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications. Washington: IEEE Computer Society, 2013: 1-5.
[13] KAYODE A B, BABATUNDE I G, ISRAEL H D, et al. DGM Approach to Network Attacker and Defender Strategies[C]//Proceedings of the 8th International Conference for Digital Object Internet Technology and Secured Transactions. Washington: IEEE Computer Society, 2013: 313-320. |