[1] 姜伟, 方滨兴, 田志宏, 等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009, 32(4): 817-827. Jiang Wei, Fang Binxing, Tian Zhihong, et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4): 817-827.
[2] Liu Peng, Zang Wanyu, Yu Meng. Incentive-based modeling and inference of attacker intent, objectives, and strategies. ACM Transactions on Information and System Security, 2005, 8(1): 1-41.
[3] Lye K, Wing J M. Game strategies in network security[C]//Proceedings of the 15th IEEE Computer Security Foundations Workshop. Copenhagen, 2002, 4(1-2): 71-86.
[4] Hadi O, Mona M, Chadi A, et al. Game theoretic models for detecting network intrusions[J]. Computer Communications, 2008, 31(10): 1934-1944.
[5] 林旺群, 王慧, 刘家红, 等. 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011, 48(2): 306-316. Lin Wangqun, Wang Hui, Liu Jiahong, et al. Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-316.
[6] 石进, 郭山清, 陆音, 等. 一种基于攻击图的入侵响应方法[J]. 软件学报, 2009, 19(10): 2746-2753. Shi Jin, Guo Shanqing, Lu Yin, et al. An intrusion response method based on attack graph[J]. Journal of Software, 2009, 19(10): 2746-2753.
[7] 王元卓, 林闯, 程学旗, 等. 基于随机博弈模型的网络攻防量化分析[J]. 计算机学报, 2010, 33(9): 1748-1762. Wang Yuanzhuo, Lin Chuang, Cheng Xueqi, et al. Analysis for network attack-fefense based on stochastic game model[J]. Chinese Journal of Computers, 2010, 33(9): 1748-1762.
[8] 张永铮, 方滨兴, 迟悦, 等. 网络风险评估中网络节点关联性的研究[J]. 计算机学报, 2007, 30(2): 234-240. Zhang Yongzheng, Fang Binxing, Chi Yue, et al. Research on network node correlation in network risk assessment[J]. Chinese Journal of Computers, 2007, 30(2): 234-240. |