Computer Science ›› 2016, Vol. 43 ›› Issue (1): 195-201.doi: 10.11896/j.issn.1002-137X.2016.01.044
Previous Articles Next Articles
ZHANG Heng-wei, ZHANG Jian and HAN Ji-hong
[1] Fang Bin-xing.Explain the innovation and breakthrough of in-formation security [EB/OL].http://www.Cert.org.crdarticles/news/common/2012051823317.html [2] Jiang Wei,Fang Bin-xing,Tian Zhi-hong,et al.Evaluating Network Security and Optimal Active Defense Based on Attack-Defense Game Model [J].Chinese Journal of Computers,2009,32(4):817-827(in Chinese)姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827 [3] Wang Yuan-zhuo,Lin Chuang,Cheng Xue-qi,et al.Analysis for Network Attack-Defense Based on Stochastic Game Model [J].Chinese Journal of Computers,2010,33(9):1748-1762(in Chinese)王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2010,33(9):1748-1762 [4] Jiang Wei,Fang Bin-xing,Tian Zhi-hong,et al.Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model [J].Journal of Computer Research and Development,2010,47(10):1714-1723(in Chinese)姜伟,方滨兴,田志宏,等.基于攻防随机博弈模型的防御策略选取研究[J].计算机研究与发展,2010,7(10):1714-1723 [5] 谢政.对策论导论[M].北京:科学出版社,2010 [6] Lin Wang-qun,Wang Hui,Liu Jia-hong,et al.Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory [J].Journal of Computer Research and Development,2011,48(2):306-316(in Chinese)林旺群,王慧,刘家红,等.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2011,48(2):306-316 [7] Liu Yu-ling,Feng Deng-guo,Wu Li-hui,et al.Performance Eva-luation of Worm Attack and Defense Strategies Based on Static Bayesian Game [J].Journal of Software,2012,23(3):712-723(in Chinese) 刘玉玲,冯登国,吴丽辉,等.基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J].软件学报,2012,23(3):712-723 [8] Shi Le-yi,Jiang Lan-lan,Jia Chun-fu,et al.A Game TheoreticAnalysis for the Honeypot Deceptive Mechanism [J].Journal of Electronics & Information Technology,2012,34(6):1420-1424(in Chinese)石乐义,姜蓝蓝,贾春福,等.蜜罐诱骗防御机理的博弈理论分析[J].电子与信息学报,2012,34(6):1420-1424 [9] Carin L,Cybenko G,Hughes J.Quantitative evaluation of risk for investment efficient strategies in cyber security:The queries methodology [J].IEEE Computer System,2013,47(7):235-242 [10] Gueye A,Walrand J C.Security in Networks:A Game-Theoretic Approach [C]∥Proceedings of the 47th IEEE Conference on Decision and Control Cancun.Mexico:Springer,2013:829-834 [11] Gordon L,Loeb M,Lucyshyn W.CSI/FBI computer crime and security survey [C]∥Proceedings of the Computer Security Institute.San Francisco:Springer,2012:12-29 [12] National vulnerability database version 2.3 [EB/OL].http://nvd.nis.gov/2013 [13] Nash J.Non-cooperative games [J].Annals of Mathematics,1951,54(2):286-295 [14] Mckelvey T,Richard D,Mclennan K.Gambit:Software tools for game theory [EB/OL].http://www.gambit-project.org |
No related articles found! |
|