[1] |
方滨兴. 定义网络空间安全[J]. 网络与信息安全学报, 2018, 4(1): 1-5.Fang Binxing.Define cyberspace security[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 1-5.
|
[2] |
张明清, 刘小虎, 唐俊, 等. DDoS主动防御建模仿真研究[J]. 系统仿真学报, 2014, 26(11): 2698-2703.Zhang Mingqing, Liu Xiaohu, Tang Jun, et al.Study on Modeling and Simulation of DDoS Active Defense[J]. Journal of System Simulation, 2014, 26(11): 2698-2703.
|
[3] |
张烙兵, 阮启明, 邱晓刚. 研究社会复杂系统的两种互补方法: 仿真与博弈论[J]. 系统仿真学报, 2019, 31(10): 1960-1969.Zhang Laobing, Ruan Qiming, Qiu Xiaogang.Two Complementary Methods for Studying Complex Social Systems: Simulation and Game Theory[J]. Journal of System Simulation, 2019, 31(10): 1960-1969.
|
[4] |
刘文彦, 霍树民, 仝青, 等. 网络安全评估与分析模型研究[J]. 网络与信息安全学报, 2018(4): 1-11.Liu Wenyan, Huo Shumin, Tong Qing, et al.Research on models of network security evaluation and analysis[J]. Chinese Journal of Network and Information Security, 2018(4): 1-11.
|
[5] |
杨英杰, 冷强, 常德显, 等. 基于属性攻击图的网络动态威胁分析技术研究[J]. 电子与信息学报, 2019, 41(8): 1838-1846.Yang Yingjie, Leng Qiang, Chang Dexian, et al.Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph[J]. Journal of Electronics and Information Technology, 2019, 41(8): 1838-1846.
|
[6] |
Bryant B, Saiedian H.A novel kill-chain framework for remote security log analysis with SIEM software[J]. Computers & Security (S0167-4048), 2017, 6: 198-210.
|
[7] |
杨林, 张义荣, 杨峰, 等. 基于攻击面度量的动态目标防御效能评估方法[J]. 指挥与控制学报, 2015, 1(4): 453-457.Yang Lin, Zhang Yirong, Yang Feng, et al.Performance Assessment Technique of Moving Target Defense Based on Attack Surface Measurement[J]. Journal of Command and Control, 2015, 1(4): 453-457.
|
[8] |
Fudenberg D. Tirole J.Game Theory [M]. Boston: Massachusettes Institute of Technology Press, 2015.
|
[9] |
杨峻楠, 张红旗, 张传富. 基于随机博弈与改进WoLF-PHC的网络防御决策方法[J]. 计算机研究与发展, 2019, 56(5): 942-954.Yang Junnan, Zhang Hongqi, Zhang Chuanfu.Network Defense Decision-Making Method Based on Stochastic Game and Improved WoLF-PHC[J]. Journal of Computer Research and Development, 2019, 56(5): 942-954.
|
[10] |
Huang K X, Zhou C J, Qin Y Q, et al.A Game-Theoretic Approach to Cross-Layer Security Decision-Making in Industrial Cyber-Physical Systems[J]. IEEE Transactions on Industrial Electronics, 2020, 67(3): 2371-2379.
|
[11] |
Liu X H, Zhang H W, Zhang Y C, et al.Active Defense Strategy Selection Method Based on Two-Way Signaling Game[J]. Security and Communication Networks (S1939-0122), 2019(2): 1-14.
|
[12] |
Morgan F E, Gary W M, Michael N, et al.Gaming Space: A Game-Theoretic Methodology for Assessing the Deterrent Value of Space Control Options[M]. Santa Monica, CA: RAND Corporation, 2018.
|
[13] |
Lo S M, Huang H C, Wang P, et al.A game theory-based exit selection model for evacuation[J]. Fire Safety Journal (S0379-7112), 2006, 41(5): 364-369.
|
[14] |
姜伟, 方滨兴, 田志宏, 等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010(10): 1714-1723.Jiang Wei, Fang Binxing, Tian Zhihong, et al.Research on Defense Strategies Selection Based on Attack-Defense Stochastic Game Model[J]. Journal of Computer Research and Development, 2010(10): 1714-1723.
|
[15] |
Zhang H W, Wang J D, Yu D K, et al.Security Defense Policy Selection Method Using the Game Theory of Incomplete Information[J]. China Communications (S1673-5447), 2015, 12(2): 123-131.
|
[16] |
Sreenivasa M V.Analysis: Assessing Correlation between CVSS Scores in Vulnerability Disclosures and Patching[J]. Biomedical Instrumentation & Technology (S1943-5967), 2020, 54(1): 44-46.
|
[17] |
Gordon L, Loeb M, Lucyshyn W, et al.2015 CSI/FBI computer crime and security survey[C]. Proceedings of the 2015 Computer Security Institute. SanFrancisco, USA: IEEE Press, 2015: 48-64.
|
[18] |
NetLogo Homepage.[2018-01-07] .[2018-01-07] http://ccl.northwestern. edu/netlogo/
|