[1] 智研咨询集团. 2015-2020年中国网络游戏行业深度调研及市场前景预测报告[R/OL]. 2015.10/2018.08. http:// www.chyxx.com/research/201510/347879.html. 2015-2020 In-depth research and market prospect forecast report of China's online game industry [R/OL]. 2015.10/2018.08. http://www.chyxx.com/research/2015 10/347879.html. [2] 中国互联网络信息中心. 第40次中国互联网络发展状况统计报告[R/OL]. 2017.07/2018.08. http://www.cac. gov.cn/2017-08/04/c_1121427728.htm. China Internet Network Information Center. The 40th China Statistical Report on Internet Development[R/OL]. 2017.07/2018.08. http://www.cac.gov.cn/2017-08/04/c_1 121427728.htm. [3] Jeff Y, Randell B.A systematic classification of cheating in online games[C]. ACM SIGCOMM Workshop on Network and System Support for Games ACM. New York, USA: Association for Computing Machinery, 2005: 1-9. [4] Pritchard M. How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It[R/OL].2000.07/2018.08.https://www.gamasutra.com/view/feature/131557/how_to_hurt_the_hackers_the_scoop_.php. [5] Liu D, Gao X, Zhang M, et al.Detecting Passive Cheats in Online Games via Performance-Skillfulness Inconsistency[C]. IEEE/IFIP International Conference on Dependable Systems and Networks. Colorado, USA: IEEE, 2017: 615-626. [6] Morningstar C, Farmer F R.The lessons of Lucasfilm's habitat[J]. Cyberspace First Steps(S1941-8477). 2008 (1): 273-302. [7] Kaiser E, Feng W C, Schluessler T.Fides: remote anomaly-based cheat detection using client emulation[C]. ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November. Chicago, USA: DBLP, 2009: 269-279. [8] Bethea D, Cochran R A, Reiter M K.Server-side verification of client behavior in online games[J]. Acm Transactions on Information & System Security (S1094-9224), 2008, 14(4): 1-27. [9] Cochran R, Reiter M.Toward online verfication of client behavior in distributed applications[C]. NDSS 2013. San Diego, California: 20th Network & Distributed System Security Symposium, 2013. [10] Baughman N E, Levine B N.Cheat-proof playout for centralized and distributed online games[C]. INFOCOM 2001. Twentieth Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. Alaska, USA: IEEE, 2001, 1: 104-1131. [11] Alayed H, Frangoudes F, Neuman C.Behavioral-based cheating detection in online first person shooters using machine learning techniques[C]. Computational Intelligence in Games. Niagara Falls, Canada: IEEE, 2013: 1-8. [12] Galli L, Loiacono D, Cardamone L, et al.A cheating detection framework for Unreal Tournament III: A machine learning approach[C]. Computational Intelligence and Games. Seoul, South Korea: IEEE, 2011: 266-272. [13] Yu S Y, Hammerla N, Yan J, et al.Aimbot Detection in Online FPS Games Using a Heuristic Method Based on Distribution Comparison Matrix[C]. International Conference on Neural Information Processing. Doha, Qatar: Springer, Berlin, Heidelberg, 2012: 654-661. [14] Yu S Y, Hammerla N, Yan J, et al.A statistical aimbot detection method for online FPS games[C]. International Joint Conference on Neural Networks. Brisbane, Australia: IEEE, 2012: 1-8. [15] Yeung S F, Lui J C.Dynamic Bayesian approach for detecting cheats in multi-player online games[J]. Multimedia Systems(S0942-4962), 2008, 14(4): 221-236. [16] 孟庆丰, 李海波. 面向过程的资源组合排斥冲突检测方法[J]. 计算机应用与软件, 2016, 33(4): 22-24, 43. Meng Qingfeng, Li Haibo.Process-oriented Collision Detection Method for Resources Composition Exclusion[J]. Computer Applications and Software, 2016, 33(4): 22-24, 43. [17] 孙亚男, 杜玉越, 刘伟. 高速公路冰雪应急流程挖掘与模型改进方法[J]. 计算机科学与探索, 2015, 9(12): 1523-1530. Sun Ya'nan, Du Yuyue, Liu Wei.Highway Snow and Ice Emergency Response Process Mining and Model Improvement[J]. Journal of Frontiers of Computer Science & Technology, 2015, 9(12): 1523-1530. [18] Labadi K, Chen H.Modelling, analysis, and optimization of supply chains by using Petri net models: The state-of-the-art[J]. International Journal of Business Performance and Supply Chain Modelling (S1758-9401), 2010, 2(3/4): 188-215. [19] Chen H, Amodeo L, Chu F, et al.Performance Evaluation and Optimization of Supply Chains modelled by Batch Deterministic and Stochastic Petri Nets[J]. IEEE transactions on Automation Science and Engineering (S1545-5955), 2005, 2(2): 132-144. [20] 孙静, 秦世引, 宋永华, 等. 一种基于Petri网和概率信息的电力系统故障诊断方法[J]. 电力系统自动化, 2003, 27(13): 10-14, 23. Sun Jing, Qin Shiyin, Song Yonghua, et al.A fault diagnosis method for power system based on Petri net and probability information[J]. Automation of Electric Power Systems, 2003, 27(13): 10-14, 23. [21] 庞善臣, 蒋昌俊. Petri网在工作流系统建模和分析中的应用[J]. 系统仿真学报, 2005, 17(增1): 100-104. Pang Shanchen, Jiang Changjun.Petri net and its application in workflow system modeling and analysis[J]. Journal of System Simulation, 2005, 17(S1): 100-104. [22] 许荣斌, 石军, 张鹏飞, 等. Petri网的映射变迁关系相似性度量[J]. 浙江大学学报, 2017, 51(6): 1205-1213. Xu Rongbin, Shi Jun, Zhang Pengfei, et al.Similarity measurement of transition mapping relation using Petri net[J]. Journal of Zhejiang University, 2017, 51(6): 1205-1213. [23] Li J, Zhou M C, Dai X Z.Reduction and refinement by algebraicoperations for Petri net transformation[J]. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans (S1083-4427), 2012, 42(5): 1244-1255. [24] 杜玉越, 孙亚男, 刘伟. 基于Petri网的模型偏差域识别与模型修正[J]. 计算机研究与发展, 2016, 53(8): 1766-1780. Du Yuyue, Sun Ya'nan, Liu Wei.Petri Nets Based Recognition of Model Deviation Domains and Model Repair[J]. Journal of Computer Research and Development, 2016, 53(8): 1766-1780. [25] 方欢, 何路路, 方贤文, 等. 基于搜索树的业务流程Petri网模型抽象化简方法[J]. 控制理论与应用, 2018, 35(1): 92-102. Fang Huan, He Lulu, Fang Xianwen, at al. A search-tree-based abstraction method for business process Petri nets models[J]. Control Theory and Applications, 2018, 35(1): 92-102. [26] Li J Q, Fan Y S.Workflow Model Validation Based on Petri Net Simplification Method[J]. Information and Control (S0019-9958), 2001, 6: 492-497. [27] Tan W, Xu W, Yang F, et al.A framework for service enterprise workflow simulation with multi-agents cooperation[J]. Enterprise Information Systems (S1751-7575), 2013, 7(4): 523-542. [28] Aalst W V D, Buijs J, Dongen B V. Towards Improving the Representational Bias of Process Mining[J]. Lecture Notes in Business Information Processing(S1865-1348), 2017, 116: 39-54. |