朱建明, Srinivasan Raghunathan. 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2009, 32(4): 828-834.Zhu Jian-ming and Srinivasan Raghunathan. Evaluation model of information security technologies based on game theoretic[J].Chinese Journal of Computers.2009, 32(4):828-834[2]Ryu Y U and Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4): 20.1-20.24.[3]Musman S and Flesher P. System or security managers adaptive response tool [C]. DARPA Information Survivability Conference and Exposition 2000, Hilton Head, USA, 2000, Vol.2: 1056-1060.[4]丁勇, 虞平, 龚俭. 自动入侵响应系统的研究[J].计算机科学.2003, 30(10):160-166Ding Yong, Yu Ping, and Gong Jian. A study of automated intrusion response systems [J]. Computer Science, 2003, 30(10): 160-166.[5]Carver C, Hill J M, and Surdu J R. A methodology for using intelligent agents to provide automated intrusion response[C]. The IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000: 110-116.Ragsdale D.[J].Carver C, and Humphries J, et al.. Adaptation techniques for intrusion detection and intrusion response system[C]. The IEEE Intl Conf on Systems, Man, and Cybernetics at Nashville, Tennessee.2000,:-[6]Lee W, Fan W, and Miller M, et al.. Toward cost-sensitive modeling for intrusion detection and response [J]. Journal of Computer Security, 2002, 10(1/2): 5-22.[7]Foo B.[J].Wu Y, and Mao Y, et al.. ADEPTS: adaptive intrusion response using attack graphs in an E-commerce environment[C]. Intl Conf on Dependable Systems and Networks (DSN05), Washington.2005,:-[8]Lye K and Wing J M. Game strategies in network security[C]. The 2002 IEEE Computer Security Foundations Workshop, Copenhagan, Denmark, 2002: 71-86.[9]Xu J and Lee W. Sustaining availability of Web services under distributed denial of service attacks [J].IEEE Transactions on Computer.2003, 52(4):195-208[10][美]艾里克拉斯缪森. 王晖等译. 博弈与信息博弈论概论. 北京: 北京大学出版社, 2003: 385-417.[11]董武世, 孙强, 柯宗武, 陈年生. 基于博弈论的Ad hoc网络功率控制模型[J]. 武汉理工大学学报, 2009, 31(17): 114-122.Dong Wu-shi, Sun Qiang, Ke Zong-wu, and Chen Nian-sheng. Power control model based on game theory in Ad hoc networks[J]. Journal of Wuhan University of Technology, 2009, 31(17): 114-122.[12]Ns2 network simulation[OL]http ://www.isi.edu/nsnam/ns , 2009.
|