| [1] |
ALESE B K, IBIDUNMOYE E O, HARUNA D I, et al. Game-Based Analysis of the Network Attack-Defense Interaction[C]∥Proceedings of the World Congress on Engineering, London, July 2-4, 2014: 481-487.
|
| [2] |
LIU Xiaojian, YUAN Yuyu. A Novel Dynamic Method in Distributed Network Attack-Defense Game[J]. Mathematical Problems in Engineering, 2015(1): 356146.
|
| [3] |
ISMAIL Z, KIENNERT C, LENEUTRE J, et al. A Game Theoretical Model for Optimal Distribution of Network Security Resources[C]∥International Conference on Decision and Game Theory for Security. Cham: Springer International Publishing, 2017: 234-255.
|
| [4] |
PAWLICK J, ZHU Quanyan. Quantitative Models of Imperfect Deception in Network Security Using Signaling Games with Evidence[C]∥2017 IEEE Conference on Communications and Network Security (CNS). Piscataway: IEEE, 2017: 394-395.
|
| [5] |
NGUYEN T H, WRIGHT M, WELLMAN M P, et al. Multi-stage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis[C]∥Proceedings of the 2017 Workshop on Moving Target Defense. New York: Association for Computing Machinery, 2017: 87-97.
|
| [6] |
刘景玮, 刘京菊, 陆余良, 等. 基于网络攻防博弈模型的最优防御策略选取方法[J]. 计算机科学, 2018, 45(6): 117-123.
|
|
LIU Jingwei, LIU Jingju, LU Yuliang, et al. Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model[J]. Computer Science, 2018, 45(6): 117-123.
|
| [7] |
王增光, 卢昱, 李玺, 等. 静态贝叶斯博弈最优防御策略选取方法[J]. 西安电子科技大学学报, 2019, 46(5): 55-61.
|
|
WANG Zengguang, LU Yu, LI Xi, et al. Optimal Defense Strategy Selection Based on the Static Bayesian Game[J]. Journal of Xidian University, 2019, 46(5): 55-61.
|
| [8] |
郑合锋, 陈四军. 基于不完全信息博弈的网络攻防策略分析[J]. 火力与指挥控制, 2023, 48(8): 67-73, 80.
|
|
ZHENG Hefeng, CHEN Sijun. Analysis of Network Attack and Defense Strategies Based on Incomplete Information Game[J]. Fire Control & Command Control, 2023, 48(8): 67-73, 80.
|
| [9] |
TOSH D, SENGUPTA S, KAMHOUA C A, et al. Establishing Evolutionary Game Models for CYBer Security Information EXchange (CYBEX)[J]. Journal of Computer and System Sciences, 2018, 98: 27-52.
|
| [10] |
黄健明, 张恒巍, 王晋东, 等. 基于攻防演化博弈模型的防御策略选取方法[J]. 通信学报, 2017, 38(1): 168-176.
|
|
HUANG Jianming, ZHANG Hengwei, WANG Jindong, et al. Defense Strategies Selection Based on Attack-Defense Evolutionary Game Model[J]. Journal on Communications, 2017, 38(1): 168-176.
|
| [11] |
黄健明, 张恒巍. 基于改进复制动态演化博弈模型的最优防御策略选取[J]. 通信学报, 2018, 39(1): 170-182.
|
|
HUANG Jianming, ZHANG Hengwei. Improving Replicator Dynamic Evolutionary Game Model for Selecting Optimal Defense Strategies[J]. Journal on Communications, 2018, 39(1): 170-182.
|
| [12] |
徐晓桐, 王高才, 胡锦天. 基于激励机制的网络攻防演化博弈模型研究[J]. 小型微型计算机系统, 2020, 41(1): 104-110.
|
|
XU Xiaotong, WANG Gaocai, HU Jintian. Research on Evolutionary Game Model of Network Attack and Defense Based on Incentive Mechanism[J]. Journal of Chinese Computer Systems, 2020, 41(1): 104-110.
|
| [13] |
HU Hao, LIU Yuling, CHEN Chen, et al. Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game[J]. IEEE Transactions on Network and Service Management, 2020, 17(3): 1683-1700.
|
| [14] |
LIU Xiaohu, ZHANG Hengwei, ZHANG Yuchen, et al. Optimal Network Defense Strategy Selection Method Based on Evolutionary Network Game[J]. Security and Communication Networks, 2020(1): 5381495.
|
| [15] |
TAN Jinglei, JIN Hui, HU Hao, et al. WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(6): 4719-4732.
|
| [16] |
马润年, 张恩宁, 王刚, 等. 基于改进演化博弈模型的网络防御决策方法[J]. 电子与信息学报, 2023, 45(6): 1970-1980.
|
|
MA Runnian, ZHANG Enning, WANG Gang, et al. Network Defense Decision-Making Method Based on Improved Evolutionary Game Model[J]. Journal of Electronics & Information Technology, 2023, 45(6): 1970-1980.
|
| [17] |
JIN Hui, ZHANG Senlei, ZHANG Bin, et al. Evolutionary Game Decision-Making Method for Network Attack and Defense Based on Regret Minimization Algorithm[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(3): 292-302.
|
| [18] |
路石, 杨浩, 姜斌. 基于前景理论的行为安全博弈[J]. 中国科学(信息科学), 2024, 54(1): 210-226.
|
|
LU Shi, YANG Hao, JIANG Bin. Prospect Theory-Based Behavioral Security Game[J]. Scientia Sinica(Informationis), 2024, 54(1): 210-226.
|
| [19] |
池璐辰. 基于前景理论和TOPSIS-灰关联的网络攻击效果评估模型研究[D]. 北京: 北京邮电大学, 2022.
|
|
CHI Luchen. Research on Network Attack Effect Evaluation Model Based on Prospect Theory and TOPSIS-Grey Relational Analysis[D]. Beijing: Beijing University of Posts and Telecommunications, 2022.
|
| [20] |
田文. 工业互联网蜜罐攻防博弈建模与分析研究[D]. 南京: 南京理工大学, 2021.
|
|
TIAN Wen. Research on Game Modeling and Analysis of Honeypot Against Cyber Attacks in Industrial Internet[D]. Nanjing: Nanjing University of Science & Technology, 2021.
|
| [21] |
刘轩宇, 张帅. 基于演化博弈的Serverless移动目标防御决策方法[J]. 信息工程大学学报, 2024, 25(2): 205-212.
|
|
LIU Xuanyu, ZHANG Shuai. Moving Target Defense Decision Method Based on Evolutionary Game in Serverless Computing[J]. Journal of Information Engineering University, 2024, 25(2): 205-212.
|