[1] Al-KUWAITI M, KYRIAKOPOULOS N, HUSSEIN S. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability[J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 106-124.[2] JAMES P S, HUTCHISON D, CTINKAYA E K, JABBAR A, ROHRER J. Resilience and survivability in communication networks: Strategies, principles, and survey of disciplines[J]. Computer Networks, 2010, 54(8): 1245-1265.[3] ZUO Yan Jun, PANDA B. Unifying strategies and tactics: a survivability framework for countering cyber attacks[C]//IEEE International Conference on Intelligence and Security Informatics, 2009: 119-124.[4] 姜伟,方滨兴,田志宏,张宏莉. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报,2009, 32(4): 817-827. JIANG Wei, FANG Binxing, TIAN Zhihong, Zhang Hongli. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4): 817-827. (in Chinese)[5] 林旺群,王慧,刘家红,邓镭,李爱平,吴泉源,贾焰. 基于非合作动态博弈的网络安全主动防御技术研究[J]. 计算机研究与发展, 2011, 48(2): 306-31. LIN Wangqun, WANG Hui, LIU Jiahong, DENG Lei, LI Aiping, WU Quanyuan, JIA Yan. Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2011, 48(2): 306-31. (in Chinese)[6] 王健,王慧强,赵国生. 基于模糊矩阵博弈的网络可生存性策略选择模型[J]. 武汉大学学报:理学版,2007, 53(5): 531-534. WANG Jian, WANG Huiqiang, ZHAO Guosheng. Situation tracking assessment for network survivability based on sequential Monte Carlo [J]. Journal of Harbin Institute of Technology, 2008, 40(5): 802-806. (in Chinese)[7] KESHTGARY M, JAHANGIR H A. Survivable network systems: its achievements and future directions [J]. International Journal of Information Science and Technology, 2007, 5(2): 11-34.[8] SELTEN R. Re-examination of the perfectness concept for equilibrium points in extensive games[J]. International Journal of Games, 1975, 4(1): 25-55.[9] 张维迎. 博弈论与信息经济学[M]. 上海:上海人民出版社,2004. [10] 王元卓,林闯,程学旗,方滨兴. 基于随机博弈模型的网络攻防量化分析方法[J]. 计算机学报,2010, 33(9): 1748-1762.WANG Yuanzhuo, LIN Chuang, CHENG Xueqi, FANG Binxing. Analysis for network attack-defense based on stochastic game model[J]. Chinese Journal of Computers, 2010, 33(9): 1748-1762. (in Chinese) |