共 16 条
- [1] Burke D.A., Towards a game theory model of information warfare, (1999)
- [2] Zakeri R., Jalili R., Shahriari H.R., Et al., Using description logics for network vulnerability analysis, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, pp. 78-83, (2006)
- [3] Lye K.W., Wing J.M., Game strategies in network security, International Journal of Information Security, 4, 1-2, pp. 71-86, (2005)
- [4] Yin F., Ai Z.L., Network confrontation deduction system based on offensive and defensive action chain, Computer and Modernization, 2, (2019)
- [5] Jiang W., Fang B.X., Tian Z.H., Et al., Evaluating network security and optimal active defense based on attack-defense game model, Chinese Journal of Computers, 32, 4, pp. 817-827, (2009)
- [6] Zhang H.W., Li T., Huang S.R., Network defense decision-making method based on attack-defense differential game, Acat Electronica Sinica, 46, 6, pp. 151-158, (2018)
- [7] Xian M., Bao W.D., Wang Y.J., Et al., Introduction to Network Attack Effectiveness Evaluation, (2007)
- [8] Wang Y.J., Xian M., Wang G.Y., Et al., Study on effectiveness evaluation of computer network attacks, Computer Engineering and Design, 26, 11, (2005)
- [9] Zou H.Y., Evaluation of the attack effect of the network based on grey system theory, Computer Knowledge and Technology, 7, 4, pp. 795-799, (2011)
- [10] Hu C.Z., Liu Z., Shan C., Et al., Differential manifold-based network state model construction and state assessment