共 10 条
[4]
On Stochastic Modeling for Integrated Security and Dependability Evaluation[J] . Karin Sallhammar,Bjarne E. Helvik,Svein J. Knapskog.Journal of Networks . 2006 (5)
[5]
Minimum-cost network hardening using attack graphs
[J].
COMPUTER COMMUNICATIONS,
2006, 29 (18)
:3812-3824
[6]
Game strategies in network security[J] . Kong-wei Lye,Jeannette M. Wing.International Journal of Information Security . 2005 (1)
[7]
Toward cost‐sensitive modeling for intrusion detection and response[J] . Wenke Lee,Wei Fan,Matthew Miller,Salvatore J. Stolfo,Erez Zadok.Journal of Computer Security . 2002 (1,2)
[8]
A NEW POLYNOMIAL-TIME ALGORITHM FOR LINEAR-PROGRAMMING
[J].
COMBINATORICA,
1984, 4 (04)
:373-395
[9]
Equilibrium in a stochastic $n$-person game[J] . A. M. Fink.Journal of Science of the Hiroshima University, S . 1964 (1)
[10]
Stochastic Games .2 Shapley,L.S. Proceedings of the National Academy of Sciences of the United States of America . 1953

