共 3 条
[2]
Incentive-based modeling and inference of attacker intent, objectives, and strategies[J] . Peng Liu,Wanyu Zang,Meng Yu.ACM Transactions on Information and System Security (TISSEC) . 2005 (1)
[3]
Toward cost‐sensitive modeling for intrusion detection and response[J] . Wenke Lee,Wei Fan,Matthew Miller,Salvatore J. Stolfo,Erez Zadok.Journal of Computer Security . 2002 (1,2)

