[1] 周余阳,程光,郭春生,等.移动目标防御的攻击面动态转移技术研究综述[J].软件学报,2018,29(9):2799-2820. ZHOU Y Y, CHENG G, GUO C S, et al. Survey on attack surface dynamic transfer technology based on moving target defense[J]. Journal of Software, 2018, 29(9):2799-2820. (in Chinese) [2] KOVENOCK D, ROBERSON B. The optimal defense of networks of targets[J]. Economic Inquiry, 2018, 56(4):2195-2211. [3] 王鹏超, 陈福才, 程国振, 等. 软件定义的L2/L3地址协同拟态伪装策略研究[J]. 电子学报, 2019, 47(10): 2032-2039. WANG P C, CHEN F C, CHENG G Z, et al. L2/L3 address cooperative mimicry strategy research based on SDN[J]. Acta Electronica Sinica, 2019, 47(10): 2032-2039. (in Chinese) [4] JIE Y M, LI M C, GUO C, et al. Dynamic defense strategy against DoS attacks over vehicular ad hoc networks based on port hopping [J]. IEEE Access, 2018, 6: 51374-51383. [5] 王刚, 陆世伟, 胡鑫, 等. “去二存一”混合机制下的病毒扩散模型及稳定性分析[J]. 电子与信息学报, 2019, 41(3): 709- 716. WANG G, LU S W, HU X, et al. Virus propagation model and stability under the hybrid mechanism of “two-go and one-live”[J]. Journal of Electronics & Information Technology, 2019, 41(3): 709-716. (in Chinese) [6] 王刚, 冯云, 陆世伟,等. 多操作系统异构网络的病毒传播模型和安全性能优化策略[J]. 电子与信息学报, 2020, 42(4):972-980. WANG G, FENG Y, LU S W, et al. Virus propagation model and security performance optimization strategy of multi-operating system heterogeneous network [J]. Journal of Electronics & Information Technology, 2020, 42(4):972-980. (in Chinese) [7] 王刚, 陆世伟, 胡鑫, 等. 潜伏机制下网络病毒传播SEIQRS模型及稳定性分析[J].哈尔滨工业大学学报,2019,51(5):131-137. WANG G, LU S W, HU X, et al. Network virus spreading SEIQRS model and its stability under escape mechanism[J].Journal of Harbin Institute of Technology,2019,51(5):131. (in Chinese) [8] 朱建明, 王秦. 基于博弈论的网络空间安全若干问题分析[J]. 网络与信息安全学报, 2015, 1(1): 43-49. ZHU J M , WANG Q. Analysis of cyberspace security based on game theory[J]. Chinese Journal of Network and Information Security, 2015, 1(1): 43-49. (in Chinese) [9] DAHIYA A, GUPTA B B. A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense[J]. Future Generation Computer Systems, 2020,117: 193-204. [10] 刘江, 张红旗, 刘艺. 基于不完全信息动态博弈的动态目标防御最优策略选取研究[J]. 电子学报, 2018, 46(1): 82-89. LIU J, ZHANG H Q, LIU Y. Research on optimal selection of moving target defense policy based on dynamic game with incomplete information.[J] Acta Electronica Sinica, 2018, 46(1): 82-89. (in Chinese) [11] HU H, LIU Y L, ZHANG H Q, et al. Optimal network defense strategy selection based on incomplete information evolutionary game [J]. IEEE Access, 2018, 6: 29806-29821. [12] 陈子涵, 程光. 基于Stackelberg-Markov非对等三方博弈模型的移动目标防御技术[J]. 计算机学报, 2020, 43(3):512-525. CHEN Z H, CHENG G. Moving target defense technology using Stackelberg Markov asymmetrical trilateral game model [J]. Chinese Journal of Computers, 2020, 43(3):512-525. (in Chinese) [13] TAN J L, ZHANG H W, ZHANG H Q, et al. Optimal timing selection approach to moving target defense: a flipit attack-defense game model[J]. Security and Communication Networks, 2020(1): 3151495. [14] 张恒巍, 黄健明. 基于Markov演化博弈的网络防御策略选取方法[J]. 电子学报, 2018, 46(6): 1503-1509. ZHANG H W, HUANG J M. Network defense strategy selection method dased on Markov evolutionary game[J]. Acta Electronica Sinica, 2018, 46(6): 1503-1509. (in Chinese) [15] 李艳,黄光球,张斌. 动态攻击网络Markov演化博弈安全分析模型[J]. 计算机科学与探索, 2016, 10(9): 1272-1281. LI Y, HUANG G Q, ZHANG B. Markov evolutionary game model for dynamic network attacks safety analysis[J]. Journal of Frontiers of Computer Science and Technology, 2016, 10(9): 1272-1281. (in Chinese) [16] BORKOVSKY R N, DORASZELSKI U, KRYUKOV Y. A user's guide to solving dynamic stochastic games using the homotropy method [J]. Operation Research, 2015, 58(4): 1116-1132. [17] DORASZELSKI U, ESCOBAR J F, et al. A theory of regular Markov perfect equilibria in dynamic stochastic games genericity, stability and purification [J]. Theoretical Economics, 2015, 5(2): 369-402. [18] NILIM A, GHAOUI L E. Robust control of Markov decision processes with uncertain transition matrices [J]. Operations Research, 2016, 53(5): 780-798. [19] 国家信息安全漏洞库:漏洞信息[EB/OL].(2020-07-15) [2020-08-20]. http: ∥www.cnnvd.org.cn. China National Vulnerability Database of Information Security. Vulnerability information[EB/OL].(2020-07-15) [2020-08-20]. http: ∥www.cnnvd.org.cn. (in Chinese) [20] National Vulnerability Database. Common vulnerabilities and exposures[EB/OL].(2020-07-15)[2020-08-20]. https:∥nvd.nist.gov. [21] 高妮, 高岭, 贺毅岳, 等. 基于贝叶斯攻击图的动态安全风险评估模型[J]. 四川大学学报(工程科学版), 2016, 48(1): 111-118. GAO N, GAO L, HE Y Y, et al. Dynamic security risk assessment model based on Bayesian attack graph[J]. Journal of Sichuan University (Engineering Science Edition), 2016, 48(1): 111-118. (in Chinese) [22] 张勇. 基于Markov博弈模型的网络安全态势感知方法[J]. 软件学报, 2016, 22(3): 495-508. ZHANG Y. Network security situation awareness approach based on Markov game model[J]. Journal of Software,2016,22(3): 495-508.(in Chinese) [23] 张恒巍, 李涛. 基于多阶段攻防信号博弈的最优主动防御 [J]. 电子学报, 2017, 45(2): 431-439. ZHANG H W, LI T. Optimal active defense based on multi-stage attack-defense signaling game [J]. Acta Electronica Sinica,2017,45(2):431-439.(in Chinese)
|