[1] TANKARD C. Advanced persistent threats and how to monitor and deter them[J]. Network Security, 2011, 2011(8):16-19. [2] 付钰,李洪成,吴晓平,等.基于大数据分析的APT攻击检测研究综述[J].通信学报,2015,36(11):1-14.(FU Y, LI H C, WU X P, et al. Detecting APT attacks:a survey from the perspective of big data analysis[J]. Journal on Communications, 2015, 36(11):1-14.) [3] RASS S, KÖNIG S, SCHAUER S. Defending against advanced persistent threats using game-theory[J]. Plos One, 2017, 12(1):e0168675. [4] MANSHAEI M H, ZHU Q, ALPCAN T, et al. Game theory meets network security and privacy[J]. ACM Computing Surveys, 2013, 45(3):Article No. 25. [5] 姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827.(JIANG W, FANG B X, TIAN Z H, et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4):817-827.) [6] 林旺群,王慧,刘家红,等.基于非合作动态博弈的网络安全主动防御技术研究[J].计算机研究与发展,2011,48(2):306-316.(LIN W Q, WANG H, LIU J H, et al. Research on active defense technology in network security based on non-cooperative dynamic game theory[J]. Journal of Computer Research and Development, 2011, 48(2):306-316.) [7] 陈永强,付钰,吴晓平.基于非零和攻防博弈模型的主动防御策略选取方法[J].计算机应用,2013,33(5):1347-1352.(CHEN Y Q, FU Y, WU X P. Active defense strategy selection based on non-zero-sum attack-defense game model[J]. Journal of Computer Applications, 2013, 33(5):1347-1352.) [8] 张恒巍,余定坤,韩继红,等.基于攻防信号博弈模型的防御策略选取方法[J].通信学报,2016,37(5):51-61.(ZHANG H W, YU D K, HAN J H, et al. Defense policies selection method based on attack-defense signaling game model[J]. Journal on Communications, 2016, 37(5):51-61.) [9] VAN DIJK M, JUELS A, OPREA A, et al. FlipIt:the game of "stealthy takeover"[J]. Journal of Cryptology, 2013, 26(4):655-713. [10] BOWERS K D, VAN DIJK M, GRIFFIN R, et al. Defending against the unknown enemy:applying flipIt to system security[C]//International Conference on Decision and Game Theory for Security, LNCS 7638. Berlin:Springer, 2012:248-263. [11] PHAM V, CID C. Are we compromised? Modelling security assessment games[C]//International Conference on Decision and Game Theory for Security, LNCS 7638. Berlin:Springer, 2012:234-247. [12] LASZKA A, HORVATH G, FELEGYHAZI M, et al. FlipThem:modeling targeted attacks with flipIt for multiple resources[C]//International Conference on Decision and Game Theory for Security, LNCS 8840. Berlin:Springer, 2014:175-194. [13] ZHANG M, ZHENG Z Z, SHROFF N B. Stealthy attacks and observable defenses:a game theoretic model under strict resource constraints[C]//Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing. Piscataway, NJ:IEEE, 2014:813-817. [14] FENG X, ZHENG Z, HU P, et al. Stealthy attacks meets insider threats:a three-player game model[C]//Proceedings of the 2015 IEEE Military Communications Conference. Piscataway, NJ:IEEE, 2015:25-30. [15] FENG X, ZHENG Z, CANSEVER D, et al. Stealthy attacks with insider information:a game theoretic model with asymmetric feedback[EB/OL].[2016-11-22]. http://spirit.cs.ucdavis.edu/pubs/conf/xiaotao-milcom16.pdf. [16] FARHANG S, GROSSKLAGS J. FlipLeakage:a game-theoretic approach to protect against stealthy attackers in the presence of information leakage[C]//International Conference on Decision and Game Theory for Security, LNCS 9996. Berlin:Springer, 2016:195-214. [17] 黄康宇,徐伟光.移动目标防御时间博弈相关研究介绍[J].军事通信技术,2016,37(4):98-102.(HUANG K Y, XU W G. Games of timing in moving target defense[J]. Journal of Military Communications Technology, 2016, 37(4):98-102.) |