[1] RASS S, ZHU Q. GADAPT:a sequential game-theoretic framework for designing defense-in-depth strategies against advanced persistent threats[C]//Proceedings of the 20167th International Conference on Decision and Game Theory for Security. New York:Springer-Verlag, 2016:314-326. [2] AUTY M. Anatomy of an advanced persistent threat[J]. Network Security, 2015, 2015(4):13-16. [3] FENG X, ZHENG Z, HU P, et al. Stealthy attacks meets insider threats:a three-player game model[C]//Proceedings of the 2015 IEEE Military Communications Conference. Piscataway, NJ:IEEE, 2015:25-30. [4] SINGH S, SHARMA P K, MOON S Y, et al. A comprehensive study on APT attacks and countermeasures for future networks and communications:challenges and solutions[J]. The Journal of Supercomputing, 2016:1-32. [5] RASS S, KÖNIG S, SCHAUER S. Defending against advanced persistent threats using game-theory[J]. PloS One, 2017, 12(1):e0168675. [6] FENG X, ZHENG Z, CANSEVER D, et al. Stealthy attacks with insider information:a game theoretic model with asymmetric feedback[C]//Proceedings of the 2016 IEEE Military Communications Conference. Piscataway, NJ:IEEE, 2016:277-282. [7] ZHANG M, ZHENG Z, SHROFF N B. A game theoretic model for defending against stealthy attacks with limited resources[C]//Proceedings of the 2015 International Conference on Decision and Game Theory for Security. New York:Springer-Verlag, 2015:93-112. [8] SEMASINGHE P, ZHU K, HOSSAIN E. Distributed resource allocation for self-organizing small cell networks:an evolutionary game approach[C]//Proceedings of the 2013 IEEE GLOBECOM Workshops. Piscataway, NJ:IEEE, 2013:702-707. [9] ALTMAN E, HAYEL Y, KAMEDA H. Evolutionary dynamics and potential games in non-cooperative routing[C]//Proceedings of the 2007 International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops. Piscataway, NJ:IEEE, 2007:1-5. [10] LIN W Y S, LIU K J R. Pricing game and evolution dynamics for mobile video streaming[C]//Proceedings of the 2011 IEEE International Conference on Acoustics, Speech and Signal Processing. Piscataway, NJ:IEEE, 2011:2348-2351. [11] SHREE R A J, KHAN R A. Wormhole attack in wireless sensor network[J]. International Journal of Computer Networks and Communications Security, 2014, 2(1):22-26. [12] ZHU Q, BASAR T. Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems:games-in-games principle for optimal cross-layer resilient control systems[J]. IEEE Control Systems, 2015, 35(1):46-65. [13] BOWERS K D, van DIJK M, GRIFFIN R, et al. Defending against the unknown enemy:applying FlipIt to system security[C]//International Conference on Decision and Game Theory for Security, LNCS 7638. Heidelberg:Springer, 2012:248-263. [14] PAWLICK J, FARHANG S, ZHU Q. Flip the cloud:cyber-physical signaling games in the presence of advanced persistent threats[C]//International Conference on Decision and Game Theory for Security, LNCS 9406. Heidelberg:Springer, 2015:289-308. [15] HU P, LI H, FU H, et al. Dynamic defense strategy against advanced persistent threat with insiders[C]//Proceedings of the 2015 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE, 2015:747-755. [16] FANG X, ZHAI L, JIA Z, et al. A game model for predicting the attack path of APT[C]//Proceedings of the 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing. Piscataway, NJ:IEEE, 2014:491-495. [17] 姜伟, 方滨兴, 田志宏, 等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009, 32(4):817-827.(JIANG W,FANG B X,TIAN Z H, et al. Evaluating network security and optimal active defense based on attack-defense game model[J]. Chinese Journal of Computers, 2009, 32(4):817-827.) [18] LIPPMANN R, HAINES J W, FRIED D J, et al. Analysis and results of the DARPA off-line intrusion detection evaluation[C]//Proceedings of the 17th International Workshop on Recent Advances in Intrusion Detection. New York:ACM, 2014:162-182. [19] LASZKA A, HORVATH G, FELEGYHAZI M, et al. FlipThem:modeling targeted attacks with FlipIt for multiple resources[C]//International Conference on Decision and Game Theory for Security, LNCS 8840. Heidelberg:Springer, 2014:175-194. |