[ 1 ] 方滨兴. 解读信息安全创新突破点[ EB / OL ].
[2014-04-15]. http:/ / www. cert. org. cn/ 2007051823317.
html.
[ 2 ] 林 闯,汪 洋,李泉林. 网络安全的随机模型方法与
评价技术[J]. 计算机学报,2005,28(12):1943-1956.
[ 3 ] Schneier B. Secrets and Lies: Digital Security in a
Networked World[M]. New York,USA:John Wiley &
Sons,2000.
[ 4 ] Dacier M. Towards Quantitative Evaluation of Computer
Security [ D ]. Toulouse, France: Institute National
Polytechnique de Toulouse,1994.
[ 5 ] Ortalo R,Deswarte Y,Kaaniche M. Experimenting with
Quantitative Evaluation Tools for Monitoring Operational
Security[J]. IEEE Transactions on Software Engineering,
1999,25(5):633-650.
[ 6 ] Porras P A,Kemmerer R. A Penetration State Transition
Analysis: A Rule-based Intrusion Detection Approach[
C] / / Proceedings of the 8th Annual Computer
Security Applications Conference, November 30-
December 4,1992,San Antonio,USA. Washington D. C. , USA:IEEE Press,1992:220-229.
[ 7 ] Stevens F,Courtney T,Singh S,et al. Model-based Validation
of an Intrusion-tolerant Information System[C] / /
Proceedings of the 23rd Symposium on Reliable
Distributed Systems. Washington D. C. , USA: IEEE
Press,2004:184-194.
[ 8 ] Madan B, Go eva-Popstojanova K, Vaidyanathan K, et al. A Method for Modeling and Quantifying the
Security Attributes of Intrusion Tolerant Systems [J].
Performance Evaluation,2004,56(1-4):167-186.
[ 9 ] Mercuri R T. Security Watch:Analyzing Security Costs[J].
Communications of the ACM,2003,46(6):15-18.
[10] Bistarelli S,Fioravanti F, Peretti P. Defense Trees for
Economic Evaluation of Security Investments [ C ] / /
Proceedings of the 1st International Conference on
Availability, Reliability and Security. Los Alamitos, USA:IEEE Computer Society,2006:416-423.
[11] 冯萍慧,连一峰,戴英侠,等. 面向网络系统的脆弱性
利用成本估算模型[J]. 计算机学报,2006,29(8):
1375-1382
[12] 董 红,邱菀华,吕俊杰. 基于成本分析的入侵检测响应
模型[J]. 北京航空航天大学学报,2008,34(1):39-42.
[13] 李 艳. 基于T-G 保护系统的网络攻击与评价模型研
究[D]. 西安:西安建筑科技大学,2010.
[14] 黄光球,李 艳. 基于粗糙图的网络风险评估模
型[J]. 计算机应用,2010,30(1):190-195.
[15] Fudenberg D,Tirole J. Game Theory [M]. Cambridge, USA:MIT Press,1991.
[16] Burke D. Towards a Game Theory Model of Information
Warfare,AFIT / GSS / LAL / 99D-1[R]. Airforce Institute
of Technology,1999.
[17] Lye K W,Wing J. Game Strategies in Network Security,
CMU-CS-02-136 [R]. Pittsburgh,USA:School of
Computer Science,Carnegie Mellon University,2002.
[18] Xu J,Lee W. Sustaining Availability of Web Services
Under Distributed Denial of Service Attacks [J]. IEEE
Transactions on Computers,2003,52(4):195-208.
[19] Liu Peng,Zang Wanyu. Incentive-based Modeling and
Inference of Attacker Intent, Objectives, and Strategies[
C] / / Proceedings of the 10th ACM Computer and
Communications Security Conference. New York,USA: ACM Press,2003:179-189.
[20] 张少俊,李建华,陈秀真,等. 基于动态博弈理论的分
布式拒绝服务攻击防御方法[J]. 上海交通大学学报,
2008,42(2):198-201.
[21] 姜 伟,方滨兴,田志宏,等. 基于攻防博弈模型的网
络安全测评和最优主动防御[J]. 计算机学报,2009,
32(4):817-827.
[22] Robert G. A Primer in Game Theory[M]. New York, USA:Pearson Higher Education,1992.
编辑 金胡考 |