[1]
Samuel N Hamilton, WendyLMiller, and Allen Ott, OSami Say-djari. The Role of Game Theory in Information Warfare. Proceedings of 4th Information Survivability Workshop, Vancouver, Canada, Washington, DC. USA: IEEE Computer Society Press, 2002: 45-46.
Google Scholar
[2]
Syverson PE. A different look at secure distributed Computation [C]. In Proceedings of the 1997 IEEE Computer Security Foundations Workshop. CSFW, 1997, 10: 109-115.
DOI: 10.1109/csfw.1997.596797
Google Scholar
[3]
Kong-wei, L. and M.W. Jeannette, Game strategies in network security. International Journal of Information Security, 2005. 4(1-2): p.71.
Google Scholar
[4]
Wei Sun, Xiangwei Kong, Dequan He, Xingang You. Information Security Problem Research Based on Game Theory. Aug. 2008 Proceedings of the 2008 International Symposium on Electronic Commerce and Security.
DOI: 10.1109/isecs.2008.147
Google Scholar
[5]
P. Liu and W. Zang. Incentive-Based Modeling and Inference of Attack Intent, Objectives, and Strategies. CCS '03, Washington, DC., (2003).
Google Scholar
[6]
ZHU Jian-Ming, Srinivasan Raghunatha. Evaluation Model of Information Security Technologies Based on Game Theoretic. Chinese Journal of Computers. 2009(04): 828-834. (In Chinese).
DOI: 10.3724/sp.j.1016.2009.00828
Google Scholar
[7]
Jia Chunful, Zhong Anmin, Zhang Wei, and Ma Yong. Incomplete Informational and Dynamic Game Model in Network Security. Journal of Computer Research and Development. 2006, 43(z2): 530-533. (In Chinese).
Google Scholar
[8]
Liu, P., W. Zang, and M. Yu. Incentive-based modeling and inference of attacker intent, objectives, and strategies ACM Press 1515 Broadway, 17th Floor New York, NY USA, 2005: p.78 – 118.
DOI: 10.1145/1053283.1053288
Google Scholar
[9]
CAO Hui, WANG Qing-qing, MA Yi-zhong, LUO Ping. Attack prediction model based on dynamic bayesian games. Journal of Computer Applications. 2007(06): 1545-1547. (In Chinese).
Google Scholar
[10]
Yi Luo, F.S., Youssif Al-Nashif, Salim Hariri. Game theory based network security. Journal of Information Security, 2010. 1(1): p.41.
DOI: 10.4236/jis.2010.11005
Google Scholar