A kind of network security behavior model based on game theory
暂无分享,去创建一个
[1] Gary M. Roodman. Note—Post-Infeasibility Analysis in Linear Programming , 1979 .
[2] Vladimir L. Arlazarov,et al. Algorithms for games , 1987 .
[3] Rita C. Summers. Secure Computing: Threats and Safeguards , 1996 .
[4] J. Nash. Two-Person Cooperative Games , 1953 .
[5] John Van Beveren,et al. A CONCEPTUAL MODEL OF HACKER DEVELOPMENT AND MOTIVATIONS , 2001 .
[6] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[7] Bruce Schneier,et al. MODELING SECURITY THREATS , 1999 .
[8] Harvey J. Greenberg,et al. How to Analyze the Results of Linear Programs-Part 3: Infeasibility Diagnosis , 1993 .
[9] Alan Boulanger. Catapults and Grappling Hooks: The Tools and Techniques of Information Warfare , 1998, IBM Syst. J..
[10] Andrew P. Moore,et al. Foundations for Survivable System Development: Service Traces, Intrusion Traces, and Evaluation Models , 2001 .