[1] FALLAH M S. A puzzle-based defense strategy against flooding attacks using game theory[J]. Dependable and Secure Computing, 2016:67(1):5-19.
[2] BASUS S, WONG J. A taxonomy of intrusion response systems[J]. International Journal of Information and Computer Security, 2015,1(1/2):169-184.
[3] SHEN S G, LI Y J, XU H Y. Signaling game based strategy of intrusion detection in wireless sensor networks[J]. Computers & Mathematics with Applications, 2016,62(6):2404-2416.
[4] 朱建明. 基于博弈论的信息安全技术评价模型[J]. 计算机学报, 2015(4):828-834.
[5] 李婵,张文德,蓝以信. 数字图书馆信息系统安全动态风险评估模型[J]. 情报科学, 2015,33(5):76-80.
[6] MATULEVI〖XCC1.TIF,JZ〗IUS R. Model Comprehension and Stakeholder Appropriateness of Security Risk-Oriented Modeling Languages[M]. Springer Berlin Heidelberg, 2014.
[7] 付钰,吴晓平,叶清,等. 基于模糊集与熵权理论的信息系统安全风险评估研究[J]. 电子学报, 2010,38(7):1489-1494.
[8] 梁丁相,陈曦. 基于模糊综合评判理论的电力信息系统安全风险评估模型及应用[J]. 电力系统保护与控制, 2009,37(5):61-64.
[9] 杜虹. 涉密信息系统安全风险评估的探讨[J]. 信息安全与通信保密, 2004(6):20-23.
[10]曾建国. 大数据时代数据库信息系统安全风险评估技术分析[J]. 信息安全与技术, 2015,6(9):27-28.
[11]杨晓明,罗衡峰,范成瑜,等. 信息系统安全风险评估技术分析[J]. 计算机应用, 2008(8):1920-1923.
[12]李鹤田,刘云,何德全. 信息系统安全风险评估模型及其在铁路客票系统中的应用[J]. 中国铁道科学, 2007(1):127-130.
[13]LARKIN R D, LOPEZ J, BUTTS J W, et al. Evaluation of security solutions in the SCADA environment[J]. Database for Advances in Information Systems, 2014,45(1):38-53.
[14]黄玉洁,唐作其. 基于改进贝叶斯模型的信息安全风险评估[J]. 计算机与现代化, 2018(4):95-99.
[15]解佳金,张颖,张永继. 新形势下开展内网安全风险自评估的方法建议[J]. 网络安全技术与应用, 2018(2):14-15.
[16]王晋东,余定坤,张恒巍,等. 基于不完全信息攻防博弈的最优防御策略选取方法[J]. 小型微型计算机系统, 2015,36(10):2345-2348.
[17]HAIMES Y Y, CHITTESTER C G. A roadmap for quantifying the efficacy of risk management of information security and interdependent SCADA systems[J]. Journal of Homeland Security and Emergency Management, 2005:DOI:10.2202/1547-7355.1117.
[18]姜伟,方滨兴,田志宏,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J]. 计算机学报, 2009,32(4):817-825.
[19]姜伟,方滨兴,田志宏,等. 基于攻防随机博弈模型的防御策略选取研究[J]. 计算机研究与发展, 2010,47(10):1714-1723.
[20]NGUYEN K C, ALPCAN T, BASAR T. Security games with incomplete information[C]// 2009 IEEE International Conference on Communications. 2009:714-719.
[21]刘玉岭,冯登国,吴丽辉,等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012,23(3):712-723.
[22]MAILLOUX L O, GRIMAILA M R, COLOMBI J M, et al. System Security Engineering for Information Systems[M]. Elsevier, 2014.
[23]COWLEY J A, GREITZER F L, WOODS B. Effect of network infrastructure factors on information system risk judgments[J]. Computers & Security, 2015,52:142-158.
[24]UTIN D M, UTIN M A, UTIN J. General misconceptions about information security lead to an insecure world[J]. Information Security Journal: A Global Perspective, 2008,17(4):164-169 |