[1] T . E. Carroll, D. Grosu. [J], A Game theoretic investigation of deception in network security. Security and Communication Networks. 2011,4(10):1162-1172.
[2] Osama Hayatle, Hadi Otrok, Amr Youssef. A markov decision process model for high interaction honeypots [J], Taylor &Francis,2013,22(4):159-170.
[3] Rup Kumar Deka, Kausthav Pratim Kalita, D.K. Bhattacharya,etal. Network defense:Approaches,methods and techniques[J].2015,57(4):71-84.
[4] Yue-Bin Luo, Bao-Sheng Wang,Gui-Lin Cai. Analysis of port hopping for proactive cyber defense [J].International Journal of Security and Its Applications.2014,9(2):123-134.
[5] Gal Badishi,Amir Herzberg,Idit Keidar.Keeping denial-of-service attackers in the dark[J], IEEE Transactions on Dependable and Secure Computing,2007,3(4):191-204.
[6] John J. Lussier. Computer Network Defense Roadmap[R], Department of the Navy|Chief Information Officer, http://www.chips.navy.mil/archives/09_Jul/PDF/CND.pdf, 2009.10.16
[7] R Benoit,B Rogers.Joint Network Defense and Management System (JNDMS) http://www.ottawa.drdc-rddc.gc.ca/html/nio_201_jndms-eng.html,Fact Sheet NIO 201 ©DRDC Ottawa April 2006.
[8] 胡华平,黄遵国,庞立会,张怡,陈海涛. 网络安全深度防御与保障体系研究[J],计算机工程与科学,2002,24(6):7-10.
[9]Milind Tambe. Security and game theory[M]. Cambridge:Cambridge University PressSchool of Computer Science, 2011:51-64.
[10]Xu j,Lee W, Sustaining availability of Web services under distributed denial of service attacks, IEEE Transactions on Computers,2003,52(4):195-208.
[11] Dipankar Dasgupta. Immuno-inspired autonomic system for cyber defense[J],information security technical report 2007,12(2):235-241.
[12] 韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型. 计算机研究与发展, 2009, 46(3):353-362.
(Yu Yong, Lian Yi-Feng,Feng Deng-Guo. A network security situation awareness model based on information fusion.Journal of Computer Research and Development. 2009,46(3):353-362.)
[13] M Wooldridge,NR Jennings. Intelligent agent:theory and practice[J]. The Knowledge Engineering Review.1995,10(2):115-152.
[14]Luke Hunsberger, Charles L. Ortiz Jr. Dynamic intention structures I: a theory of intention representation[J].Autonomous Agents and Multi-Agent System.2008,16(3):298-326.
[15]彭艳斌,廖备水,高济等.NPCD-Agent:扩展的Agent思维状态模型[J],浙江大学学报(工学版),2008,42(5):769-773.
(Peng Yan-Bin,Liao Bei-Shui,etal. NPCD-Agent:extended agent mental state model[J]. Journal of Zhejiang University(Engineering Science).2008,42(5)769-773.)
[16] I Trencansky, R Cervenka. Agent Modeling Language (AML): a comprehensive approach to modeling MAS[J]. Informatica, 2005,29 (4) :391-397
[17] I. Trencansky and R. Cervenka. Agent Modeling Language (AML): A comprehensive approach to modeling MAS[J]. Informatica, 2005, 29(4):391–400.
|