3Lee Wenke. Toward cost-sensitive modeling for intrusion de- tection and response[ J]. Journal of Computer Security,2002, 10(1-2) :10-20. 被引量:1
4Jiang Wei. A game theoretic method for decision and analysis of the optimal active defense strategy[ C ]//Proceedings of the International Conference on Computational Intelligence and Security. Harbin,China: [ s. n. ] ,2007:819-820. 被引量:1
5Burke D. Towards a game theory model of information warfare [ R]. [ s. l. ] :Airforce Institute of Technology,1999. 被引量:1
6Lye K W, Wing J. Game strategies in network security[ R]. Pittsburgh : School of Computer Science, Carnegie Mellon Uni- versity ,2002. 被引量:1
7Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2 (4) :333 -360 被引量:1
8Stern D F. On the buzzword " security policy" [ C ]//Security and Privacy. Los Alamitors:IEEE CS Press, 1991:219 -230 被引量:1
9Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security [ C ]//Grid and Cooperative Computing. Berlin : Springer, 2004, 3252:437 - 439 被引量:1
10Moffett J D, Sloman M S. Policy hierarchies for distributed systems management [ J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414 被引量:1