[1] Y. Fu, Y. Q. Chen,S. Y. Wu, “Selection of Network Attack Defense Strategy based on a Stochastic Game Model,”Journal of Beijing University of Posts and Telecommunications, Vol. S1, pp. 35-39, 2014 [2] Y. Q. Chen, “Based on Fuzzy Static Bayesian Game Active Network Defense Strategy Selection,”Application Research of Computers, Vol. 3, pp. 887-889, 2015 [3] J. Zhang and H. W. Zhang, “A Method of Defense Strategy Selection based on Non-Cooperative Game Theory,”Computer Science, Vol. 1, pp. 195-201, 2016 [4] J. Zhang and Y. Li, “Rough Network Security Analysis Model based on Dynamic Game,”Computer Engineering, Vol. 4, pp. 129-134, 2015 [5] J. Q. Cai, “Research on Network Vulnerability Assessment based on Game Model,” North China Electric Power University, 2011 [6] J. D.Wang and D. K. Yu, “The Selection Method of Active Defense Strategy of Static Bias Games,”Journal of Xi’an Electronic and Science University, Vol. 1, pp. 144-150, 2016 [7] W. Q.Lin and H. Wang, “Research on Active Defense Technology of Network Security based on Non Cooperative Dynamic Game,”Computer Research and Development, Vol. 2, pp. 306-316, 2011 [8] T. Q. Yuan, “The Research and Experiment of Network Attack and Defense Strategy and Active Defense based on Game Theory,”Computer Application and Software, Vol. 9, pp. 312-315, 2013 [9] Z. H.Li and C. L. Ma, “Research on the Selection of Active Defense Strategy based on Attack and Defense in the Network,”The Application of Computer, Vol. 12, pp. 3729-3734, 2015 [10] Y. H.Wen and X. L. Wang, “Based on the Game Theory of Enterprise Information Security Defense Strategy Research,”Computer Engineering, Vol. 9, pp. 162-166, 2013 [11] X. Liang and W. Wu, “Based on Stochastic Game of Network Survivability Strategy Choice Model,”Computer Applications, Vol. 9, pp. 2609-2612, 2012 [12] R. A. Howard, “Dynamic Programming and Markov Processes. Cambridge,” Massachusetts: The M.I.T. Press, 1960 |