Author:
Liu Liang,Huang Cheng,Fang Yong,Wang Zhenxue
Publisher
Springer International Publishing
Reference19 articles.
1. Ming, X., Weidong, B., Yongjie, W., et al.: Introduction to the Evaluation of Cyber Attack Effects. National Defense Industry Press, Beijing (2007)
2. Roy, S., Ellis, C., Shiva, S., et al.: A survey of game theory as applied to network security. In: Hawaii International Conference on System Sciences, pp. 1–10. IEEE (2010)
3. Yuan, Z., Jianguo, H.: Network attack information support effectiveness evaluation method based on system entropy. J. PLA Univ. Sci. Technol. (Nat. Sci. Ed.) 15(2), 127–132 (2014)
4. Manshaei, M.H., Zhu, Q., Alpcan, T., et al.: Game theory meets network security and privacy. ACM Comput. Surv. (CSUR) 45(3), 25 (2013)
5. Liang, X., Xiao, Y.: Game theory for network security. IEEE Commun. Surv. Tutor. 15(1), 472–486 (2013)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献