1. YANG l, YU Q. Dynamically-enabled Cyber Defense[M]. Beijing: The People’s Posts and Telecommunications Publishing House, 2018:34–35
2. Baker S. Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program[R].
3. https://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_str ategic_plan_2011 .pdf, 2011.
4. Roy S., Ellis C., Shiva S., Dasgupta D., Shandilya V., and Wu Q. W. Q.. A survey of game theory as applied to network security[C]. in Proc. 2017 43rd Hawaii Int. Conf. Syst. Sci., 2017, pp. 1–10.
5. Liu Y., Comaniciu C., and Man H.. A bayesian game approach for intrusion detection in wireless ad hoc networks. ACM International Conference Proceeding Series. 2006, 99