共 11 条
- [1] Uribe T.E., Cheung S., Automatic analysis of firewall and network intrusion detection system configurations, Journal of Computer Security, 15, 6, pp. 663-687, (2007)
- [2] Altman E., Boulogne T., El-Azouzi R., Et al., A survey on networking games in telecommunications, Computers and Operations Research, 33, 2, pp. 286-311, (2006)
- [3] Alpcan T., Basar T., A game theoretic approach to decision and analysis in network intrusion detection, Proceedings of the 42nd IEEE Conference on Decision and Control, pp. 2595-2600, (2003)
- [4] Liu Y., Comaniciu C., Man H., Modeling misbehavior in ad hoc networks: a game theoretic approach for intrusion detection, International Journal of Security and Networks, 1, 3-4, pp. 243-254, (2006)
- [5] Otrok H., Mehrandish M., Assi C., Et al., Game theoretic models for detecting network intrusions, Computer Communications, 31, 10, pp. 1934-1944, (2008)
- [6] Alpcan T., Basar T., A game theoretic analysis of intrusion detection in access control systems, Proceedings of the 43rd IEEE Conference on Decision and Control, pp. 1568-1573, (2004)
- [7] Kodialam M., Lakshman T.V., Detecting network intrusions via sampling: a game theoretic approach, IEEE INFOCOM, pp. 1880-1889, (2003)
- [8] Felegyhazi M., Cagalj M., Bidokhti S.S., Et al., Non-cooperative multi-radio channel allocation in wireless networks, IEEE INFOCOM, pp. 1442-1450, (2007)
- [9] Felegyhazi M., Hubaux J.-P., Buttyan L., Nash equilibria of packet forwarding strategies in wireless ad hoc networks, IEEE Transactions on Mobile Computing, 5, 5, pp. 463-476, (2006)
- [10] Tao J., Lin H., Application and research on non-cooperative flow and congestion control game, Journal of Southeast University: Natural Science Edition, 36, 1, pp. 52-57, (2006)