共 27 条
- [1] A game theoretic analysis of intrusion detection in access control systems [J]. 2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 1568 - 1573
- [2] Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
- [3] [Anonymous], ACM T INFORM SYSTEM
- [4] BOWYER BJ, 1991, CHEATING DECEPTION
- [5] Browne R, 2000, IEEE MILIT COMMUN C, P417, DOI 10.1109/MILCOM.2000.904987
- [6] CARROLL TE, 2009, P 18 IEEE INT C COMP
- [7] A note on the role of deception in information protection [J]. COMPUTERS & SECURITY, 1998, 17 (06) : 483 - 506
- [8] Misleading attackers with deception [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 30 - 37
- [9] On recognizing virtual honeypots and countermeasures [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 211 - 218
- [10] Deception in honeynets: A game-theoretic analysis [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 107 - +