共 27 条
[1]
A game theoretic analysis of intrusion detection in access control systems
[J].
2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5,
2004,
:1568-1573
[2]
Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
[3]
[Anonymous], ACM T INFORM SYSTEM
[4]
BOWYER BJ, 1991, CHEATING DECEPTION
[5]
Browne R, 2000, IEEE MILIT COMMUN C, P417, DOI 10.1109/MILCOM.2000.904987
[6]
CARROLL TE, 2009, P 18 IEEE INT C COMP
[8]
Misleading attackers with deception
[J].
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2004,
:30-37
[9]
On recognizing virtual honeypots and countermeasures
[J].
DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS,
2006,
:211-218
[10]
Deception in honeynets: A game-theoretic analysis
[J].
2007 IEEE INFORMATION ASSURANCE WORKSHOP,
2007,
:107-+