共 76 条
[11]
Bodmer S., 2012, Reverse Deception: Organized Cyber Threat Counter-Exploitation
[14]
Deception-Based Game Theoretical Approach to Mitigate DoS Attacks
[J].
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016),
2016, 9996
:18-38
[15]
A Game-Theoretic Study on Non-Monetary Incentives in Data Analytics Projects with Privacy Implications
[J].
2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015,
2015,
:90-104
[16]
Chisholm, 1911, ENCY BRITANNICA
[17]
Clark A., 2012, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), P171
[18]
COTT H. B., 1940, AM NAT