共 9 条
- [1] Browne R, 2000, P 21 CENT MIL COMM A, V1, P417
- [2] [姜伟 JIANG Wei], 2009, [计算机学报, Chinese Journal of Computers], V32, P817
- [3] [林旺群 Lin Wangqun], 2011, [计算机研究与发展, Journal of Computer Research and Development], V48, P306
- [4] Lye K., 2002, P 15 IEEE COMP SEC F, P71
- [5] Northcutt S., 1999, NETWORKING INTRUSION
- [6] Osborne MJ., 1994, A Course in Game Theory
- [7] Wang Yuan-Zhuo, 2010, Chinese Journal of Computers, V33, P1748, DOI 10.3724/SP.J.1016.2010.01748
- [8] Wenke Lee, 2002, Journal of Computer Security, V10, P5
- [9] Zhang Shao-jun, 2008, Journal of Shanghai Jiaotong University, V42, P198