[1] |
ZHANG Hengwei, HUANG Shirui. Markov Differential Game Model and Its Application in Network Security[J]. Acta Electronica Sinica, 2019,47(3):606-612.
|
|
张恒巍, 黄世锐. Markov 微分博弈模型及其在网络安全中的应用[J]. 电子学报, 2019,47(3):606-612.
|
[2] |
QIAN Yaguan, LU Hongbo, JI Shouling, et al. A Poisoning Attack on Intrusion Detection System Based on SVM[J]. Acta Electronica Sinica, 2019,47(1):59-65.
|
|
钱亚冠, 卢红波, 纪守领, 等. 一种针对基于 SVM 入侵检测系统的毒性攻击方法[J]. 电子学报, 2019,47(1):59-65.
|
[3] |
SRINIVASAN T, SESHADRI J, JONATHAN J, et al. A System for Power-aware Agent-based Intrusion Detection (SPAID) in Wireless Ad Hoc Networks[J]. Lecture Notes in Computer Science, 2005,3619(4):153-162.
|
[4] |
INAYAT Z, GANI A, ANUAR N B, et al. Intrusion Response Systems: Foundations, Design, and Challenges[J]. Journal of Network and Computer Applications, 2016,62(2):53-74.
doi: 10.1016/j.jnca.2015.12.006
URL
|
[5] |
ANWAR S, ZAIN M J, ZOLKIPLI M F, et al. From Intrusion Detection to An Intrusion Response System: Fundamentals, Requirements, and Future Directions[J]. Algorithms, 2017,10(2):1-24.
doi: 10.3390/a10010001
URL
|
[6] |
KHOLIDY H A, ERRADI A, ABDELWAHED S, et al. A Risk Mitigation Approach for Autonomous Cloud Intrusion Response System[J]. Computing, 2016,98(11):1111-1135.
doi: 10.1007/s00607-016-0495-8
URL
|
[7] |
SHAMELI-SENDI A, LOUAFI H, HE Wenbo, et al. Dynamic Optimal Countermeasure Selection for Intrusion Response System[J]. IEEE Transactions on Dependable and Secure Computing, 2016,15(5):755-770.
doi: 10.1109/TDSC.8858
URL
|
[8] |
WU Y S, FOO B R, MAO Yuchun, et al. Automated Adaptive Intrusion Containment in Systems of Interacting Services[J]. Computer Networks, 2007,51(5):1334-1360.
doi: 10.1016/j.comnet.2006.09.006
URL
|
[9] |
UPPULURI P, SEKAR R. Experiences with Specification-based Intrusion Detection[C]// Springer. International Symposium on Recent Advances in Intrusion Detection, October 10-12, 2001, Davis, CA, USA. Heidelberg: Springer, 2001: 172-189.
|
[10] |
SHI Jin, LU Yin, XIE Li. Dynamic Intrusion Response Based on Game Theory[J]. Journal of Computer Research and Development, 2008,45(5):747-757.
|
|
石进, 陆音, 谢立. 基于博弈理论的动态入侵响应[J]. 计算机研究与发展, 2008,45(5):747-757.
|
[11] |
SCHNACKENGERG D, HOLLIDAY H, SMITH R, et al. Cooperative Intrusion Traceback and Response Architecture (CITRA)[C]// IEEE. DARPA Information Survivability Conference & Exposition II, June 12-14, 2001, Anaheim, CA, USA. NJ: IEEE, 2001: 56-68.
|
[12] |
NADEEM A, HOWARTH M P. An Intrusion Detection & Adaptive Response Mechanism for MANETs[J]. Ad Hoc Networks, 2014,13(2):368-380.
doi: 10.1016/j.adhoc.2013.08.017
URL
|
[13] |
MU Chengpo, LI Yingjiu. An Intrusion Response Decision-making Model Based on Hierarchical Task Network Planning[J]. Expert Systems with Applications, 2010,37(3):2465-2472.
doi: 10.1016/j.eswa.2009.07.079
URL
|
[14] |
STAKHANOVA N, BASU S, WONG J. A Cost-sensitive Model for Preemptive Intrusion Response Systems[C]// IEEE. 21st International Conference on Advanced Information Networking and Applications, May 21-23, 2007, Niagara Falls, ON, Canada. NJ: IEEE, 2007: 428-435.
|
[15] |
HEI H, HOEGG C L, MCANDREW K, et al. It Rained What in Where? A Collaborative Approach to Improve Response and Remediation of Water Intrusions in Clinical Areas[J]. American Journal of Infection Control, 2020,48(8):27.
|
[16] |
CARVER C A. Adaptive Agent-based Intrusion Response[D]. College Station: Texas A&M University, 2001.
|
[17] |
HUTTER F, KOTTHOFF L, VANSCHOREN J. Automated Machine Learning: Methods, Systems, Challenges[M]. Heidelberg:Springer Nature, 2019.
|
[18] |
YE Yun, XU Xishan, QI Zhichang, et al. Attack Graph Generation Algorithm for Large-scale Network System[J]. Journal of Computer Research and Development, 2013,50(10):2133-2139.
|
|
叶云, 徐锡山, 齐治昌, 等. 大规模网络中攻击图自动构建算法研究[J]. 计算机研究与发展, 2013,50(10):2133-2139.
|
[19] |
WANG Shuo, TANG Guangming, KOU Guang, et al. Attack Path Prediction Method Based on Causal Knowledge Net[J]. Journal on Communications, 2016,37(10):188-198.
|
|
王硕, 汤光明, 寇广, 等. 基于因果知识网络的攻击路径预测方法[J]. 通信学报, 2016,37(10):188-198.
|
[20] |
GHOSAL S, AAD V. Fundamentals of Nonparametric Bayesian Inference[M]. Cambridge: Cambridge University Press, 2017.
|
[21] |
YANG Zhuoran, XIE Yuchen, WANG Zhaoran. A Theoretical Analysis of Deep Q-learning[EB/OL]. https://www.researchgate.net/publication/330102327_A_Theoretical_Analysis_of_Deep_Q-Learning , 2020-12-20.
|