| [1] |
YANG Wentao. A Study on the Attacks to Networks[D]. Chengdu: Sichuan University, 2004.
|
|
杨文涛. 网络攻击技术研究[D]. 成都: 四川大学, 2004.
|
| [2] |
TANG Hong, LUO Zhiqiang, SHEN Jun. Research and Application of Active Defense Technology for DDoS Attacks in Zombie Networks[J]. Telecommunications Technology, 2014(11): 76-80.
|
|
唐宏, 罗志强, 沈军. 僵尸网络DDoS攻击主动防御技术研究与应用[J]. 电信技术, 2014(11): 76-80.
|
| [3] |
GUO Xiangxin, LIN Jingqiang, JIA Shijie, et al. Security Analysis of Cryptographic Application Code Generated by Large Language Model[J]. Netinfo Security, 2024, 24(6): 917-925.
|
|
郭祥鑫, 林璟锵, 贾世杰, 等. 针对大语言模型生成的密码应用代码安全性分析[J]. 信息网络安全, 2024, 24(6): 917-925.
|
| [4] |
CAI Guilin, WANG Baosheng, XING Qianqian. Game Theoretic Analysis for the Mechanism of Moving Target Defense[J]. Frontiers of Information Technology & Electronic Engineering, 2017, 18(12): 2017-2034.
|
| [5] |
NAVAS R E, CUPPENS F, BOULAHIA C N, et al. MTD,Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT[J]. IEEE Internet of Things Journal, 2021, 8(10): 7818-7832.
doi: 10.1109/JIOT.2020.3040358
URL
|
| [6] |
CHEN Zhihao, WU Xinming, CAO Miao. Research on Active Defense of Deep Level Network Security under Attack and Defense Games[J]. Computer Simulation, 2024, 41(12): 482-486.
|
|
陈志浩, 吴昕铭, 曹淼. 攻防博弈下深层次网络安全主动防御研究[J]. 计算机仿真, 2024, 41(12): 482-486.
|
| [7] |
CAI Guilin. Research on Several Key Issues of Mobile Target Defense Technology[D]. Changsha: National University of Defense Technology, 2016.
|
|
蔡桂林. 移动目标防御技术若干关键问题研究[D]. 长沙: 国防科学技术大学, 2016.
|
| [8] |
JUDY R L, FUCHS Z E, CASBEER D W. High-Value Target Escort and Defense Scenario with Differential Subgame Cost[C]// IEEE. 2024 IEEE 63rd Conference on Decision and Control (CDC). New York: IEEE, 2024: 16-29.
|
| [9] |
CARTER K M, RIORDAN J F, OKHRAVI H. A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses[C]// ACM. The First ACM Workshop on Moving Target Defense. New York: ACM, 2014: 21-30.
|
| [10] |
LIU Xiaohu, ZHANG Hengwei, DONG Shuqin, et al. Network Defense Decision-Making Based on a Stochastic Game System and a Deep Recurrent Q-Network[EB/OL]. (2021-12-01)[2025-04-16]. https://doi.org/10.1016/j.cose.2021.102480.
|
| [11] |
GE Mengmeng, CHO J H, KIM D, et al. Proactive Defense for Internet-of-Things: Moving Target Defense with Cyberdeception[J]. ACM Transactions on Internet Technology, 2022, 22(1): 1-31.
|
| [12] |
TAN Jinglei, JIN Hui, HU Hao, et al. WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process[J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(6): 4719-4732.
doi: 10.1109/TDSC.2022.3232537
URL
|
| [13] |
ZHANG Tao, XU Changqiao, ZOU Ping, et al. How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach[J]. IEEE Transactions on Industrial Informatics, 2023, 19(1): 1097-1106.
doi: 10.1109/TII.2022.3190556
URL
|
| [14] |
LAKSHMINARAYANA S, BELMEGA E V, POOR H V. Moving-Target Defense against Cyber-Physical Attacks in Power Grids via Game Theory[J]. IEEE Transactions on Smart Grid, 2021, 12(6): 5244-5257.
doi: 10.1109/TSG.2021.3095083
URL
|
| [15] |
LEI Cheng, MA Duohe, ZHANG Hongqi. Optimal Strategy Selection for Moving Target Defense Based on Markov Game[J]. IEEE Access, 2017(5): 156-169.
|
| [16] |
QIU Yihui, CHEN Zhide, XU Li. Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory[C]// IEEE. 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM). New York: IEEE, 2010: 1-4.
|
| [17] |
LEITMANN G. Two-Person Zero-Sum Games[M]. Heidelberg: Springer, 1974.
|
| [18] |
GUPTA A, LANGBORT C, BASAR T. Dynamic Games with Asymmetric Information and Resource Constrained Players with Applications to Security of Cyberphysical Systems[J]. IEEE Transactions on Control of Network Systems, 2017, 4(1): 71-81.
doi: 10.1109/TCNS.2016.2584183
URL
|
| [19] |
ZHAI Lijing, VAMVOUDAKIS K G. A Data-Based Moving Target Defense Framework for Switching Zero-Sum Games[C]// IEEE. 2021 IEEE Conference on Control Technology and Applications (CCTA). New York: IEEE, 2021: 931-936.
|
| [20] |
YU Jian, LI Qiang. Optimal Deployment in Moving Target Defense against Coordinated Cyber-Physical Attacks via Game Theory[J]. Electronics, 2023, 12(11): 2484-2508.
doi: 10.3390/electronics12112484
URL
|