论文首页哲学论文经济论文法学论文教育论文文学论文历史论文理学论文工学论文医学论文管理论文艺术论文 |
中国网提供大量免费硕士,如有业务需求请咨询网站客服人员!
参考文献
[1] SUSHIL K. SHARMA, JOSHUA SEFCHEK. Teaching information systems security courses: a hands-onapproach [J]. Computers & Security,2007, 26:290~299.
[2] 沈昌祥. 信息安全导论[M]. 北京: 电子工业出版社,2012.
[3] STAMP M. Crypto Basics. In information security: principles and practice [M]. San Francisco, CA: JohnWiley & Sons, 2006: 11~31.
[4] HOLDEN G. Guide to firewalls and network security [M]. Boston, Course Technology, 2004.
[5] GOUDA M.G., LIU X-Y A. Firewall design: consistency, completeness, and compactness[C]. Tokyo, 24thInternat. Conf. Distributed Comput. Systems, 2004.320~327.
[6] NEUMANN P., P. PORRAS. Experience with emerald to date [M].Proc. 1st USENIX Workshop IntrusionDetection Network Monitoring, Santa Clara, CA, 1999:73~80.
[7] ZAMBONI D., E. SPAFFORD. New directions for the AAPHID architecture [M]. Workshop Recent Adv.Intrusion Detection. West Lafayette, IN.1999.
[8] GAL-OR E, GHOSE A. The economic incentives for sharing security information [J].Information SystemsResearch, 2005, 16(2):186~208.
[9] LYE K W, WING J M. Game strategies in network security [J].International Journal of Information Security,2005, 4:71~86.
[10] QING HU, PAUL HART, DONNA COOKE. The role of external and internal influences on informationsystems security— a neo-institutional perspective [J]. Journal of Strategic Information Systems, 2007, 16:153~172.
[11] 李天目,仲伟俊,梅姝娥.入侵防御系统管理和配置的检查博弈分析[J].系统工程学报, 2012,23(5):589~595.
[12] ALPCAN T., BASAR T. A game theoretic approach to decision and analysis in network intrusiondetection[C]. Decision and Control 42nd IEEE Conference 2003, 3: 2595~ 2600.