5Hamilton S N.The role of game theory in information warfare[J].Communications of the ACM,2008,44:8-68.
6Lee W.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):10-20.
7Jiang W.A game theoretic method for decision and analysis of the optimal active defense strategy[C]//Proceedings of the International Conference on Computational Intelligence and Security.Harbin,China:[s.n.],2007:819-820.
8Lye K W, Wing J.Game strategies in network security[R].Pittsburgh: School of Computer Science,Carnegie Mellon University,2002.
9Osborne M,Rubinstein A.A course in gametheory[D],The MIT press,2008,33:11-12.