期刊文献+

计算机网络防御策略模型探析 被引量:3

下载PDF
导出
摘要 建立了以Or-BAC模型为基础的计算机网络防御策略模型,该模型对检测、保护、响应等策略实现统一建模,并引入角色、视图自动分配方法来提高分配效率。
作者 熊群毓
出处 《信息通信》 2012年第4期75-76,共2页 Information & Communications
  • 相关文献

参考文献2

二级参考文献25

  • 1孙剑颖.企业信息安全投资的经济学决策模型浅析[J].东北财经大学学报,2005,6(3):67-68. 被引量:5
  • 2吕俊杰,邱菀华,王元卓.网络安全投资外部性及博弈策略[J].北京航空航天大学学报,2006,32(12):1499-1502. 被引量:3
  • 3Lee Wenke. Toward cost-sensitive modeling for intrusion de- tection and response[ J]. Journal of Computer Security,2002, 10(1-2) :10-20.
  • 4Jiang Wei. A game theoretic method for decision and analysis of the optimal active defense strategy[ C ]//Proceedings of the International Conference on Computational Intelligence and Security. Harbin,China: [ s. n. ] ,2007:819-820.
  • 5Burke D. Towards a game theory model of information warfare [ R]. [ s. l. ] :Airforce Institute of Technology,1999.
  • 6Lye K W, Wing J. Game strategies in network security[ R]. Pittsburgh : School of Computer Science, Carnegie Mellon Uni- versity ,2002.
  • 7Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2 (4) :333 -360
  • 8Stern D F. On the buzzword " security policy" [ C ]//Security and Privacy. Los Alamitors:IEEE CS Press, 1991:219 -230
  • 9Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security [ C ]//Grid and Cooperative Computing. Berlin : Springer, 2004, 3252:437 - 439
  • 10Moffett J D, Sloman M S. Policy hierarchies for distributed systems management [ J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414

共引文献23

同被引文献4

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部