3Lee Wenke. Toward cost-sensitive modeling for intrusion de- tection and response[ J]. Journal of Computer Security,2002, 10(1-2) :10-20.
4Jiang Wei. A game theoretic method for decision and analysis of the optimal active defense strategy[ C ]//Proceedings of the International Conference on Computational Intelligence and Security. Harbin,China: [ s. n. ] ,2007:819-820.
5Burke D. Towards a game theory model of information warfare [ R]. [ s. l. ] :Airforce Institute of Technology,1999.
6Lye K W, Wing J. Game strategies in network security[ R]. Pittsburgh : School of Computer Science, Carnegie Mellon Uni- versity ,2002.
7Sloman M S. Policy driven management for distributed systems [J]. Journal of Network and Systems Management, 1994, 2 (4) :333 -360
8Stern D F. On the buzzword " security policy" [ C ]//Security and Privacy. Los Alamitors:IEEE CS Press, 1991:219 -230
9Zhang Feng, Qin Zhiguang, Zhou Shijie. Policy-tree based proactive defense model for network security [ C ]//Grid and Cooperative Computing. Berlin : Springer, 2004, 3252:437 - 439
10Moffett J D, Sloman M S. Policy hierarchies for distributed systems management [ J]. IEEE JSAC Special Issue on Network Management, 1993, 11(9): 1404-1414