5Nicol D M, Liljenstam M. Models and analysis of active worm defense//Lecture Notes in Computer Science, 2005, 3685:38-53
6Nash John. Equilibrium points in n-person games. Proceedings of the National Academy of Sciences, 1950, (36) : 48-49
7Hamilton S N, Miller W L, Ott A, Saydjari O S. The role of game theory in information warfare//Proceedings of the 4th Information Survivability Workshop. Vancouver, Canada, 2002 : 45-46
8Schneier B. Attack trees. Dr. Dobb' s Journal, 1999, 24 (12) : 21-29
9Moore Andrew P, Ellison Robert J, Linger Richard C. Attack modeling for information security and survivability. Technical Note: CMU/SEI-2001-TN-001, 2001
10Dacier M. Towards quantitative evaluation of computer security. Institut National Polytechnique de Toulouse, 1994