5Nash J.Equilibrium points in n-person games[J].Proc of the National Academy of Sciences of the United States of America,1950,36(1):48-49.
6Lee W.Toward cost-sensitive modeling for intrusion detection and response[J].Journal of Computer Security,2002,10(1/2):5-22.
7Wang L Y,Noel S,Jajodia S.Minimum-cost network hardening using attack graphs[J].Computer Communications,2006,29(18):3812-3824.
8Syverson P F.A different look at secure distributed computation[C]//Proc of the 1997 IEEE Computer Security Foundations Workshop.Washington:IEEE Computer Society,1997:109-115.
9Burke D.Towards a game theory model of information warfare[D].Montgomery,AL:Air force Institute of Technology,Air University,1999.
10Lye Kong-wei,Wing J.Game strategies in network security.International Journal of Information Security,2005,4(1/2):71-86.