朱建明,RAGHUNATHAN S.基于博弈论的信息安全技术评价模型[J].计算机学报,2009,32(4):828-834.ZHU J M,RAGHUNATHAN S.Evaluation model of information security technology based on game theoretic[J].Journal of Computers,2009,32(4):828-834(Ch).
[2]
田有亮,马建峰,彭长根,等.秘密共享体制的博弈论分析[J].电子学报,2011,39(12):2790-2795.TIAN Y L,MA J F,PENG C G,et al.Game-theoretic analysis of secret sharing scheme[J].Acta Electronica Sinica,2011,39(12):2790-2795(Ch).
[3]
彭长根,田有亮,刘海,等.密码学与博弈论的交叉研究综述[J].密码学报,2017,4(1):1-15.DOI:10.13868/j.cnki.jcr.000158.PENG C G,TIAN Y L,LIU H,et al.A survey on the intersection of cryptography and game theory[J].Journal of Cryptologic Research,2017,4(1):1-15.DOI:10.13868/j.cnki.jcr.000158(Ch).
[4]
XIANG Y,WANG L.A game-theoretic study of load redistribution attack and defense in power systems[J].Electric Power Systems Research,2017,151:12-25.
[5]
FIELDER A,PANAOUSIS E,MALACARIA P,et al.Decision support approaches for cyber security investment[J].Decision Support Systems,2016,86:13-23.
[6]
DO C T,TRAN N H,HONG C,et al.Game theory for cyber security and privacy[J].ACM Com put in g Surveys(CSUR),2017,50(2):30.
[7]
OROJLOO H,AZGOMI M A.A game-theoretic approach to model and quantify the security of cyberphysical systems[J].Computers in Industry,2017,88:44-57.
[8]
D'ACQUISTO G,FLAMINI M,NALDI M.A game-theoretic formulation of security investment decisions under ex-ante regulation[C]//In formation Security and Privacy Research.Berlin:Springer,2012:412-423.
[9]
何建琼,田有亮,周凯.可证明安全的社交网络隐私保护方案[J].网络与信息安全学报,2017,2(8):62-67.HE J Q,TIAN Y L,ZHOU K.Provably secure social network privacy-preserving scheme[J].Chinese Journal o f Network and In formation Security,2016,2(8):62-67(Ch).
[10]
姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827.JIANG W,FANG B X,TIAN Z H et al.Evaluating network security and optimal active defense based on attack-defense game model[J].Chinese J ournal of Computers,2009,32(4):817-827(Ch).
[11]
NICOL D M,SANDERS W H,TRIVEDI K S.Model-based evaluation:from dependability to security[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):48-65.
[12]
GOSSNER O.Repeated Games Played by Cryptographically Sophisticated Players[M].Belgium:Universite Catholique de Louvain,1998:10-16.
[13]
ASOKAN N,SHOUP V,WAIDNER M.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in communications,2000,18(4):593-610.
[14]
周丹丹,李威伟,孙宇清.博弈论隐私保护方法研究综述[J].小型微型计算机系统,2015,36(12):2696-2700.ZHOU D D,LI W W,SUN Y Q.Survey on game theory based on privacy protection[J].Journal of Chinese Computer Systems,2015,36(12):2696-2700(Ch).
[15]
PAWLICK J,ZHU Q.A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization[EB/OL].[2017-06-08].https://arxiv.org/pdf/1706.02693.pdf.
[16]
FARRAJ A,HAMMAD E,A1 D A,et al.A gametheoretic analysis of cyber switching attacks and mitigation in smart grid systems[J].IEEE Transactions on Smart Grid,2016,7(4):1846-1855.
[17]
LASZKA A,JOHNSON B,GROSSKLAGS J.Mitigation of targeted and non-targeted covert attacks as a timing game[C]//Decision and Game Theory for Security.Switzerland:Springer International Publishing,2013:175-191.DOI:10.1007/978-3-319-02786-9_11.
[18]
RAYA M,SHOKRI R,HUBAUX J P.On the tradeoff between trust and privacy in wireless ad hoc networks[C]//Proceedings o f the Third ACM Conference on Wireless Network Security.New York:ACM,2010:75-80.
[19]
万盛,李凤华,牛犇,等.位置隐私保护技术研究进展[J].通信学报,2017,37(12):124-141.DOI:10.11959/j.issn.1000-436x.2016279.WAN S,LI F H,NIU B,et al.Research progress of location privacy-preserving techniques[J].Journal on communications,2016,37(12):124-141.DOI:10.11959/j.issn.1000-436x.2016279(C.h).
[20]
吴莎莎,熊金波,叶帼华,等.移动互联网环境下基于假位置的位置隐私保护研究[J].信息网络安全,2016(10):54-59.DOI:10.3969/j.issn.1671-1122.2016.10.009.WU S S,XIONG J B,YE G H,et al.Research on location privacy protection based on dummy locations in mobile internet environment[J].Netin fo Security,2016(10):54-59.DOI:10.3969/j.issn.1671-1122.2016.10.009(Ch).
[21]
王彩梅,郭亚军,郭艳华.位置服务中用户轨迹的隐私度量[J].软件学报,2012,23(2):352-360.WANG C M,GUO Y J,GUO Y H.Privacy metric for user's trajectory in location-based services[J].Journal of software,2012,23(2):352-360(Ch).
[22]
SHOKRI R,THEODORAKOPOULOS G,TRONCOSO C,et al.Protecting location privacy:Optimal strategy against localization attacks[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security.New York:ACM,2012:617-627.
[23]
彭长根,丁红发,朱义杰,等.隐私保护的信息熵模型及其度量方法[J].软件学报,2016,27(8):1891-1903.PENG C G,DING H F,ZHU Y J,et al.Information entropy models and privacy metrics methods for privacy protection[J].Journal of Software,2016,27(8):1891-1903(Ch).
[24]
WANG Y,WANG Y,LIU J,et al.A survey of game theoretic methods for cyber security[C/OL].[2017-02-22].https://www.researchgate.net/publication/308173085.DOI:10.1109/DSC.2016.90.
[25]
AVIZIENIS A,LAPRIE J C,RANDELL B,et al.Basic concepts and taxonomy of dependable and secure computing[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):11-33.
[26]
王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2010,33(9):1748-1762.WANG Y Z,LIN C,CHENG X Q,et al.Analysis for network attack-defense based on stochastic game model[J].Chinese Journal of Computers,2010,33(9):1748-1762(Ch).
[27]
周凯,彭长根,何建琼,等.可证明安全的LBS中连续查询的轨迹隐私保护方案[J].信息网络安全,2017(1):007.DOI:10.3969/j.issn.1671-1122.2017.01.007.ZHOU K,PENG C G,HE J Q,et al.Provable secure trajectory privacy preserving scheme for continuous queries in location-based services[J].Netinfo Security,2017(1):43-47.DOI:10.3969/j.issn.1671-1122.2017.01.007(Ch).
[28]
朱义杰,彭长根,李甲帅,等.一种结合查询隐私和位置隐私的LBS隐私度量框架[J].信息网络安全,2016(2):47-53.DOI:10.3969/j.issn.1671-1122.2016.02.008.ZHU Y J,PENG C G,LI J S,et al.A framework of privacy metric in LBS combining query privacy with location privacy[J].Netin fo Security,2016(2):47-53.DOI:10.3969/j.issn.1671-1122.2016.02.008(Ch).
[29]
DO C T,TRAN N H,HONG C,et al.Game theory for cyber security and privacy[J].ACM Computing Surveys(CSUR),2017,50(2):30.
[30]
MA R,XIONG J B,LIN M W,et al.Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory[C/OL].[2017-03-15].http://ieeexplore.ieee.org/abstract/document/8029545/.DOI:10.1109/Trustcom/BigDataSE/ICESS.2017.342.
[31]
MYERSON R B.Game Theory:Analysis Conflict[M].Cambridge:Harvard University Press,2013.
[32]
BASAR T,OLDER G J.Dynamic Noncooperative Game Theory[M].Philadelphia:Society for Industrial and Applied Mathematics,1998:265-363.
[33]
MANSHAEI M H,ZHU Q,ALPCAN T,et al.Game theory meets network security and privacy[J].ACM Com puting Surveys(CSUR),2013,45(3):25.