[1] Yue W T, Çakany?ld?r?m M. A cost-based analysis of intrusion detection system configuration under active or passive response [J]. Decision Support Systems, 2010, 50 (1): 21-31.[2] Jang-Jaccard J, Nepal S. A survey of emerging threats in cybersecurity [J]. Journal of Computers and System Sciences, 2014, 80(5): 973-993.[3] Anderson R, Moore T. The economics of information security [J]. Science, 2006, 314(5799):610-613.[4] Malecki F. The cost of network-based attacks [J]. Network Security, 2014, 3(3): 17-18.[5] Cavusoglu H, Raghunathan S. Configuration of detection software: a comparison of decision and game theory approaches [J]. Decision Analysis, 2004, 1(3): 131-148. [6] Ryu Y U, Rhee H S. Improving intrusion prevention models: dual-threshold and dual-filter approaches [J]. INFORMS Journal on Computing, 2008, 20(3): 356-367.[7] 董红,邱菀华,吕俊杰,等. 信息安全技术投资的自适应模型[J]. 控制与决策,2008,23(5): 535-540.[8] 冯楠,李敏强,解晶.复杂网络信息系统安全资源优化配置研究[J].系统工程学报,2010,25(2):145-151.[9] 朱建明, Raghunathan S.基于博弈论的信息安全技术评价模型[J].计算机学报, 2009,32(4): 828-834.[10] Zhao Liurong, Mei Shue, Zhong Weijun. An economic analysis of the interaction between firewall, IDS and vulnerability scan [J]. Economic Computation and Economic Cybernetics Studies and Research, 2015, 49(4): 323-340.[11] Ogut H, Cavusoglu H, Raghunathan S. Intrusion-detection policies for IT security breaches [J]. INFORMS Journal on Computing, 2008, 20(1): 112-123.[12] Chen L, Leneutre J. A game theoretical framework on intrusion detection in heterogeneous networks [J]. IEEE Transactions on Information Forensics and Security, 2009, 4(2): 165-178.[13] Kantzavelou I, Katsikas S. A game-based intrusion detection mechanism to confront internal attackers [J]. Computers & Security, 2010, 29(8): 859-874.[14] Benferha S, Boudjelida A, Tabia k, et al. An intrusion detection and alert correlation approach based on revising probabilistic classifiers using expert knowledge [J]. Applied Intelligence, 2013, 38(4):520-540.[15] Matthew L B, Chrisopher A C, Hiroshi F. A survey: recent advances and future trends in Honeypot Research [J]. International Journal of Computer Network and Information Security, 2012, 9(10):63-75.[16] CNCERT/CC. 蜜网系统简介 [EB/OL]. http://www.cert.org.cn/publish/main/25/2012/20120330183547487438204/20120330183547487438204_.html, 2006-11-14.[17] Cavusoglu H, Raghunathan S, Cavusoglu H. Configuration of and interaction between information security technologies: The case of firewalls and intrusion detection systems [J]. Information Systems Research, 2009, 20(2): 198-217.[18] Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in information technology security architecture [J]. Information Systems Research, 2005, 16(1):28-46. |