关于网络安全方面论文范文参考文献,与供应链安全管理体系认可制度相关论文开题报告
本论文是一篇关于网络安全方面论文开题报告,关于供应链安全管理体系认可制度相关专科毕业论文范文。免费优秀的关于网络安全及清华大学及计算机学报方面论文范文资料,适合网络安全论文写作的大学硕士及本科毕业论文开题报告范文和学术职称论文参考文献下载。
献[]提出了一个基于攻击动机的博弈方法来模型攻击者的动机,目标和策略(AIOS).其中作者研究了一个基于博弈论的形式化描述框架,采用它可以捕获AIOS与防御者目标策略之间的内在关系,从而获得应对办法.文献[]和文献[]研究了基于博弈论中拍卖理论的机制,来抵御DoS和DDoS攻击.在文献[]中,Xu和Lee使用博弈论框架分析了他们所提出的防御DDoS攻击系统的性能.Browne在文献[]中描述了在复杂,异构的军事系统中,如何用静态博弈来分析网络攻击事件.在工作中,攻击者与防御者之间的行为被描述成一种博弈关系.我们可以通过一个纯竞争,或称之为零和的随机博弈来找到纳什均衡(Nashequilibrium).并且一个常和随机博弈可以使我们找到更多潜在的纳什均衡.根据纳什均衡的计算结果,我们能够知道攻击者的策略和他能获得最大收益的方案.使用随机博弈模型,我们还能够获得状态转移的概率特性,这具有很强的实现意义.有关论文范文主题研究: | 关于网络安全的论文范例 | 大学生适用: | 在职论文、硕士毕业论文 |
---|---|---|---|
相关参考文献下载数量: | 65 | 写作解决问题: | 如何写 |
毕业论文开题报告: | 论文提纲、论文选题 | 职称论文适用: | 刊物发表、职称评副高 |
所属大学生专业类别: | 如何写 | 论文题目推荐度: | 优质选题 |
参考文献
ChangR.K.C..Defendingagainstflooding-baseddistributeddenialofserviceattacks:atutorial.IEEECommunicationsMagazine,2002,40(10):42~51
LandwehrC..Formalmodelsforputersecurity.ComputerSurveys,1981,13(3):247-278.
J.Lowry.Aninitialforayintounderstandingadversaryplanningandcoursesofaction.In:ProceedingsofDARPAInformationSurvivabilityConf.andExpositionII(DISCEX'01),2001,123~133
SandersW.H.,CukierM.,WebberF.,PalP.,WatroR..Probabilisticvalidationofintrusiontolerance.In:SupplementalVolumeoftheProceedingsofInt'lConf.DependableSystems&,Networks(DSN-2002),2002,B-78-B-79
LittlewoodB.,BrocklehurstS.,FentonN.,MellorP.,PageS.,WrightD..Towardsoperationalmeasuresofputersecurity.ComputerSecurity,1993,2:211~229
NicolD.M.,SandersW.H.,TrivediK.S..Model-basedevaluation:fromdependabilitytosecurity.IEEETransactionsonDependabilityandSecurity,2004,1(1):48~65
AvizienisA.,LaprieJ.C.,RandellB.,LandwehrC..Basicconceptsandtaxonomyofdependableandsecureputing.IEEETransactionsonDependableandSecureComputing,2004,1(1):11~33
DaleyK.,LarsonR.,DawkinsJ..Astructuralframeworkformodelingmulti-stageworkattacks.In:ProceedingsofICPPWorkshops,2002,5~10
SheynerO.,HainesJ.,JhaS.,LippmannR.,WingJ..Automatedgenerationandanalysisofattackgraphs.In:Proceedingsof2002IEEESymp.SecurityandPrivacy,2002,273~284
JhaS.,SheynerO.,WingJ.M..Twoformalanalysesofattackgraphs.In:ProceedingsofComputerSecurityFoundationsWorkshop(CSFW),June2002,49~63
PhillipsC.,SwilerL..Agraph-basedsystemforworkvulnerabilityanalysis.In:ProceedingsofACMNewSecurityParadigmsWorkshop,1998,71~79
OrtaloR.,DeswarteY.,KaanicheM..Experimentingwithquantitativeevaluationtoolsformonitoringoperationalsecurity.IEEETransactionsonSoftwareEngineering,1999,25:633~650
DolevD.,YaoA..Onthesecurityofpublickeyprotocols.IEEETrans.InformationTheory,1983,29(2):198~208
林闯,王元卓,杨扬,曲扬.基于随机Petri网的网络可信赖性分析方法研究,电子学报,200634(2):322-332
WangF.,GongF.,SargorC.,Goeva-PopstojanovaK.,TrivediK.S.,JouF..SITAR:scalableintrusiontolerancearchitecturefordistributedservices.In:ProceedingsofIEEESecondSMCInformationAssuranceWorkshop,2001,38~45
WangD.,MadanB.,TrivediK.S..SecurityanalysisofSITARintrusion-tolerantsystem.In:ProceedingsofACMWorkshopSurvivableandSelf-RegenerativeSystems,2003,23~32
MadanB.,Goeva-PopstojanovaK.,VaidyanathanK.,TrivediK.S..Modelingandquantificationofsecurityattributesofsoftwaresystems.In:ProceedingsofInt'lConf.DependableSystemsandNetworks,2002,505~514
林闯,汪洋,李泉林,网络安全的随机模型方法与评价技术,计算机学报,December2005,28(12):1943-1956.K.LyeandJ.M.Wing.Gamestrategiesinworksecurity.InProceedingsofthe15thIEEEComputerSecurityFoundationsWorkshop,2002.
Mahimkar,A.,Shmatikov,V.Game-BasedAnalysisofDenial-of-ServicePreventionProtocols,ComputerSecurityFoundations,2005.CSFW-182005.18thIEEEWorkshop)2005,287-301
PengLiu,WanyuZangandMengyu.Incentive-BasedModelingandInferenceofAttackerIntent,Objectives,andStrategies.ACMTransactionsonInformationandSystemSecurity,2005,8(1):1-41
X.WangandM.Reiter.Defendingagainstdenial-of-serviceattackswithpuzzleauctions.InProc.IEEESecurityandPrivacy'03,2003,78-92
Bencsth,L.Buttyn,andI.Vajda,AGameBasedAnalysisoftheClientPuzzleApproachtoDefendAgainstDoSAttacks,IEEEConferenceonSoftware,TelemunicationsandComputerNetworks(SoftCom2003)
XuJ.,LeeW.,Sustainingavailabilityofwebservicesunderdistributeddenialofserviceattacks.IEEETrans.Comput.2003,52(4):195-208
BrowneR..C4idefensiveinfrastructureforsurvivabilityagainstmulti-modeattacks.InProceedingsof21stCenturyMilitaryCommunication-ArchitecturesandTechnologiesforInformationSuperiority.2000
该文来源:http://www.sxsky.net/xie/070350421.html
六,申报项目的研究方法
内容包括:
研究计划,拟采取的研究方法,实验方案,技术路线,已具备的条件及目前
关于网络安全方面论文范文参考文献,与供应链安全管理体系认可制度相关论文开题报告参考文献资料: