1Burke D A. Towards a [D]. Graduate School of Institute of Technology, game theory model of information warfare Engineering and Management, Air Force Air University: Captain, USAF. 1999.
2Syverson P E. A different look at secure distributed Computation [C]. In Proceedings of the 1997 IEEE Computer Security Foundations Workshop. CSFW, 1997: 109-115.
3Xu J, Lee W Y. Sustaining availability of web services under distributed denial of service attacks[J]. IEEE Transactions on Computers, 2003. 52(2): 195-208.
4Kong-wei L, Jeannette M W. Game strategies in network security [J]. International Journal of Information Security, 2005.4(1/2): 71.
5Karin S, Bjarne E H, Svein J K, Towards a Stochastic Model for integrated Security and Dependability Evaluation[C]// IEEE Computer Society. Proceedings of the First Intenational Conference on Availability, Reliability and Security. 2006: 156-165.
7Cavusoglu H, Mishra B, Raghunathan S. The value of intrusion detection systems in IT security. Information Systems Research, 2005, 16(1): 28-46
8Athanasiades N, Abler R, Levine Jet al. Intrusion detection testing and benehmarking methodologies//Proceedings of the 1st IEEE International Workshop on Information Assurance. Darmstadt, Germany: IEEE Computer Society, 2003: 63-72
9Ulvila J W, Gaffney J E. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis, 2004, 1(1): 39-54
10Ryu Y U, Rhee H S. Evaluation of intrusion detection systems under a resource constraint. ACM Transactions on Information and Systems Security, 2008, 11(4):20.1 -20. 24