[1] |
Liu Liu, Wang Yuyao, Ni Qixuan, Cao Jie, Bu Zhan.
A Link Prediction Approach in Temporal Networks Based on Game Theory
[J]. Journal of Computer Research and Development, 2019, 56(9): 1953-1964.
|
[2] |
Yu Yaxin, Wang Lei.
An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network
[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311.
|
[3] |
Hu Qing, Lü Shichao, Shi Zhiqiang, Sun Limin, Xiao Liang.
Advanced Persistent Threats Detection Game with Expert System for Cloud
[J]. Journal of Computer Research and Development, 2017, 54(10): 2344-2355.
|
[4] |
Meng Fei, Lan Julong, Hu Yuxiang.
A Cooperative Game Based Data Center Backbone Network Bandwidth Allocation Policy
[J]. Journal of Computer Research and Development, 2016, 53(6): 1306-1313.
|
[5] |
Su Hui, Xu Ke, Shen Meng, Wang Yong, Zhong Yifeng, Li Tong.
Mobile Data Subsidy Model and Case Study
[J]. Journal of Computer Research and Development, 2016, 53(4): 861-872.
|
[6] |
Wu Fan, Zheng Zhenzhe.
Game Theory Based Spectrum Dynamic Management
[J]. Journal of Computer Research and Development, 2016, 53(1): 38-52.
|
[7] |
Wang Yichuan, Ma Jianfeng, Lu Di,Zhang Liumei,Meng Xianjia.
Game Optimization for Internal DDoS Attack Detection in Cloud Computing
[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882.
|
[8] |
Dong Rongsheng, Sun Dongdong, Guo Yunchuan, and Liu Jianming.
Power Control and Vertical Handoff Based on Evolutionary Game Theory
[J]. Journal of Computer Research and Development, 2014, 51(6): 1185-1198.
|
[9] |
Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, and Zhu Jianming.
Game-Theoretic Mechanism for Cryptographic Protocol
[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
|
[10] |
He Yunhua, Sun Limin, Yang Weidong, Li Zhi, Li Hong.
Privacy Preserving for Node Trajectory in VSN: A Game-Theoretic Analysis Based Approach
[J]. Journal of Computer Research and Development, 2014, 51(11): 2483-2492.
|
[11] |
Zhang En, and Cai Yongquan.
Rational Secure Two-Party Computation Protocol
[J]. , 2013, 50(7): 1409-1417.
|
[12] |
Yue Guangxue, Li Renfa, Chen Zhi, and Zhou Xu.
Analysis of Free-riding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks
[J]. , 2011, 48(3): 382-397.
|
[13] |
Lin Wangqun, Wang Hui, Liu Jiahong, Deng Lei, Li Aiping, Wu Quanyuan, and Jia Yan.
Research on Active Defense Technology in Network Security Based on Non-Cooperative Dynamic Game Theory
[J]. , 2011, 48(2): 306-316.
|
[14] |
Zeng Fanzi, Liang Zhenhua, and Li Renfa.
An Approach to Mobile Position Tracking Based on Support Vector Regression and Game Theory
[J]. , 2010, 47(10): 1709-1713.
|
[15] |
Shi Jin, Lu Yin, and Xie Li.
Dynamic Intrusion Response Based on Game Theory
[J]. , 2008, 45(5): 747-757.
|