[1] Holden G. Guide to firewalls and network security: with intrusion detection and VPNs [M]. Boston: Course Technology, 2004.
[2] Gouda M G, Liu A X. Firewall design: consistency, completeness, and compactness [C]//Proc of the 24th Int Conf on Distributed Computing Systems. Tokyo, Japan, 2004:320-327.
[3] Gal-Or E, Ghose A. The economic incentives for sharing security information [J]. Information Systems Research, 2005, 16(2):186-208.
[4] Lye K W, Wing J M. Game strategies in network security[J]. International Journal of Information Security, 2005, 4(1):71-86.
[5] Cavusoglu H, Raghunathan S. Configuration of detection software: a comparison of decision and game theory approaches [J]. Decision Analysis, 2004, 1(3):131-148.
[6] Piessens F. Taxonomy of causes of software vulnerabilities in internet software[C]//Proc of the 13th Int Symp on Software Reliability Engineering. Annapolis, ML, USA, 2002: 47-52.
[7] Zhu Jianming, Raghunathan S. Evaluation model of information security technologies based on game theoretic [J]. Chinese Journal of Computers, 2009, 32(4):828-834.(in Chinese)
[8] Cavusoglu H, Raghunathan S, Cavusoglu H. Configuration of and interaction between information security technologies: the case of firewalls and intrusion detection systems [J]. Information Systems Research, 2009, 20(2):198-217.
[9] Zhang Hongqi. Information security technology [M]. Beijing: Higher Education Press, 2008: 339-358.(in Chinese)
[10] Cavusoglu H, Mishra H, Raghunathan S. The value of intrusion detection systems(IDSs)in information technology security [J]. Information Systems Research, 2005, 16(1):28-46.
[11] Gordon L A, Loeb M P. The economics of information security investment [J]. ACM Transactions on Information and System Security, 2002, 5(4):438-457.