购买
下载掌阅APP,畅读海量书库
立即打开
畅读海量书库
扫码下载掌阅APP

参考文献

[1] 张维迎.博弈论与信息经济学[M].上海:格致出版社, 2012.

[2] 朱·弗登博格,让·梯若尔.博弈论[M].黄涛,译.北京:中国人民大学出版社, 2010.

[3] 姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报, 2009, 32(4): 817-827.

[4] 程代展,刘挺,王元华.博弈论中的矩阵方法[J].系统科学与数学, 2014, 34(11): 1291-1305.

[5] MONDERER D, SHAPLEY L S. Potential games[J]. Games and Economic Behavior, 1996, 14(1): 124-143.

[6] DONG C Y, WANG Y L, ALDWEESH A, et al. Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM Press, 2017:211-227.

[7] MASCHLER M, SOLAN E, ZAMIR S. Game theory[M]. Cambridge: Cambridge University Press, 2009.

[8] ROSENTHAL R W. A class of games possessing pure-strategy Nash equilibria[J]. International Journal of Game Theory, 1973, 2(1): 65-67.

[9] VOORNEVELD M. Best-response potential games[J]. Economics Letters, 2000, 66(3): 289-295.

[10] WEAVER W W, KREIN P T. Game-theoretic control of small-scale power systems[J]. IEEE Transactions on Power Delivery, 2009, 24(3): 1560-1567. vEtJt7UchX4uk3WJFKfrno+wPtypqt9L7Sz3gvH8mUYJr06rlCwmdxCe4p+TvhRO

点击中间区域
呼出菜单
上一章
目录
下一章
×