[1] Xiong Q. Evolutionary Game Analysis of Security Information Sharing in Virtual Enterprise[C]//4th International Conference on Management of e-Commerce and e-Government, ICMeCG 2010,393-397,Chengu, Sichuan,2010.10.23-2010.10.24 [2] Xiong Q, Zhong W, Mei S. A signal game model on security defense of information system[C]// 2011 IEEE 18th International Conference on Industrial Engineering and Engineering Management, IE and EM 2011,299-302,Changchun [3] Xiong Qiang, Zhong Weijun, Mei Shue, Incentive Mechanism Analysis of Information Security Outsourcing Based on Principal-Agent Model[J]. Journal of Southeast University (English Edition), 2014(1):113-117. (EI:20141917699987) [4] Xiong Qiang, Zhong Weijun, Li Zhiwen, Evolutionary game analysis of information security knowledge sharing among enterprise groups [J]. Soft science,2014(03):45-50. [5] Xiong Qiang, Zhong Weijun, Li Zhiwen,Analysis on resource allocation strategy of information security defense in network information system -- from the perspective of constraint theory [J]. Operations Research and Management Science,2014(03):163-169. [6] Xiong Qiang, Li Zhiwen,Influence of conformity behavior on input strategy of information security in network organizations [J], research on science and technology management, 2015(16):170-174 |