Research Article
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
Table 3
Atomic attack strategy description.
| Number | Attack action name | Attack strategy | | |
| | Weak password | √ | | | Node attack | √ | | | Trojan horse | | √ | | Network monitoring | | √ | | User name enumeration | √ | | | Network sniffing | | √ |
|
|