نتایج جستجو برای: security game
تعداد نتایج: 279601 فیلتر نتایج به سال:
The interactions between attackers and network administrator are modeled as a non-cooperative non-zero-sum dynamic game with incomplete information, which considers the uncertainty and the special properties of multi-stage attacks. The model is a Fictitious Play approach along a special game tree when the attacker is the leader and the administrator is the follower. Multi-objective optimization...
چکیده ندارد.
Data throughput is spectacularly increasing by using MIMO and CR utilizes the existing wireless spectrum opportunistically. The emerging technologies tackle the problem of limited available spectrum. Combination of ad hoc networks with MIMO and cognitive radios greatly ready to merge with the networking and communication technology of decentralized architecture. Adhoc in nature the networks mee...
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
this research is about the political economy of china in central asia. in this research the political & economic interactions affected on chinas political economy in central asia are examined. chinas goal of presence in central asia including political-security, economic and energy goals is described in one part. in another part, the trade relations between china and central asian countries ar...
This paper analyzes a multicriteria matrix goal game under entropy environment. Here a new game model known as multicriteria entropy matrix goal Game is formulated. Multiobjective non-linear programming model for each player is established. The concept of Pareto-optimal security strategy assures the property of security in the individual criteria against an opponent’s deviation in strategy; how...
We present classification of known attacks in online games and provide security solutions against them. While previous works just presented attacks and solutions in case by case, we newly classify attacks by objectives and methods. Moreover, we present attacks in each of four layers: client, server, network, and environment. Through this systematic classification, solutions can be provided more...
In this paper, we propose an evolutionary game model to analyze the investment decision making process in the cyber offender-defender interaction and provide a quantified approach for defender to calculate the safety threshold to avoid the occurrence of offender-leading game. Then we use simulation as a workbench to discuss the adjustment of each parameter to the security investment threshold. ...
Cloud Computing is one of the most popular information processing concepts of today’s IT world. The security of the cloud computing is complicated because each service model uses different infrastructure elements. Security elements implemented in a model are transferred to other persons or entities in another model. Each asset may need different security level than other assets depending on the...
With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents to invest more in security by internalizin...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید