Sciweavers

201 search results - page 39 / 41
» A Network Game with Attackers and a Defender
Sort
View
TIP
2010
117views more  TIP 2010»
13 years 2 months ago
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
Abstract--Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates ...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
EOR
2007
104views more  EOR 2007»
13 years 7 months ago
Optimal resource allocation for security in reliability systems
Recent results have used game theory to explore the nature of optimal investments in the security of simple series and parallel systems. However, it is clearly important in practi...
M. Naceur Azaiez, Vicki M. Bier
ATAL
2010
Springer
13 years 8 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
DSN
2009
IEEE
13 years 5 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
COMSNETS
2012
222views more  COMSNETS 2012»
12 years 3 months ago
Assessing the veracity of identity assertions via OSNs
Anonymity is one of the main virtues of the Internet, as it protects privacy and enables users to express opinions more freely. However, anonymity hinders the assessment of the ve...
Michael Sirivianos, Kyungbaek Kim, Jian Wei Gan, X...