2019
DOI: 10.1016/j.procs.2019.08.098
|View full text |Cite
|
Sign up to set email alerts
|

A survey on game theoretic approaches for privacy preservation in data mining and network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Numerous surveys have been conducted in the realm of security within MANETs (see [26]- [36] [37]); additionally, there are different surveys concerning game theory in the field of network security as [38]- [48]. However, there is currently a lack of research that specifically focuses on the applications of game theory in the field of MANET security.…”
Section: A Previous Surveys and Contributionsmentioning
confidence: 99%
“…Numerous surveys have been conducted in the realm of security within MANETs (see [26]- [36] [37]); additionally, there are different surveys concerning game theory in the field of network security as [38]- [48]. However, there is currently a lack of research that specifically focuses on the applications of game theory in the field of MANET security.…”
Section: A Previous Surveys and Contributionsmentioning
confidence: 99%
“…In a game, if P 1 picks the pure strategy i, P 2 picks j, and P 3 picks k, then the payoff to P 1 is a ijk , the payoff to P 2 is b ijk , and the payoff to P 3 is c ijk . Define the S 1 × S 2 × S 3 payoff "cubes" A, B, and C by [30,31]: We construct one matrix for each of player 3's actions (strategies); thus player 1 chooses a row, player 2 chooses a column, and player 3 chooses a table. The bi-matrix for three players' game with its payoff is illustrated in Tab.…”
Section: Proposed Modelmentioning
confidence: 99%
“…Herein, a 111 denotes the payoff value for player 1's plan or strategy given return function u 1 (s 1 , t 1 , c 1 ) if (s 1 , t 1 , c 1 ) is chosen, b 111 is the amount of return for player 2's strategy given reward function u 2 (s 1 , t 1 , c 1 ) if (s 1 , t 1 , c 1 ) is picked, and c 111 is the payoff value for player 3's strategy with payoff function u 3 (s 1 , t 1 , c 1 ). The game for the suggested recovery model follows the non-cooperative game as all players in the game chose their strategies independently to earn a maximum profit [15,30,31]. These types of games can be formalized using normal-form representation [32].…”
Section: Proposed Modelmentioning
confidence: 99%
“…Game theory is used to build a strategic mathematical model to understand the interaction among players involved in the communication process. This involves implementing game theory to identify and resist vulnerable conditions during communication [37][38][39][40]. There has been some interesting research using game theory which offers potential insight into its capability to model intrusive interactions among communicating nodes [41].…”
Section: Game-based Security Studiesmentioning
confidence: 99%