2019
DOI: 10.1155/2019/5475341
|View full text |Cite
|
Sign up to set email alerts
|

Allocating Limited Resources to Protect a Massive Number of Targets Using a Game Theoretic Model

Abstract: Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this resource allocation issue by constructing a game theoretic model. A defender and an attacker are players and the interaction is formulated as a tradeoff between protecting targets and consuming resources. The action cost which is a necessary role of consuming resource, is considered in the prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…Our complete bipartite graph has O(n 2 ) vertices (by construction), so our algorithm takes O(n 6 ) time. Observe that when t ≪ s, we have s * t ≈ n � O(n) (for example, when a very large number of distributed access points must be matched to a much smaller number of mobile stations [21], or limited resources are matched to a massive number of targets [22]), and thus, our algorithm runs in O(n 3 ) time. Moreover, in bipartite graphs with low-range edge weights, our algorithm runs well due to [19] As an example, consider two sets…”
Section: Tus W(main(m)) � C(l)mentioning
confidence: 99%
“…Our complete bipartite graph has O(n 2 ) vertices (by construction), so our algorithm takes O(n 6 ) time. Observe that when t ≪ s, we have s * t ≈ n � O(n) (for example, when a very large number of distributed access points must be matched to a much smaller number of mobile stations [21], or limited resources are matched to a massive number of targets [22]), and thus, our algorithm runs in O(n 3 ) time. Moreover, in bipartite graphs with low-range edge weights, our algorithm runs well due to [19] As an example, consider two sets…”
Section: Tus W(main(m)) � C(l)mentioning
confidence: 99%
“…To solve the above issue, we propose an active defense model. Liu et al 3 pointed out that defenders can attempt to stop attacks by making them pay a large enough cost to attackers. In this article, we adopt their view.…”
Section: Introductionmentioning
confidence: 99%