2017
DOI: 10.1109/tifs.2017.2687883
|View full text |Cite
|
Sign up to set email alerts
|

Epidemic Protection Over Heterogeneous Networks Using Evolutionary Poisson Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
60
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

4
4

Authors

Journals

citations
Cited by 46 publications
(60 citation statements)
references
References 49 publications
0
60
0
Order By: Relevance
“…Hayel et.al. in [3], [11] have studied large population game with heterogeneous types of individuals. They focus on group behavior of certain type in stead of individual behavior.…”
Section: Agents' Responsementioning
confidence: 99%
See 2 more Smart Citations
“…Hayel et.al. in [3], [11] have studied large population game with heterogeneous types of individuals. They focus on group behavior of certain type in stead of individual behavior.…”
Section: Agents' Responsementioning
confidence: 99%
“…The counterpart of λ j (t), j ∈ N in the individual Hamiltonian defined for the game problem is p i j (t), j ∈ N . Due to the similar structure of the Hamiltonian of the optimal control problem and the individual Hamiltonians for the game problem, after applying maximum principle, we obtain (17)(18)(19) that are in the same structure with (9)(10)(11). An optimal point can in principle be computed centrally by network operator to achieve social optimum.…”
Section: Inefficiency Of Nash Equilibriummentioning
confidence: 99%
See 1 more Smart Citation
“…The tutorial will be organized to connect different classes of games with different sets of security problems. For example (1) Stackelberg and multi-layer games for proactive defense [8, 26, 68, 70-72, 76, 80, 82], (2) network games for cyber-physical security that deals with critical infrastructure protection and information assurance [3,15,21,36,54,[56][57][58][59][60], (3) dynamic games for adaptive defense for network security [9,16,17,24,66,67,78,79,81], (4) mechanism design theory for economics of network security that investigates resource allocation methodologies [2,5,11,13,61,64,[73][74][75], and (5) game-theoretic analysis of cryptographic concepts, such as perfectly confidentiality and authentication (in classical and quantum networks) [47][48][49][50], network design and -provisioning [30-32, 45, 46, 53] and quantitative security risk management [33-35, 38-44, 51, 52] From the perspective of cybersecurity, the topics of this tutorial will cover recent applications of game theory to several emerging topics such as cross-layer cyber-physical security [6,21,29,59,69,77], cyber deception…”
Section: Tutorial Descriptionmentioning
confidence: 99%
“…Signaling games are often used to model deception and trust in cybersecurity [16,19,21]. Poisson games have also been used to model malware epidemics in large populations [11]. Wu et al use game theory to design defense mechanisms against DDoS attacks [24].…”
mentioning
confidence: 99%