2022
DOI: 10.3390/covid2060058
|View full text |Cite
|
Sign up to set email alerts
|

Scalable and Demography-Agnostic Confinement Strategies for COVID-19 Pandemic with Game Theory and Graph Algorithms

Abstract: In the past, epidemics such as AIDS, measles, SARS, H1N1 influenza, and tuberculosis caused the death of millions of people around the world. In response, intensive research is evolving to design efficient drugs and vaccines. However, studies warn that new pandemics such as Coronavirus (COVID-19), variants, and even deadly pandemics can emerge in the future. The existing epidemic confinement approaches rely on a large amount of available data to determine policies. Such dependencies could cause an irreversible… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 33 publications
0
1
0
Order By: Relevance
“…Consumer and defense systems demanded design and manufacturing of electronics with increased performance, compared to their predecessors [1]. As such systems became ubiquitous in a plethora of domains, their application surface increased, thus making them a target for adversaries [2][3][4][5][6][7][8][9][10][11][12][13][14]. Hence, with improved performance the aspect of security demanded even more attention of the designers.…”
Section: Introduction To Hardware Securitymentioning
confidence: 99%
“…Consumer and defense systems demanded design and manufacturing of electronics with increased performance, compared to their predecessors [1]. As such systems became ubiquitous in a plethora of domains, their application surface increased, thus making them a target for adversaries [2][3][4][5][6][7][8][9][10][11][12][13][14]. Hence, with improved performance the aspect of security demanded even more attention of the designers.…”
Section: Introduction To Hardware Securitymentioning
confidence: 99%