2012
DOI: 10.1007/978-3-642-35582-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
14
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(15 citation statements)
references
References 6 publications
1
14
0
Order By: Relevance
“…In this example, the equilibrium interdiction strategy targets edges (s, 1) and (2, t) that do not belong to a same cut set. Thus, Theorem 3 generalizes the previously studied max-flow min-cut-based metrics of network criticality (see Assadi et al [2], Dwivedi and Yu [11], Gueye et al [13]).…”
Section: Let Us Assume Thatsupporting
confidence: 77%
See 2 more Smart Citations
“…In this example, the equilibrium interdiction strategy targets edges (s, 1) and (2, t) that do not belong to a same cut set. Thus, Theorem 3 generalizes the previously studied max-flow min-cut-based metrics of network criticality (see Assadi et al [2], Dwivedi and Yu [11], Gueye et al [13]).…”
Section: Let Us Assume Thatsupporting
confidence: 77%
“…Dwivedi and Yu [11], Gueye et al [13]). However, these objects cannot be applied to describe the critical network components in our game due to the heterogeneity of path interdiction probabilities resulting from the transportation costs.…”
Section: Gueye and Marbukhmentioning
confidence: 98%
See 1 more Smart Citation
“…For example, the authors in [6], [7] assume that the attack signal would follow certain probabilistic distributions and then design filters for detection of such attacks. In [8], [9], [10], [11], [12], the authors use the game theory framework, where the controller and attacker are players with competing goals in a game. Attackers are assumed to adopt specific strategies that maximize a certain cost and the controller or estimator is designed to minimize such a cost.…”
Section: Introductionmentioning
confidence: 99%
“…A referee has drawn our attention to a paper byGueye and Marbukh (2012) who study a game in which the Designer picks a spanning tree from a network while an Adversary picks a link to delete. The aim of the Adversary is to maximize the loss to the Designer.…”
mentioning
confidence: 99%