Attack and defense strategies in complex networks based on game theory
From MaRDI portal
Publication:2287374
Recommendations
- Evolutionary dynamics of the interdependent security games on complex network
- Defense descision-making method for multi-path combined attack based on non-zero-sum game
- Game theoretical security detection strategy for networked systems
- Multi-node attack strategy of complex networks due to cascading breakdown
- Game theoretic model of strategic honeypot selection in computer networks
Cites work
- A course in game theory.
- Collective dynamics of `small-world' networks
- Complex networks: structure and dynamics
- Emergence of Scaling in Random Networks
- OPTIMIZATION OF ROBUSTNESS OF SCALE-FREE NETWORK TO RANDOM AND TARGETED ATTACKS
- OPTIMIZATION OF SCALE-FREE NETWORK FOR RANDOM FAILURES
- Optimal attack strategy of complex networks based on tabu search
- Robustness of regular ring lattices based on natural connectivity
- The Structure and Function of Complex Networks
- Vulnerability of complex networks under intentional attack with incomplete information
Cited in
(13)- A two-network adversarial game: model, strategy, and structure
- Defense descision-making method for multi-path combined attack based on non-zero-sum game
- An optimal group decision-making approach for cyber security using improved selection-drift dynamics
- Adversarial behavior in network games
- Multi-node attack strategy of complex networks due to cascading breakdown
- Evolutionary dynamics of the interdependent security games on complex network
- Attack, Defence, and Contagion in Networks
- scientific article; zbMATH DE number 2077655 (Why is no real title available?)
- Research on strategy optimization of bilateral link formation based on biform games
- Characterizing the optimal attack strategy decision in cyber epidemic attacks with limited resources
- Predator-prey games on complex networks
- Efficient best response computation for strategic network formation under attack
- An attack-defense game model in infrastructure networks under link hiding
This page was built for publication: Attack and defense strategies in complex networks based on game theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2287374)