Network Elicitation in Adversarial Environment
From MaRDI portal
Publication:3179201
DOI10.1007/978-3-319-47413-7_23zbMath1453.91031OpenAlexW2529859503MaRDI QIDQ3179201
Piotr Sankowski, Marcin Dziubiński, Qiang Zhang
Publication date: 21 December 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-47413-7_23
Noncooperative games (91A10) Games involving graphs (91A43) Algorithmic game theory and complexity (91A68)
Related Items (1)
Cites Work
- Network security and contagion
- Improving resource allocation strategies against human adversaries in security games: an extended study
- On the computational complexity of vertex integrity and component order connectivity
- Individual security, contagion, and network design
- Inoculation strategies for victims of viruses and the sum-of-squares partition problem
- Network design and defence
- Game-theoretic Robustness of Many-to-one Networks
- Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach
- Design of Network Topology in an Adversarial Environment
- A survey of some network reliability analysis and synthesis results
- The Price of Malice: A Game-Theoretic Framework for Malicious Behavior in Distributed Systems
- Optimal attack and reinforcement of a network
- Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality
This page was built for publication: Network Elicitation in Adversarial Environment