Abstract: The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN). This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC), the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate. Copyright © 2014 IFSA Publishing, S. L
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore ...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
International audienceGame theory may offer a useful mechanism to address many problems in mobile ad...
At present, most network security analysis theory assumes that the players are completely rational. ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
In recent years, evolutionary game theory has been gradually applied to analyze and predict network ...
Abstract—In this paper, by applying the game theoreti-cal framework, we propose a new vulnerability ...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
The issue of cybersecurity has gained significant prominence in the context of safeguarding the priv...
This research involves the design, development, and theoretical demonstration of models resulting in...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
While there are significant advances in information technology and infrastructure which offer new op...
In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) ...
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore ...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
International audienceGame theory may offer a useful mechanism to address many problems in mobile ad...
At present, most network security analysis theory assumes that the players are completely rational. ...
Abstract. This paper presents a game-theoretic method for analyzing the security of computer network...
In recent years, evolutionary game theory has been gradually applied to analyze and predict network ...
Abstract—In this paper, by applying the game theoreti-cal framework, we propose a new vulnerability ...
Abstract Game-theoretic modeling of computer security views security attack scenarios as an optimiza...
In this paper, a game theoretical analysis method is presented to provide the optimal security detec...
The issue of cybersecurity has gained significant prominence in the context of safeguarding the priv...
This research involves the design, development, and theoretical demonstration of models resulting in...
Together with the massive and rapid evolution of computer networks, there has been a surge of resear...
This paper develops a game-theoretic defense approach against jamming attacks targeting access point...
While there are significant advances in information technology and infrastructure which offer new op...
In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) ...
Ubiquitous Computing and Internet of Things (IoT) are extremely popular in recent age and therefore ...
Abstract—As networks become ubiquitous in people’s lives, users depend on networks a lot for suffici...
International audienceGame theory may offer a useful mechanism to address many problems in mobile ad...