H Wu, W Wang - IEEE Transactions on Information Forensics …, 2018 - ieeexplore.ieee.org
… Inspired by this fact, gametheory is exploited in this paper to analyze the interactive … To the best of the authors’ knowledge, few results are available investigating gametheoretic …
… Gametheory uses monitoring to determine if the node is malicious. The major objective of gametheory is to … Gametheory selects the possible path based on the objectives to provide a …
… the players in the context of gametheory which is a suitable … game [12], which is a fundamental model of strategic resource allocation in multiple dimensions. In a Colonel Blotto game, …
… of gametheory is to find the Nash equilibrium point in the game process, and this equilibrium is sometimes the most strategic solution, so that gametheory … In this section, gametheory is …
… All the aforementioned papers use gametheory to provide network nodes (ie,things) with appropriate tools to mitigate certain attacks. In contrast, our work focuses on providing users …
… In this book, we utilize GameTheory in order to model, … GameTheory has been extensively used in networking research as a theoretical decision-making framework. GameTheory …
… This work proposes to exploit on gametheory to realize robust decentralized trust management able to tolerate malicious nodes sending mendacious scores. Explicitly, a signaling node …
… We use attack tree to guarantee the reliability of gametheory when … gametheory methods by reviewing their definitions and related research. In Section 3, we introduce a game-theory-…
R Rani, S Kumar, U Dohare - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
… game that promotes the nodes to be cluster head (CH) or cluster member to avoid the extraneous cluster; 2) an optimal cluster formation dilemma game … trust dilemma game to compute …