How bad are selfish investments in network security?

L Jiang, V Anantharam… - IEEE/ACM Transactions on …, 2010 - ieeexplore.ieee.org
We study a network security game where strategic players choose their investments in
security. Since a player's investment can reduce the propagation of computer viruses, a key …

System theoretic aspects of influenced consensus: Single input case

A Chapman, M Mesbahi - IEEE Transactions on Automatic …, 2011 - ieeexplore.ieee.org
This technical note examines the dynamics of networked multi-agent systems operating with
a consensus-type algorithm, under the influence of an attached node or external agent …

Stochastic strategic routing reduces attack effects

G Calinescu, S Kapoor, K Qiao… - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
In this paper we consider the problem of routing traffic between k source-destination pairs.
Using game theoretic modeling we provide randomized strategies to minimize the threat of …

Identification and infiltration in consensus-type networks

A Chapman, M Nabi-Abdolyousefi… - IFAC Proceedings Volumes, 2009 - Elsevier
This paper examines the system dynamics of a controlled networked multi-agent system,
operating with a consensus-type algorithm, that is under the influence of attached node (s) …

Security and infiltration of networks: A structural controllability and observability perspective

A Chapman, M Mesbahi - Control of Cyber-Physical Systems: Workshop …, 2013 - Springer
This paper examines the role of structural controllability (s-controllability) in the design of
secure linear-time-invariant networked systems. We reason about secure network design in …

Semi-autonomous networks: theory and decentralized protocols

A Chapman, E Schoof… - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
This paper examines the system dynamics of a networked multi-agent system, operating
with a consensus-type algorithm, that can be influenced by external agents. We refer to this …

Game theory based dynamic defense mechanism for SDN

D Mao, S Zhang, L Zhang, Y Feng - … ML4CS 2019, Xi'an, China, September …, 2019 - Springer
Many efforts have been down on tackling the network security issues using game theory,
especially studying the dynamic defense mechanism. They mostly concentrated on the …

Resource allocation in an asymmetric technology race with temporary advantages

B Golany, M Kress, M Penn… - Naval Research …, 2012 - Wiley Online Library
We consider two opponents that compete in developing asymmetric technologies where
each party's technology is aimed at damaging (or neutralizing) the other's technology. The …

Overview on MTD technology based on game theory

Y Sun, W Ji, J Weng, B Zhao - MATEC Web of Conferences, 2020 - matec-conferences.org
Mobile target defense (MTD) is a research hotspot in the field of network security. The
decision method of network defense based on game theory is an important technique to …

Adversary games in secure/reliable network routing

G Calinescu, S Kapoor, M Quinn, J Shin - Game Theory for Networks: 2nd …, 2012 - Springer
In this paper, we consider security aspects of network routing in a game-theoretic framework
where an attacker is empowered with an ability for intrusion into edges of the network; on the …