Game theory for cyber security and privacy
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …
privacy issues, categorizing their application into two classes, security and privacy. To show …
Edge computing resource allocation for unmanned aerial vehicle assisted mobile network with blockchain applications
H Xu, W Huang, Y Zhou, D Yang, M Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Mobile edge computing is becoming a major trend in providing computation capacities at the
edge of mobile networks. Meanwhile, unmanned aerial vehicles (UAVs) have been …
edge of mobile networks. Meanwhile, unmanned aerial vehicles (UAVs) have been …
Automated cyber and privacy risk management toolkit
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often …
number of risk assessment methodologies and software tools are available, it is most often …
HoneyCar: a framework to configure honeypot vulnerabilities on the internet of vehicles
The Internet of Vehicles (IoV), whereby interconnected vehicles that communicate with each
other and with road infrastructure on a common network, has promising socio-economic …
other and with road infrastructure on a common network, has promising socio-economic …
A game-theoretic routing protocol for 3-D underwater acoustic sensor networks
As a key technology of the Internet of Underwater Things (IoUT), underwater acoustic sensor
networks (UASNs) have attracted considerable attention from both academia and industry …
networks (UASNs) have attracted considerable attention from both academia and industry …
[HTML][HTML] Game-theoretic APT defense: An experimental study on robotics
This paper proposes a novel game-theoretic framework for defending against Advanced
Persistent Threats (APTs). It applies the original Cut-The-Rope model into an experimental …
Persistent Threats (APTs). It applies the original Cut-The-Rope model into an experimental …
Towards dynamic threat modelling in 5G core networks based on MITRE ATT&CK
This article discusses how the gap between early 5G network threat assessments and an
adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the …
adversarial Tactics, Techniques, Procedures (TTPs) knowledge base for future use in the …
[PDF][PDF] Multiobjective optimization algorithms for wireless sensor networks
A Wireless Sensor Network (WSN), distributed within an area of interest, is a network that
contains many wirelessly interconnected devices, with sensing, communication, and …
contains many wirelessly interconnected devices, with sensing, communication, and …
A Stackelberg game for street-centric QoS-OLSR protocol in urban vehicular ad hoc networks
In this paper, we address the problem of routing in urban Vehicular Ad Hoc Networks
(VANETs) using proactive Optimized Link State Routing (OLSR) protocol in the presence of …
(VANETs) using proactive Optimized Link State Routing (OLSR) protocol in the presence of …
COALA: a protocol for the avoidance and alleviation of congestion in wireless sensor networks
The occurrence of congestion has an extremely deleterious impact on the performance of
Wireless Sensor Networks (WSNs). This article presents a novel protocol, named COALA …
Wireless Sensor Networks (WSNs). This article presents a novel protocol, named COALA …