Game Theoretic Defense Framework Against Sybil Attacks

B Kumar, B Bhuyan - SN Computer Science, 2024 - Springer
Sybil attacks are treacherous attacks on the reputation mechanism of a network. In our
current work, we propose a game theory-based defense mechanism against such attacks …

Optimal network defense strategy selection method based on evolutionary network game

X Liu, H Zhang, Y Zhang, L Shao - Security and …, 2020 - Wiley Online Library
The basic hypothesis of evolutionary game theory is that the players in the game possess
limited rationality. The interactive behavior of players can be described by a learning …

Energy‐aware virtual machine consolidation based on evolutionary game theory

X Liu, J Wu, L Chen, L Zhang - Concurrency and Computation …, 2022 - Wiley Online Library
Cloud data center consumes enormous amount of electrical power resulting in high
operating cost and carbon dioxide emission. Virtual machine (VM) consolidation strives to …

Game theoretic approach applied in cybersecurity information exchange framework

A Thakkar, S Badsha… - 2020 IEEE 17th Annual …, 2020 - ieeexplore.ieee.org
In CYBersecurity information EXchange (CYBEX) framework, Cyber Threat Intelligence (CTI)
is shared among multiple organizations with a view of creating situational awareness. But …

Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism

F Wang, N Liang, F Wu, B Zhou, J Nie, X Zhang - Cluster Computing, 2024 - Springer
Within the intricate dynamics of a blockchain system, participants with bounded rationality
may engage in dishonest behavior, thereby disrupting the consensus of the system in the …

Playing with sybil

F Saab, A Kayssi, I Elhajj, A Chehab - ACM SIGAPP Applied Computing …, 2016 - dl.acm.org
Recommender systems have become quite popular recently. However, such systems are
vulnerable to several types of attacks that target user ratings. One such attack is the Sybil …

Evolutionary computation in network management and security: GECCO 2017 tutorial

N Zincir-Heywood, G Kayacik - Proceedings of the Genetic and …, 2017 - dl.acm.org
❖ Aims at develo** a physical layer Radio Frequency air monitoring capability to limit
unauthorized Wireless Access Point access and improve network security❖ uses Differential …

[PDF][PDF] Selected Research Articles

G Douglas, R Lawrence - sigapp.org
A large class of entity extraction tasks from unstructured data may be addressed by regular
expressions, because in many practical cases the relevant entities follow an underlying …