Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Game Theoretic Defense Framework Against Sybil Attacks
Sybil attacks are treacherous attacks on the reputation mechanism of a network. In our
current work, we propose a game theory-based defense mechanism against such attacks …
current work, we propose a game theory-based defense mechanism against such attacks …
Optimal network defense strategy selection method based on evolutionary network game
X Liu, H Zhang, Y Zhang, L Shao - Security and …, 2020 - Wiley Online Library
The basic hypothesis of evolutionary game theory is that the players in the game possess
limited rationality. The interactive behavior of players can be described by a learning …
limited rationality. The interactive behavior of players can be described by a learning …
Energy‐aware virtual machine consolidation based on evolutionary game theory
X Liu, J Wu, L Chen, L Zhang - Concurrency and Computation …, 2022 - Wiley Online Library
Cloud data center consumes enormous amount of electrical power resulting in high
operating cost and carbon dioxide emission. Virtual machine (VM) consolidation strives to …
operating cost and carbon dioxide emission. Virtual machine (VM) consolidation strives to …
Game theoretic approach applied in cybersecurity information exchange framework
In CYBersecurity information EXchange (CYBEX) framework, Cyber Threat Intelligence (CTI)
is shared among multiple organizations with a view of creating situational awareness. But …
is shared among multiple organizations with a view of creating situational awareness. But …
Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism
F Wang, N Liang, F Wu, B Zhou, J Nie, X Zhang - Cluster Computing, 2024 - Springer
Within the intricate dynamics of a blockchain system, participants with bounded rationality
may engage in dishonest behavior, thereby disrupting the consensus of the system in the …
may engage in dishonest behavior, thereby disrupting the consensus of the system in the …
Playing with sybil
Recommender systems have become quite popular recently. However, such systems are
vulnerable to several types of attacks that target user ratings. One such attack is the Sybil …
vulnerable to several types of attacks that target user ratings. One such attack is the Sybil …
Evolutionary computation in network management and security: GECCO 2017 tutorial
❖ Aims at develo** a physical layer Radio Frequency air monitoring capability to limit
unauthorized Wireless Access Point access and improve network security❖ uses Differential …
unauthorized Wireless Access Point access and improve network security❖ uses Differential …
[PDF][PDF] Selected Research Articles
G Douglas, R Lawrence - sigapp.org
A large class of entity extraction tasks from unstructured data may be addressed by regular
expressions, because in many practical cases the relevant entities follow an underlying …
expressions, because in many practical cases the relevant entities follow an underlying …