From post

Towards a Metric for Communication Network Vulnerability to Attacks: A Game Theoretic Approach.

, , и . GAMENETS, том 105 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 259-274. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Scalable Optimization of Large-Scale IoT Access for Mobile Users with Diverse Requirements.. PIMRC, стр. 1-6. IEEE, (2020)Toward Understanding of Metastability in Cellular Networks: Emergence and Implications for Performance., и . GLOBECOM, стр. 1293-1298. IEEE, (2008)Towards Security Metrics Combining Risks of Known and Zero-day Attacks: Work in Progress.. NOMS, стр. 1-4. IEEE, (2023)Towards efficient offloading in fog/edge computing by approximating effect of externalities.. INFOCOM Workshops, стр. 754-759. IEEE, (2018)Towards Evaluation/Mitigation Risk of Systemic Failures in a Recoverable Network with Redistributed Elastic Load.. ICPE (Companion), стр. 115-116. ACM, (2023)Bursty fluid approximation of TCP for modeling internet congestion at the flow level., и . Allerton, стр. 1300-1306. IEEE, (2009)Demand Pricing & Resource Allocation in Market-Based Compute Grids: A Model and Initial Results., и . ICN, стр. 752-757. IEEE Computer Society, (2008)Impact of Using Soft Exposure Thresholds in Automatic Contact Tracing., , и . HealthCom, стр. 1-6. IEEE, (2022)Optimal target tracking strategy with controlled node mobility in mobile sensor networks., , , , и . ACC, стр. 2921-2928. IEEE, (2010)A Regret Matching Strategy Framework for Inter-BAN Interference Mitigation., , , и . WMNC, стр. 231-234. IEEE, (2015)