مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Verion

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

video

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

sound

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Persian Version

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View:

401
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Download:

163
مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

Cites:

Information Journal Paper

Title

Interdependent Security Game Design over Constrained Linear Influence Networks

Pages

  95-111

Abstract

 In today’ s highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through security investments considering the network structure, costs and constraints, which have been set by the network owner. However, decisions of selfish entities to maximize their utilities do not always lead to a socially optimum solution. Therefore, motivating players to reach the Social Optimum is of high value from the network owner’ s point of view. The network owner wants to maximize the overall network security by designing the game’ s parameters. As far as we know, there is no notable work in the context of linear influence networks to introduce appropriate Game Design for this purpose. This paper presents design methods that make use of the adjustments of players’ costs, interdependencies, and constraints to align players’ incentives with a network-wide global objective. We present a comprehensive investigation of existence and uniqueness conditions of Nash Equilibrium in such environments. Furthermore, numerical results of applying the proposed mechanisms in a sample real-world example are illustrated.

Cites

  • No record.
  • References

  • No record.
  • Cite

    APA: Copy

    Hasheminasab, Seyed Alireza, TORK LADANI, BEHROUZ, & Alpcan, Tansu. (2019). Interdependent Security Game Design over Constrained Linear Influence Networks. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 11(2 ), 95-111. SID. https://sid.ir/paper/241771/en

    Vancouver: Copy

    Hasheminasab Seyed Alireza, TORK LADANI BEHROUZ, Alpcan Tansu. Interdependent Security Game Design over Constrained Linear Influence Networks. THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY[Internet]. 2019;11(2 ):95-111. Available from: https://sid.ir/paper/241771/en

    IEEE: Copy

    Seyed Alireza Hasheminasab, BEHROUZ TORK LADANI, and Tansu Alpcan, “Interdependent Security Game Design over Constrained Linear Influence Networks,” THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, vol. 11, no. 2 , pp. 95–111, 2019, [Online]. Available: https://sid.ir/paper/241771/en

    Related Journal Papers

    Related Seminar Papers

  • No record.
  • Related Plans

  • No record.
  • Recommended Workshops






    Move to top
    telegram sharing button
    whatsapp sharing button
    linkedin sharing button
    twitter sharing button
    email sharing button
    email sharing button
    email sharing button
    sharethis sharing button