The Organization Based on Game Theory of Multipath Secure Data Communication
A method for improving the security of routing in wireless networks using game theory, which is used to deal with the presence of the most effective and most economical way to perform any complex tasks is proposed.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Кулаков, Ю. А., Лукашенко, В. В., Коган, А. В. |
| Format: | Article |
| Language: | Russian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/311906 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
EVOLUTION OF WIRELESS (CELLULAR) COMMUNICATION NETWORKS
by: Chernogor, L. F., et al.
Published: (2025)
by: Chernogor, L. F., et al.
Published: (2025)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
An analysis of publication activity in the scientific and technical direction of "Unmanned aerial vehicles"
by: Крючин, А. А., et al.
Published: (2025)
by: Крючин, А. А., et al.
Published: (2025)
A NEW METHODOLOGY CALLED DICE GAME OPTIMIZER FOR CAPACITOR PLACEMENT IN DISTRIBUTION SYSTEMS
by: Dehghani, M., et al.
Published: (2020)
by: Dehghani, M., et al.
Published: (2020)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Modernization of domestic power machine-building – basic of power security of Ukraine
by: Мацевитый, Ю. М., et al.
Published: (2013)
by: Мацевитый, Ю. М., et al.
Published: (2013)
Modernization of domestic power machine-building – basic of power security of Ukraine
by: Мацевитый, Ю. М., et al.
Published: (2013)
by: Мацевитый, Ю. М., et al.
Published: (2013)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
Security of decision support systems based on decentralized data platforms
by: Савченко, М. М.
Published: (2023)
by: Савченко, М. М.
Published: (2023)
Mathematical Game Theory Approach to Solution of Problems of Planet Radar Monitoring
by: Tolubko, V. B., et al.
Published: (2013)
by: Tolubko, V. B., et al.
Published: (2013)
Strategic Risk Management of Digital Transformation in the Economic Security of Industrial Enterprises
by: Ivanov, Mihail, et al.
Published: (2025)
by: Ivanov, Mihail, et al.
Published: (2025)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
The method of parametric adaptation of the check polynomials of the component recursive systematic convulsion code turbo code
by: Kurbet, Pavlo M., et al.
Published: (2024)
by: Kurbet, Pavlo M., et al.
Published: (2024)
Automated water level monitoring system in open water
by: Lepikh, Ya. I., et al.
Published: (2019)
by: Lepikh, Ya. I., et al.
Published: (2019)
A Cross-Sectional Review of Energy Transition, Security and Climate Change Policies
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
by: Georgescu, Cătălina Maria, et al.
Published: (2025)
Improving the security of critical infrastructures through automated organizational management systems
by: Додонов, О. Г., et al.
Published: (2022)
by: Додонов, О. Г., et al.
Published: (2022)
About geological theory
by: Gordienko, V.V.
Published: (2022)
by: Gordienko, V.V.
Published: (2022)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Оn the development of damage of information system operations and methodological issues of assessment of the efficiency of information security systems
by: Chepkov, Ihor B., et al.
Published: (2019)
by: Chepkov, Ihor B., et al.
Published: (2019)
Simplicial analysis of the structure of a cognitive model for researching the security of critical infrastructure object
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
An application of multi-magnetic circular planar spiral relay to improve the performance of wireless power transfer system
by: Irwanto, M., et al.
Published: (2024)
by: Irwanto, M., et al.
Published: (2024)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
Research of the optimization problem of structure hierarchical communication network with changing its parameters
by: Vasyanin, Volodymyr O., et al.
Published: (2024)
by: Vasyanin, Volodymyr O., et al.
Published: (2024)
Information and mathematical model of quantum communication channel state control processes
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
by: Zinchenko, Volodymyr L., et al.
Published: (2024)
Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
by: Nikiforova, L. A., et al.
Published: (2016)
by: Nikiforova, L. A., et al.
Published: (2016)
Combinatorial Game — «Connective Incompatibility»
by: Кріль, Сергій Олександрович, et al.
Published: (2018)
by: Кріль, Сергій Олександрович, et al.
Published: (2018)
Similar Items
-
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)