The Organization Based on Game Theory of Multipath Secure Data Communication
A method for improving the security of routing in wireless networks using game theory, which is used to deal with the presence of the most effective and most economical way to perform any complex tasks is proposed.
Saved in:
| Date: | 2012 |
|---|---|
| Main Authors: | Кулаков, Ю. А., Лукашенко, В. В., Коган, А. В. |
| Format: | Article |
| Language: | Russian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2012
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/311906 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)
by: Zubok, V. Yu.
Published: (2020)
Routing technology based on virtualization software-defined networking concept
by: Kravchenko, Yu.V., et al.
Published: (2024)
by: Kravchenko, Yu.V., et al.
Published: (2024)
Game theoretic modeling of AIMD network equilibrium
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Formation of the topological space of the Іnternet by the global routing system
by: Зубок, В. Ю., et al.
Published: (2021)
by: Зубок, В. Ю., et al.
Published: (2021)
Evolutionary games in TCP networks with speed restriction policies
by: Ignatenko, O.P., et al.
Published: (2018)
by: Ignatenko, O.P., et al.
Published: (2018)
Game-theory analysis of multi-processor schedulers. Simulation model
by: Ignatenko, O.P., et al.
Published: (2018)
by: Ignatenko, O.P., et al.
Published: (2018)
Research of functioning processes of wireless sensor networks
by: Semko, Viktor V., et al.
Published: (2021)
by: Semko, Viktor V., et al.
Published: (2021)
Determination of the optimal set of methods for iterative improvement of the reference route
by: Derevianko, E.M., et al.
Published: (2025)
by: Derevianko, E.M., et al.
Published: (2025)
Mathematical modeling of transport and logistics infrastructure for the post-war reconstruction of Ukraine
by: Horoshkova, Lidiia A., et al.
Published: (2024)
by: Horoshkova, Lidiia A., et al.
Published: (2024)
Quality of the Information Flow Management at Stochastic Energy Consumption Conditions
by: Kovtun, Svitlana, et al.
Published: (2023)
by: Kovtun, Svitlana, et al.
Published: (2023)
Development of a genetic method for solution of routing problems with several transport
by: Федорченко, Є. М., et al.
Published: (2023)
by: Федорченко, Є. М., et al.
Published: (2023)
EVOLUTION OF WIRELESS (CELLULAR) COMMUNICATION NETWORKS
by: Chernogor, L. F., et al.
Published: (2025)
by: Chernogor, L. F., et al.
Published: (2025)
Design methodology of multimedia applications for gaming engines with a component-oriented architectural stile
by: Bezditnyi, V.M., et al.
Published: (2024)
by: Bezditnyi, V.M., et al.
Published: (2024)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
OPTIMIZATION NOISE STABILITY BASED APPROACH TO CHANNEL ROUTING
by: Ivanov, V. G.
Published: (2014)
by: Ivanov, V. G.
Published: (2014)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
An analysis of publication activity in the scientific and technical direction of "Unmanned aerial vehicles"
by: Крючин, А. А., et al.
Published: (2025)
by: Крючин, А. А., et al.
Published: (2025)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
A NEW METHODOLOGY CALLED DICE GAME OPTIMIZER FOR CAPACITOR PLACEMENT IN DISTRIBUTION SYSTEMS
by: Dehghani, M., et al.
Published: (2020)
by: Dehghani, M., et al.
Published: (2020)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Problems of innovation in the light of evolutionary theory
by: Vishnevsky, V.P., et al.
Published: (2010)
by: Vishnevsky, V.P., et al.
Published: (2010)
Game theory and optimization models and methods to increase security of cyberinfrastructures
by: V. M. Horbachuk, et al.
Published: (2022)
by: V. M. Horbachuk, et al.
Published: (2022)
Adaptive Organization - Management Tool in Variable Environment
by: Коlоsоv, A.M.
Published: (2014)
by: Коlоsоv, A.M.
Published: (2014)
On the theory of the initial stage of slow nuclear burning
by: Khizhnyak, N.
Published: (2001)
by: Khizhnyak, N.
Published: (2001)
The theory of kinetic processes in anisotropic phonon systems
by: Adamenko, I.N., et al.
Published: (2001)
by: Adamenko, I.N., et al.
Published: (2001)
The multidensity integral equation approach in the theory of complex liquids
by: Holovko, M.F.
Published: (2001)
by: Holovko, M.F.
Published: (2001)
Influence of Strong Shadowing on Characteristics of Specular Elements upon Multipath Propagation
by: Logvinov, Yu. F.
Published: (2013)
by: Logvinov, Yu. F.
Published: (2013)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Reduced description method in dynamic theory of particles interacting with medium
by: Nikolayenko, S.O., et al.
Published: (2007)
by: Nikolayenko, S.O., et al.
Published: (2007)
Method of reduced description in theory of long wave nonequilibrium fluctuations
by: Peletminskii, S.V., et al.
Published: (2001)
by: Peletminskii, S.V., et al.
Published: (2001)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Application of number theory methods for task solution of intertemporal balance in economy
by: Zhykhareva, Y.I.
Published: (2010)
by: Zhykhareva, Y.I.
Published: (2010)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
A new theory of gravity
by: Sannikov-Proskurjakov, S.S.
Published: (2001)
by: Sannikov-Proskurjakov, S.S.
Published: (2001)
Communicative games in the second-language acquisition
by: Георгиади, А.А.
Published: (2004)
by: Георгиади, А.А.
Published: (2004)
Similar Items
-
An analysis of the Internet Nodes Security from route hijack cyber attacks
by: Zubok, V. Yu.
Published: (2020) -
А formal description of the internet global routing objects and processes for global routing cyberattacs impact assessment
by: Zubok, V. Yu.
Published: (2019) -
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018) -
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019) -
Risk factor analysis of an example of an incident with global routing registry software
by: Zubok, V. Yu.
Published: (2020)