Game-theoretic approach to the network security problem
In this paper we present an overview of the main applications of the game-theoretic approach to the network security. The game theory explores the interaction of rational agents in conflict and uncertainty. Models of game theory are successfully applied in economics, biology, computer networks and m...
Saved in:
| Date: | 2018 |
|---|---|
| Main Author: | Ignatenko, O.P. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
PROBLEMS IN PROGRAMMING
2018
|
| Subjects: | |
| Online Access: | https://pp.isofts.kiev.ua/index.php/ojs1/article/view/302 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Problems in programming |
| Download file: | |
Institution
Problems in programmingSimilar Items
Game theoretic modeling of AIMD network equilibrium
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Conflict controlled network modeling: evolutionary games approach
by: Ignatenko, O.P., et al.
Published: (2019)
by: Ignatenko, O.P., et al.
Published: (2019)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Evolutionary games in TCP networks with speed restriction policies
by: Ignatenko, O.P., et al.
Published: (2018)
by: Ignatenko, O.P., et al.
Published: (2018)
Game model of user interaction in heterogeneous distributed environments
by: Ignatenko, O.P., et al.
Published: (2017)
by: Ignatenko, O.P., et al.
Published: (2017)
Fluid models of dynamic scheduling in computer networks
by: Іgnatenko, O.P.
Published: (2025)
by: Іgnatenko, O.P.
Published: (2025)
Game-theory analysis of multi-processor schedulers. Simulation model
by: Ignatenko, O.P., et al.
Published: (2018)
by: Ignatenko, O.P., et al.
Published: (2018)
Implementation the concept of adaptive broadcast system and automatic preparation of content
by: Provotar, O.I., et al.
Published: (2025)
by: Provotar, O.I., et al.
Published: (2025)
The Organization Based on Game Theory of Multipath Secure Data Communication
by: Кулаков, Ю. А., et al.
Published: (2012)
by: Кулаков, Ю. А., et al.
Published: (2012)
Control models of data flows in Internet under instability
by: Ignatenko, O.P.
Published: (2025)
by: Ignatenko, O.P.
Published: (2025)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Design methodology of multimedia applications for gaming engines with a component-oriented architectural stile
by: Bezditnyi, V.M., et al.
Published: (2024)
by: Bezditnyi, V.M., et al.
Published: (2024)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Game-theoretic approach to the network security problem
by: O. P. Ihnatenko
Published: (2017)
by: O. P. Ihnatenko
Published: (2017)
Security basic model for applied tasks of the distributed information system
by: Rodin, Y.S., et al.
Published: (2021)
by: Rodin, Y.S., et al.
Published: (2021)
Reputation-based secyrity for heterogtneous structurally complex systems
by: Kussul, O.M.
Published: (2015)
by: Kussul, O.M.
Published: (2015)
Formal verification of deep neural networks
by: Panchuk, B.O.
Published: (2024)
by: Panchuk, B.O.
Published: (2024)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Using Bayesian network models for early assessment of cyberattack threats to electricity generation facility
by: Гальчинський, Л. Ю., et al.
Published: (2025)
by: Гальчинський, Л. Ю., et al.
Published: (2025)
A NEW METHODOLOGY CALLED DICE GAME OPTIMIZER FOR CAPACITOR PLACEMENT IN DISTRIBUTION SYSTEMS
by: Dehghani, M., et al.
Published: (2020)
by: Dehghani, M., et al.
Published: (2020)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Machine learning methods analysis in the document classification problem
by: Zhyrkova, A.P., et al.
Published: (2021)
by: Zhyrkova, A.P., et al.
Published: (2021)
Information security policy in the systems of information and analytical maintenance for support of organizational decisions
by: Churubrova, S.M.
Published: (2018)
by: Churubrova, S.M.
Published: (2018)
Information technology to ensure the survivability of sensor networks
by: Petrivskyi, V.Y., et al.
Published: (2022)
by: Petrivskyi, V.Y., et al.
Published: (2022)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Semantic approach to automated formation of information security systems documentation
by: Bova, Yu.V., et al.
Published: (2026)
by: Bova, Yu.V., et al.
Published: (2026)
Game-theoretic model of users ineteraction in computer network
by: A. P. Ignatenko
Published: (2017)
by: A. P. Ignatenko
Published: (2017)
Organizational and legal mechanisms of cybersecurity and cyber defense in Ukraine: essentiality, conditions and development prospects
by: Semenchenko, A.I., et al.
Published: (2020)
by: Semenchenko, A.I., et al.
Published: (2020)
Mathematical models and methods for solving some problems on the information security
by: Никифоров, О. В., et al.
Published: (2023)
by: Никифоров, О. В., et al.
Published: (2023)
Features of building recommendation systems based on neural network technology using multithreading
by: Komleva, N.O., et al.
Published: (2023)
by: Komleva, N.O., et al.
Published: (2023)
Resilience and stability in security
by: Мохор, В. В., et al.
Published: (2024)
by: Мохор, В. В., et al.
Published: (2024)
Game theoretic modeling of AIMD network equilibrium
by: Ignatenkо, O.P.
Published: (2016)
by: Ignatenkо, O.P.
Published: (2016)
Flow based bonet traffic detection using AI
by: Panchuk, B.O.
Published: (2023)
by: Panchuk, B.O.
Published: (2023)
Parallel distributed system for social networks streaming data analysis
by: Doroshenko, А.Yu., et al.
Published: (2017)
by: Doroshenko, А.Yu., et al.
Published: (2017)
Development of Web-prototype for analysis of statements in social network Twitter
by: Glybovets, A.M., et al.
Published: (2019)
by: Glybovets, A.M., et al.
Published: (2019)
Weather anomaly monitoring method based on sensor network technology
by: Rahozin, D.V.
Published: (2017)
by: Rahozin, D.V.
Published: (2017)
Hypercomplex Approach to Modeling of Reputation in Social Networks
by: Lande, D. V., et al.
Published: (2013)
by: Lande, D. V., et al.
Published: (2013)
Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
by: Prysiazhnyi, D. P.
Published: (2016)
by: Prysiazhnyi, D. P.
Published: (2016)
Similar Items
-
Game theoretic modeling of AIMD network equilibrium
by: Ignatenko, O.P.
Published: (2018) -
Conflict controlled network modeling: evolutionary games approach
by: Ignatenko, O.P., et al.
Published: (2019) -
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015) -
Evolutionary games in TCP networks with speed restriction policies
by: Ignatenko, O.P., et al.
Published: (2018) -
Game model of user interaction in heterogeneous distributed environments
by: Ignatenko, O.P., et al.
Published: (2017)