Learn More
Twitter contains a wealth of timely information, however staying on top of breaking events requires that an information analyst constantly scan many sources, leading to information overload. For example, a user might wish to be made aware whenever an infectious disease outbreak takes place, when a new smartphone is announced or when a distributed Denial of(More)
In March of 2013, what started as a minor dispute between Spamhaus and Cyberbunker culminated in a distributed denial of service (DDoS) attack that was so massive, it was claimed to have slowed internet speeds around the globe. The attack clogged servers with dummy internet traffic at a rate of about 300 gigabits per second. By comparison , the largest(More)
—Agents in a social-technological network can be thought of as strategically interacting with each other by continually observing their own local or hyperlocal information and communicating suitable signals to the receivers who can take appropriate actions. Such interactions have been modeled as information-asymmetric signaling games and studied in our(More)
We propose a game theoretic framework to study strategic interactions among Humans and Things, assumed to be interconnected by a social-technological network, such as Internet of Humans and Things. Often a pair of agents in the network interacts in order for an informed sender agent to signal an uninformed receiver agent to take an action so as to benefit(More)
We present a game theoretic framework, modeling strategic interactions among humans and things, which are assumed to be interconnected by a social-technological network, as in Internet of Humans and Things (IOHT). Often a pair of agents in the network interact in order for an informed sender-agent to signal an uninformed receiver-agent to take an action(More)
  • 1