Game Theoretic Modeling of Malicious Users in Collaborative Networks

Abstract

If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the part of the user. Therefore, users cannot automatically be expected to follow the protocol if they are not forced to. The situation is exacerbated by the presence of malicious… (More)
DOI: 10.1109/JSAC.2008.080928

5 Figures and Tables

Topics

Statistics

0510152009201020112012201320142015201620172018
Citations per Year

80 Citations

Semantic Scholar estimates that this publication has 80 citations based on the available data.

See our FAQ for additional information.

  • Presentations referencing similar topics