Game Theoretic Modeling of Malicious Users in Collaborative Networks


If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the part of the user. Therefore, users cannot automatically be expected to follow the protocol if they are not forced to. The situation is exacerbated by the presence of malicious… (More)
DOI: 10.1109/JSAC.2008.080928

5 Figures and Tables



Citations per Year

80 Citations

Semantic Scholar estimates that this publication has 80 citations based on the available data.

See our FAQ for additional information.

  • Presentations referencing similar topics