scholarly journals Overview on MTD technology based on game theory

2020 ◽  
Vol 309 ◽  
pp. 02012
Author(s):  
Yan Sun ◽  
Weifeng Ji ◽  
Jiang Weng ◽  
Beiying Zhao

Mobile target defense (MTD) is a research hotspot in the field of network security. The decision method of network defense based on game theory is an important technique to guide MTD to make the optimal defense behavior in different network environments (GT-MTD). A lot of related work has been put forward in this field. In this paper, we focus on the scope and field of GT-MTD, systematically introduce the application scenarios of MTD in combination with four different game theory models of classical games (static games, signal games), Markov games, differential games or evolutionary games, and put forward the future development direction. There are some new views and explanations on the research of GT-MTD.

Author(s):  
Arij Michel

The article uses evolutionary game theory analysis as the research object, which is the most commonly used research method of institutional change, and summarizes some methods in the research of institutional change, and points out the advantages and disadvantages of evolutionary game analysis in the research of institutional change and through the comparison of cutting-edge methods and evolutionary games to see the development direction of future research institutional changes.


2021 ◽  
Vol 235 ◽  
pp. 02076
Author(s):  
Yanrong Huang ◽  
Bin Huang ◽  
Min Chen

Crowdsourcing is an important form for enterprises to realize open innovation, which can gather the wisdom of the public and gather talents from various fields to participate in technological innovation and value creation. This paper systematically reviews the emergence and development of crowdsourcing in China, analyzes the causes and characteristics of the four stages of crowdsourcing development with the clue of major events in the development process of crowdsourcing; takes the operation process of crowdsourcing as the breakthrough point, discusses the bidirectional driving optimization path for the benign rolling development of crowdsourcing mode under the background of “mass entrepreneurship and innovation”; and prospects. Finally, the future development direction of crowdsourcing mode is pointed out.


2015 ◽  
Vol 4 (3) ◽  
pp. 18
Author(s):  
Shujun Shi

<p>High-rise buildings have become an inevitable trend in future building development. Since today’s building theories and technologies have not fully matured, we should perform a comprehensive analysis by combining urban environmental conditions in order to promote sustainable development of high-rise buildings. This study will discuss development prospects and problems of high-rise buildings via the relationship between urban environment and high-rise buildings, in order to form a more comprehensive and mature understanding of future development direction and the focus of high-rise building, and to propose appropriate countermeasures to the negative impacts of high-rise buildings on the development of urban environment.</p>


Game Theory ◽  
2017 ◽  
pp. 369-382
Author(s):  
Sungwook Kim

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. It involves the authorization of access to data in a network, which is controlled by the network administrator. Usually, network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies, and individuals. This chapter explores network security.


Author(s):  
Katia Sycara ◽  
Paul Scerri ◽  
Anton Chechetka

In this chapter, we explore the use of evolutionary game theory (EGT) (Weibull, 1995; Taylor & Jonker, 1978; Nowak & May, 1993) to model the dynamics of adaptive opponent strategies for large population of players. In particular, we explore effects of information propagation through social networks in Evolutionary Games. The key underlying phenomenon that the information diffusion aims to capture is that reasoning about the experiences of acquaintances can dramatically impact the dynamics of a society. We present experimental results from agent-based simulations that show the impact of diffusion through social networks on the player strategies of an evolutionary game and the sensitivity of the dynamics to features of the social network.


2014 ◽  
Vol 687-691 ◽  
pp. 1892-1895
Author(s):  
Shuang Ping Li

With the rapid development of network technology, the network security related threats are more and more serious at present. To guarantee the security of the network, now the main defense technology is static, but the static defense technology don’t change with the corresponding preventive measures change and unable to attack intention and attack strategies. Based on the analysis of the current situation, this paper mainly analyses the dynamic non cooperative game theory, and applied the theory to network security prevention, and achieved good results.


2015 ◽  
Vol 1088 ◽  
pp. 275-278
Author(s):  
Yao Tang ◽  
Zhao Lin Zhan ◽  
Xiao Hua Yu ◽  
Miao Ma ◽  
Xiao Yu Li

Manganese lithium cobalt compounds have been used in the preparation of lithium battery cathode material because of its excellent electrochemical characteristics and gradually in recent years. This paper introduces the different methods of preparing the compounds, analyzes the structural characteristics of the manganese cobalt lithium compounds and the differences in the electrochemical properties, the end of the article has carried on the forecast to the future development direction of the compound.


2013 ◽  
Vol 347-350 ◽  
pp. 3971-3974 ◽  
Author(s):  
Heng Xiao ◽  
Cao Fang Long

With the development of network application, network security is facing greater pressure. Based on the characteristics of intrusion detection in the wireless network of the Ad hoc working group, the article introduces the game theory, proposes a game model of network security, concluds the Nash equilibrium in the stage game, repeats game, the pareto Nash equilibrium, more attack both income and payment, so that they get the best choice.


Sign in / Sign up

Export Citation Format

Share Document