Authors
Andrey Garnaev, Melike Baykal-Gursoy, H Vincent Poor
Publication date
2016
Journal
IEEE Transactions on Cybernetics
Volume
46
Issue
10
Pages
2291-2299
Publisher
IEEE
Description
The security community has witnessed a significant increase in the number of different types of security threats. This situation calls for the design of new techniques that can be incorporated into security protocols to meet these challenges successfully. An important tool for developing new security protocols as well as estimating their effectiveness is game theory. This game theory framework usually involves two players or agents: 1) a protector and 2) an adversary, and two patterns of agent behavior are considered: 1) selfish behavior, where each of the agents wants to maximize his payoff; and 2) leader and follower behavior, where one agent (the leader) expects that the other agent (the follower) will respond to the leader's strategy. Such an approach assumes that the agents agree on which strategy to apply in advance. In this paper, this strong assumption is relaxed. Namely, the following question is considered …
Total citations
20152016201720182019202020212022202320242398884433
Scholar articles
A Garnaev, M Baykal-Gursoy, HV Poor - IEEE transactions on cybernetics, 2015