메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1485-1493

Protecting against network infections: A game theoretic perspective

Author keywords

[No Author keywords available]

Indexed keywords

CRITICAL PROBLEMS; EPIDEMIC MODELS; EPIDEMIC PROCESS; EPIDEMIC THEORY; GAME-THEORETIC PERSPECTIVES; INTERNET WORM; NASH EQUILIBRIUM; NON-COOPERATIVE BEHAVIORS; NONCOOPERATIVE GAME MODELS; PRICE OF ANARCHY; PROTECTION STRATEGY; SECURITY BREACHES; THEORETICAL APPROACH; UNIFIED FRAMEWORK;

EID: 67650416963     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062065     Document Type: Conference Paper
Times cited : (92)

References (31)
  • 2
    • 84929154574 scopus 로고    scopus 로고
    • In-homogeneous Virus spread in Networks
    • Technical report 20080801
    • P. Van Mieghem, J. Omic, "In-homogeneous Virus spread in Networks", Technical report 20080801, http://www.nas.its.tudelft.n1/ people/Piet/TUDelftReports.html
    • Van Mieghem, P.1    Omic, J.2
  • 3
    • 0018922522 scopus 로고
    • Existence and Uniqueness of Equilibrium Point for Concave N-person Games
    • Jul
    • J.B. Rosen, "Existence and Uniqueness of Equilibrium Point for Concave N-person Games", Econometrica, Vol. 33, No. 3, pp. 520-534, Jul. 1965.
    • (1965) Econometrica , vol.33 , Issue.3 , pp. 520-534
    • Rosen, J.B.1
  • 4
    • 21844509864 scopus 로고
    • Existence Theorems of Nash Equilibria for Non-Cooperative N-Person Games
    • Sep
    • K. Keong Tan, J. Yu and X. Yuan, "Existence Theorems of Nash Equilibria for Non-Cooperative N-Person Games", International Journal of Game Theory, Vol. 24, No. 3, pp. 217-222, Sep. 1995
    • (1995) International Journal of Game Theory , vol.24 , Issue.3 , pp. 217-222
    • Keong Tan, K.1    Yu, J.2    Yuan, X.3
  • 5
    • 33746689683 scopus 로고    scopus 로고
    • Inoculation Strategies for Victims of Viruses and Sum-of-squares Partition Problem
    • J. Aspnes, K. Chang, A. Yampolskiy, "Inoculation Strategies for Victims of Viruses and Sum-of-squares Partition Problem", Journal of Computer and System Sciences, Vol. 72, pp. 1077-1093, 2006.
    • (2006) Journal of Computer and System Sciences , vol.72 , pp. 1077-1093
    • Aspnes, J.1    Chang, K.2    Yampolskiy, A.3
  • 6
    • 70349700975 scopus 로고    scopus 로고
    • Private communication
    • A. Ganesh, Private communication.
    • Ganesh, A.1
  • 7
    • 25844439630 scopus 로고    scopus 로고
    • The Effect of Network Topology on the Spread of Epidemics
    • A. Ganesh, L. Massoulié and D. Towsley, "The Effect of Network Topology on the Spread of Epidemics", IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Ganesh, A.1    Massoulié, L.2    Towsley, D.3
  • 8
    • 0042474229 scopus 로고    scopus 로고
    • Modeling Malware Spreading Dynamics
    • San Francisco, CA, Apr
    • M. Garetto, W. Gong, D. Towsley, "Modeling Malware Spreading Dynamics", IEEE INFOCOM'03, San Francisco, CA, Apr. 2003.
    • (2003) IEEE INFOCOM'03
    • Garetto, M.1    Gong, W.2    Towsley, D.3
  • 9
    • 33748173792 scopus 로고    scopus 로고
    • Spreading on Networks: A Topographic View
    • G. S. Canright and K. Engo-Monsen, "Spreading on Networks: A Topographic View", Complexus, 2006.
    • (2006) Complexus
    • Canright, G.S.1    Engo-Monsen, K.2
  • 10
    • 0004029063 scopus 로고    scopus 로고
    • The Influence Model: A Tractable Representation for the Dynamics of Networked Markov Chains
    • Ph.D. thesis, Massachusetts Institute of Technology, Oct
    • C. Asavathiratham, "The Influence Model: A Tractable Representation for the Dynamics of Networked Markov Chains", Ph.D. thesis, Massachusetts Institute of Technology, Oct. 2000.
    • (2000)
    • Asavathiratham, C.1
  • 11
    • 0034721164 scopus 로고    scopus 로고
    • Error and Attack Tolerance of complex networks
    • 27 Jul
    • Albert, R. and H. Jeong and A.-L. Barabsi, "Error and Attack Tolerance of complex networks", Nature Vol. 406, pp. 378-382, 27 Jul. 2000.
    • (2000) Nature , vol.406 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabsi, A.-L.3
  • 13
  • 19
    • 84976754886 scopus 로고
    • On the Existence of Equilibria in Noncooperative Optimal Flow Control
    • Y A. Korilis and A. A. Lazar, "On the Existence of Equilibria in Noncooperative Optimal Flow Control," Journal of the ACM, vol. 42, no. 3, pp. 584-613, 1995.
    • (1995) Journal of the ACM , vol.42 , Issue.3 , pp. 584-613
    • Korilis, Y.A.1    Lazar, A.A.2
  • 20
    • 0033872563 scopus 로고    scopus 로고
    • Competitive Routing in Networks with Polynomial Cost
    • E. Altman, T. Basar, T. Jiménez, and N. Shimkin, "Competitive Routing in Networks with Polynomial Cost," in INFOCOM, 2000, pp. 1586-1593.
    • (2000) INFOCOM , pp. 1586-1593
    • Altman, E.1    Basar, T.2    Jiménez, T.3    Shimkin, N.4
  • 21
    • 0031364496 scopus 로고    scopus 로고
    • Virtual Path Bandwidth Allocation in Multiuser Networks
    • A. A. Lazar, A. Orda, and D. E. Pendarakis, "Virtual Path Bandwidth Allocation in Multiuser Networks," IEEE/ACM Trans. Netw., vol. 5, no. 6, pp. 861-871, 1997.
    • (1997) IEEE/ACM Trans. Netw , vol.5 , Issue.6 , pp. 861-871
    • Lazar, A.A.1    Orda, A.2    Pendarakis, D.E.3
  • 24
    • 0038183237 scopus 로고    scopus 로고
    • How Bad is Selfish Routing?
    • T. Roughgarden and E. Tardos, "How Bad is Selfish Routing?" J. ACM, vol. 49, no. 2, pp. 236-259, 2002.
    • (2002) J. ACM , vol.49 , Issue.2 , pp. 236-259
    • Roughgarden, T.1    Tardos, E.2
  • 26
    • 0027684575 scopus 로고
    • Competitive Routing in Multiuser Communication Networks
    • A. Orda, R. Rom and N. Shimkin, "Competitive Routing in Multiuser Communication Networks", IEEE/ACM Transactions on Networking, vol. 1, no. 5, pp. 510-521, 1993.
    • (1993) IEEE/ACM Transactions on Networking , vol.1 , Issue.5 , pp. 510-521
    • Orda, A.1    Rom, R.2    Shimkin, N.3
  • 29
    • 65249113754 scopus 로고    scopus 로고
    • Efficiency of Selfish Investments in Network Security
    • Aug
    • L. Jiang, V. Anantharam and J. C. Walrand, "Efficiency of Selfish Investments in Network Security," NetEcon 2008, pp. 31-36, Aug. 2008.
    • (2008) NetEcon 2008 , pp. 31-36
    • Jiang, L.1    Anantharam, V.2    Walrand, J.C.3
  • 30
    • 57349135233 scopus 로고    scopus 로고
    • Network Externalities and the Deployment of Security Features and Protocols in the Internet
    • Jun
    • M. Lelarge and J. Bolot, "Network Externalities and the Deployment of Security Features and Protocols in the Internet," SIGMETRICS 2008, pp. 37-48, Jun. 2008.
    • (2008) SIGMETRICS 2008 , pp. 37-48
    • Lelarge, M.1    Bolot, J.2
  • 31
    • 70349724132 scopus 로고    scopus 로고
    • A Local Mean Field Analysis of Security Investments in Networks
    • M. Lelarge and J. Bolot, "A Local Mean Field Analysis of Security Investments in Networks," CoRR abs/0803.3455, 2008
    • (2008) CoRR abs/0803.3455
    • Lelarge, M.1    Bolot, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.