https://scholars.lib.ntu.edu.tw/handle/123456789/457444
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Chen, P.-Y | en_US |
dc.contributor.author | Chen, Y.-J | en_US |
dc.contributor.author | YEONG-SUNG LIN | en_US |
dc.creator | Chen, P.-Y;Chen, Y.-J;Lin, F.Y.-S. | - |
dc.date.accessioned | 2020-02-11T02:33:56Z | - |
dc.date.available | 2020-02-11T02:33:56Z | - |
dc.date.issued | 2014 | - |
dc.identifier.uri | https://scholars.lib.ntu.edu.tw/handle/123456789/457444 | - |
dc.description.abstract | How to efficiently evaluate the network survivability is a critical issue in nowadays. Hence, we develop a multi-round network attack-defense scenario with dual-role players, who can attack and defend, and establish a mathematical model to optimize resource allocation and then predict the network survivability by the Average DOD. In each round, the players could allocate their attack resources on the nodes of their own network and on another player's network after updating related information about another player's. Furthermore, they could reallocate existing defense resources and repair compromised nodes. To solve the problem, the gradient method and the game theory would be adopted to find the optimal resource allocation strategies for both players. © 2014 Springer-Verlag Berlin Heidelberg. | - |
dc.relation.ispartof | Lecture Notes in Electrical Engineering | - |
dc.subject | Average DOD; Multi-Round; Network Attack-Defense Dual-Role; Network Survivability; Optimization; Resource Allocation | - |
dc.subject.classification | [SDGs]SDG16 | - |
dc.subject.other | Gradient methods; Information technology; Mathematical models; Optimization; Repair; Resource allocation; Average DOD; Compromised nodes; Critical issues; Malicious attack; Multi-Round; Network survivability; Optimal resource allocation; Resource allocation strategies; Computer crime | - |
dc.title | Resource allocation strategies under attack-defense dual-role and malicious attacks | en_US |
dc.type | conference paper | en |
dc.identifier.doi | 10.1007/978-3-642-55038-6_107 | - |
dc.identifier.scopus | 2-s2.0-84902371212 | - |
dc.identifier.url | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84902371212&doi=10.1007%2f978-3-642-55038-6_107&partnerID=40&md5=ece619bc321126bf60c4737deae0bc57 | - |
dc.relation.pages | 689-695 | - |
dc.relation.journalvolume | 309 LNEE | - |
item.cerifentitytype | Publications | - |
item.fulltext | no fulltext | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
item.openairetype | conference paper | - |
item.grantfulltext | none | - |
crisitem.author.dept | Information Management | - |
crisitem.author.parentorg | College of Management | - |
顯示於: | 資訊管理學系 |
在 IR 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。