Introduction The Nash equilibrium (NE) is undoubtedly the most popular solution to problems related to dynamic spectrum access (DSA) in decentralized networks [3, 18, 26, 27]. The first part of this chapter discusses some of the main advantages and disadvantages of using the NE to model relev...
Game theoretic DSA model Game theoretic DSA algorithms typically work on transferring a global optimization problem into distributive local optimization problems. As such, the global optimal solution can be transferred to the Nash Equilibrium of a distributed game. Instructed by the DSA algorithm, each...
GameSec 2012, the Third Conference on Decision and Game Theory for Security, will take place in Budapest, Hungary, which is commonly regarded as one of the most beautiful and vibrant cities in Europe. The conference will explore security as a multifaceted economic problem by considering the comple...
GameSec 2012, the Third Conference on Decision and Game Theory for Security, will take place in Budapest, Hungary, which is commonly regarded as one of the most beautiful and vibrant cities in Europe. The conference will explore security as a multifaceted economic problem by considering the comple...
The implementation of an efficient new optimization algorithm is therefore of great interest if it can achieve high performance, high accuracy, and improved speed when dealing with complex problems. In the CGO algorithm, chaos game theory is used as the main algorithm concept, and the algorithm ...
problems of self-similarity are considered. CGO has some advantages over other swarm schemes, such as fast convergence and avoiding trapping in a local minimum [44]. Thus, CGO has been used in solving many engineering problems [45,46,47]. From the above discussion, the controller enhancements...
Game theory has been applied for solving various cybersecurity problems [31–38]. Previous work has modeled these security problems as a dynamic (complete/incomplete/imperfect) game and analyzed equilibrium solutions of those games. Our game model (to represent security problems with attack graphs) ...
To reason the adaptive spectrum sensing and sharing problems in IoT systems, game theory is well-suited and an effective way. The experimental result illustrates that our game-based approach can get a better spectrum utilization, which can make the IoT performance maximal. This result proves the ...
highlight the connection between game theory, contr ol, distributed optimization, economic incentives and real world security, reputa tion, trust and privacy problems in a variety of technological systems. Topics of interes t include but are not limited to the ...
high-quality theoretical and practically relevant contributions, which apply decision and game theory to security problems. The goal of the conference is to bring together academic, government, and industrial researchers in an effort to identify and discuss the major challenges and recent results that ...