Trust exploitation and attention competition: A game theoretical model
暂无分享,去创建一个
Prasant Mohapatra | Hongxing Li | Zizhan Zheng | Hao Fu | Pengfei Hu | Hao Fu | P. Mohapatra | Pengfei Hu | Hongxing Li | Zizhan Zheng
[1] S. Jørgensen. A survey of some differential games in advertising , 1982 .
[2] Kim C. Border,et al. Fixed point theorems with applications to economics and game theory: Fixed point theorems for correspondences , 1985 .
[3] Luca Lambertini,et al. A differential oligopoly game with differentiated goods and sticky prices , 2007, Eur. J. Oper. Res..
[4] Piet Van Mieghem,et al. Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.
[5] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[6] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[7] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[8] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[9] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[10] Quanyan Zhu,et al. Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[11] Donald F. Towsley,et al. How to Optimally allocate your budget of attention in social networks , 2013, 2013 Proceedings IEEE INFOCOM.
[12] Chao Yang,et al. Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers , 2011, IEEE Transactions on Information Forensics and Security.
[13] Cécile Paris,et al. A survey of trust in social networks , 2013, CSUR.
[14] Prasant Mohapatra,et al. Provenance logic: Enabling multi-event based trust in mobile sensing , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[15] Prasant Mohapatra,et al. Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[16] Prasant Mohapatra,et al. Stealthy attacks meets insider threats: A three-player game model , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[17] Ananthram Swami,et al. Stealthy attacks with insider information: A game theoretic model with asymmetric feedback , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.