期刊文献+

Network Security Transmission Based on Bimatrix Game Theory

Network Security Transmission Based on Bimatrix Game Theory
下载PDF
导出
摘要 Based on the bimatrix game theory, the network data transmission has been depicted in a game theory way: the actions of the attacker and defender (legitimate users) are depicted within a two-person, non-cooperative and bimatrix game model, this paper proves the existence of the Nash equilibrium theoretically, which is further illustrated by the experimental resuhs. Based on the bimatrix game theory, the network data transmission has been depicted in a game theory way: the actions of the attacker and defender (legitimate users) are depicted within a two-person, non-cooperative and bimatrix game model, this paper proves the existence of the Nash equilibrium theoretically, which is further illustrated by the experimental resuhs.
出处 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第3期617-620,共4页 武汉大学学报(自然科学英文版)
基金 Supported bythe National Nature Science Founda-tion of China (90104029) the Specialized Research Fund for theDoctoral Programof Higher Education (20050487046)
关键词 security transmission game theory bimatrix game Nash equilibrium security transmission game theory bimatrix game Nash equilibrium
  • 相关文献

参考文献13

  • 1Xia Zhengyou;Zhang Shiyong.A Kind of Network Security Behavior Model Based on Game Theory[C],2003(04).
  • 2Srikant R;Whitt W.Simulation Run Lengths to Estimate Blocking Probabilities[J],1996(01).
  • 3Korilis Y A;Lazar A.On the Existence of Equilibria in Noncooperative Optimal Flow Control,1995(03).
  • 4Dafermos S;Sparrow F T.The Traffic Assignment Problem for a General Network,1969(02).
  • 5Xiao Xipeng;Lionel M N.Internet QoS:A Big Picture[J],1999(02).
  • 6Saltzer J;Reed D;Clark D.End-to-End arguments in system design,1984(04).
  • 7Lye Kongwei;Wing J M.Game Strategies in Network Security[J],2005(1-2).
  • 8Zhang Weiying.Game Theory and Information Economics,1996.
  • 9La R J;Anantharam V.Optimal Routing Control:Repeated Game Approach,2002(03).
  • 10Bohacek S;Hespanha J;Obraczka K.Enhancing Security via Stochastic Routing[C],2002(21).

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部