Skip to main content

2020 | OriginalPaper | Buchkapitel

4. Types of Games

verfasst von : Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu

Erschienen in: Cyber-Security in Critical Infrastructures

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter introduces the most important classes of games underlying practical security models. These include Stackelberg games, Nash games, signaling games, and games with distribution-valued payoffs. The latter build upon empirical methods and data science to construct games from data, but also reveals theoretic connections to multi-criteria optimization using lexicographic goal priorities (that classical games cannot deal with, but distribution-valued games can handle). Each game description is accompanied by examples from the security domain to motivate and illustrate the use of the individual model. Each class of game is discussed in relation to the other types, highlighting pros and cons, las well as applications, detailed in later chapters.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alpcan T, Basar T (2004) A game theoretic analysis of intrusion detection in access control systems. In: Decision and control, 2004. CDC. 43rd IEEE conference on, vol 2. IEEE, pp 1568–1573 Alpcan T, Basar T (2004) A game theoretic analysis of intrusion detection in access control systems. In: Decision and control, 2004. CDC. 43rd IEEE conference on, vol 2. IEEE, pp 1568–1573
2.
Zurück zum Zitat Basar T (1983) The gaussian test channel with an intelligent jammer. IEEE Trans Inf Theory 29(1):152–157CrossRef Basar T (1983) The gaussian test channel with an intelligent jammer. IEEE Trans Inf Theory 29(1):152–157CrossRef
6.
Zurück zum Zitat Clark A, Zhu Q, Poovendran R, Başar T (2012) Deceptive routing in relay networks. In: Decision and game theory for security. Springer, pp 171–185 Clark A, Zhu Q, Poovendran R, Başar T (2012) Deceptive routing in relay networks. In: Decision and game theory for security. Springer, pp 171–185
7.
Zurück zum Zitat Farhang S, Manshaei MH, Esfahani MN, Zhu Q (2014) A dynamic bayesian security game framework for strategic defense mechanism design. In: Decision and game theory for security. Springer, pp 319–328 Farhang S, Manshaei MH, Esfahani MN, Zhu Q (2014) A dynamic bayesian security game framework for strategic defense mechanism design. In: Decision and game theory for security. Springer, pp 319–328
8.
Zurück zum Zitat Farooq MJ, Zhu Q (2018) A multi-layer feedback system approach to resilient connectivity of remotely deployed mobile Internet of things. IEEE Trans Cogn Commun Netw 4(2):422–432CrossRef Farooq MJ, Zhu Q (2018) A multi-layer feedback system approach to resilient connectivity of remotely deployed mobile Internet of things. IEEE Trans Cogn Commun Netw 4(2):422–432CrossRef
9.
Zurück zum Zitat Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17(4):2618–2632CrossRef Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (IoBT). IEEE Trans Wirel Commun 17(4):2618–2632CrossRef
10.
Zurück zum Zitat Farooq MJ, Zhu Q (2019) Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans Inf Forensics Secur 14:2412–2426CrossRef Farooq MJ, Zhu Q (2019) Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks. IEEE Trans Inf Forensics Secur 14:2412–2426CrossRef
12.
Zurück zum Zitat Fudenberg D, Tirole J (1991) Game theory. MIT Press, CambridgeMATH Fudenberg D, Tirole J (1991) Game theory. MIT Press, CambridgeMATH
13.
Zurück zum Zitat Hayel Y, Zhu Q (2015) Attack-aware cyber insurance for risk sharing in computer networks. In: Decision and game theory for security. Springer, pp 22–34 Hayel Y, Zhu Q (2015) Attack-aware cyber insurance for risk sharing in computer networks. In: Decision and game theory for security. Springer, pp 22–34
14.
Zurück zum Zitat Hayel Y, Zhu Q (2017) Epidemic protection over heterogeneous networks using evolutionary poisson games. IEEE Trans Inf Forensics Secur 12(8):1786–1800CrossRef Hayel Y, Zhu Q (2017) Epidemic protection over heterogeneous networks using evolutionary poisson games. IEEE Trans Inf Forensics Secur 12(8):1786–1800CrossRef
16.
Zurück zum Zitat Huang L, Zhu Q (2018) Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems. In: International conference on decision and game theory for security. Springer, pp 205–226 Huang L, Zhu Q (2018) Analysis and computation of adaptive defense strategies against advanced persistent threats for cyber-physical systems. In: International conference on decision and game theory for security. Springer, pp 205–226
17.
Zurück zum Zitat Huang L, Zhu Q (2019) Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks. ACM SIGMETRICS Perform Eval Rev 46(2):52–56CrossRef Huang L, Zhu Q (2019) Adaptive strategic cyber defense for advanced persistent threats in critical infrastructure networks. ACM SIGMETRICS Perform Eval Rev 46(2):52–56CrossRef
18.
Zurück zum Zitat Huang L, Zhu Q (2019) Dynamic Bayesian games for adversarial and defensive cyber deception. In: Al-Shaer E, Wei J, Hamlen KW, Wang C (eds) Autonomous cyber deception: reasoning, adaptive planning, and evaluation of honeyThings. Springer International Publishing, Cham, pp 75–97. https://doi.org/10.1007/978-3-030-02110-8_5 CrossRef Huang L, Zhu Q (2019) Dynamic Bayesian games for adversarial and defensive cyber deception. In: Al-Shaer E, Wei J, Hamlen KW, Wang C (eds) Autonomous cyber deception: reasoning, adaptive planning, and evaluation of honeyThings. Springer International Publishing, Cham, pp 75–97. https://​doi.​org/​10.​1007/​978-3-030-02110-8_​5 CrossRef
19.
Zurück zum Zitat Huang Y, Zhu Q (2019) A differential game approach to decentralized virus-resistant weight adaptation policy over complex networks. arXiv preprint arXiv:1905.02237 Huang Y, Zhu Q (2019) A differential game approach to decentralized virus-resistant weight adaptation policy over complex networks. arXiv preprint arXiv:1905.02237
20.
Zurück zum Zitat Huang JW, Zhu Q, Krishnamurthy V, Basar T (2010) Distributed correlated q-learning for dynamic transmission control of sensor networks. In: Acoustics speech and signal processing (ICASSP), 2010 IEEE international conference on. IEEE, pp 1982–1985 Huang JW, Zhu Q, Krishnamurthy V, Basar T (2010) Distributed correlated q-learning for dynamic transmission control of sensor networks. In: Acoustics speech and signal processing (ICASSP), 2010 IEEE international conference on. IEEE, pp 1982–1985
21.
Zurück zum Zitat Huang L, Chen J, Zhu Q (2017) A large-scale markov game approach to dynamic protection of interdependent infrastructure networks. In: International conference on decision and game theory for security. Springer, pp 357–376 Huang L, Chen J, Zhu Q (2017) A large-scale markov game approach to dynamic protection of interdependent infrastructure networks. In: International conference on decision and game theory for security. Springer, pp 357–376
22.
Zurück zum Zitat Huang L, Chen J, Zhu Q (2018) Distributed and optimal resilient planning of large-scale interdependent critical infrastructures. In: 2018 winter simulation conference (WSC). IEEE, pp 1096–1107 Huang L, Chen J, Zhu Q (2018) Distributed and optimal resilient planning of large-scale interdependent critical infrastructures. In: 2018 winter simulation conference (WSC). IEEE, pp 1096–1107
23.
Zurück zum Zitat Huang L, Chen J, Zhu Q (2018) Factored Markov game theory for secure interdependent infrastructure networks. In: Game theory for security and risk management. Springer, pp 99–126 Huang L, Chen J, Zhu Q (2018) Factored Markov game theory for secure interdependent infrastructure networks. In: Game theory for security and risk management. Springer, pp 99–126
25.
Zurück zum Zitat Kuhn H (1953) Extensive games and the problem of information. In: Kuhn H, Tucker A (eds) Contributions to the theory of games II. Annals of mathematics studies 28, vol. II. Princeton University Press, Princeton, pp 193–216 Kuhn H (1953) Extensive games and the problem of information. In: Kuhn H, Tucker A (eds) Contributions to the theory of games II. Annals of mathematics studies 28, vol. II. Princeton University Press, Princeton, pp 193–216
26.
Zurück zum Zitat Miao F, Zhu Q (2014) A moving-horizon hybrid stochastic game for secure control of cyber-physical systems. In: Decision and control (CDC), 2014 IEEE 53rd annual conference on. IEEE, pp 517–522 Miao F, Zhu Q (2014) A moving-horizon hybrid stochastic game for secure control of cyber-physical systems. In: Decision and control (CDC), 2014 IEEE 53rd annual conference on. IEEE, pp 517–522
29.
Zurück zum Zitat Pawlick J, Zhu Q (2015) Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458 Pawlick J, Zhu Q (2015) Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458
31.
Zurück zum Zitat Pawlick J, Zhu Q (2017) A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization. In: 2017 IEEE global conference on signal and information processing (GlobalSIP). IEEE, pp 518–522 Pawlick J, Zhu Q (2017) A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization. In: 2017 IEEE global conference on signal and information processing (GlobalSIP). IEEE, pp 518–522
32.
Zurück zum Zitat Pawlick J, Zhu Q (2017) Proactive defense against physical denial of service attacks using poisson signaling games. In: International conference on decision and game theory for security. Springer, pp 336–356 Pawlick J, Zhu Q (2017) Proactive defense against physical denial of service attacks using poisson signaling games. In: International conference on decision and game theory for security. Springer, pp 336–356
33.
Zurück zum Zitat Pawlick J, Farhang S, Zhu Q (2015) Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Decision and game theory for security. Springer, pp 289–308 Pawlick J, Farhang S, Zhu Q (2015) Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Decision and game theory for security. Springer, pp 289–308
34.
Zurück zum Zitat Pawlick J, Colbert E, Zhu Q (2017) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. arXiv preprint arXiv:1712.05441 Pawlick J, Colbert E, Zhu Q (2017) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. arXiv preprint arXiv:1712.05441
35.
Zurück zum Zitat Pawlick J, Chen J, Zhu Q (2018) ISTRICT: an interdependent strategic trust mechanism for the cloud-enabled Internet of controlled things. IEEE Trans Inf Forensics Secur 14:1654–1669CrossRef Pawlick J, Chen J, Zhu Q (2018) ISTRICT: an interdependent strategic trust mechanism for the cloud-enabled Internet of controlled things. IEEE Trans Inf Forensics Secur 14:1654–1669CrossRef
36.
Zurück zum Zitat Pawlick J, Colbert E, Zhu Q (2018) Modeling and analysis of leaky deception using signaling games with evidence. IEEE Trans Inf Forensics Secur 14(7):1871–1886CrossRef Pawlick J, Colbert E, Zhu Q (2018) Modeling and analysis of leaky deception using signaling games with evidence. IEEE Trans Inf Forensics Secur 14(7):1871–1886CrossRef
37.
Zurück zum Zitat Pawlick J, Colbert E, Zhu Q (2019) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput Surv (CSUR) 52(4):82CrossRef Pawlick J, Colbert E, Zhu Q (2019) A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy. ACM Comput Surv (CSUR) 52(4):82CrossRef
38.
Zurück zum Zitat Rass S (2015) On game-theoretic risk management (part one)-towards a theory of games with payoffs that are probability-distributions. arXiv:1506.07368v4 [q-fin.EC] Rass S (2015) On game-theoretic risk management (part one)-towards a theory of games with payoffs that are probability-distributions. arXiv:1506.07368v4 [q-fin.EC]
39.
Zurück zum Zitat Rass S (2015) On game-theoretic risk management (part two) – algorithms to compute Nash-equilibria in games with distributions as payoffs. arXiv:1511.08591v1 [q-fin.EC] Rass S (2015) On game-theoretic risk management (part two) – algorithms to compute Nash-equilibria in games with distributions as payoffs. arXiv:1511.08591v1 [q-fin.EC]
40.
Zurück zum Zitat Rass S (2017) On game-theoretic risk management (part three) – modeling and applications. arXiv:1711.00708v1 [q-fin.EC] Rass S (2017) On game-theoretic risk management (part three) – modeling and applications. arXiv:1711.00708v1 [q-fin.EC]
42.
Zurück zum Zitat Rass S, König S, Schauer S (2015) Uncertainty in games: using probability distributions as payoffs. In: Khouzani MH, Panaousis E, Theodorakopoulos G (eds) GameSec 2015: decision and game theory for security, LNCS 9406. Springer, pp 346–357 Rass S, König S, Schauer S (2015) Uncertainty in games: using probability distributions as payoffs. In: Khouzani MH, Panaousis E, Theodorakopoulos G (eds) GameSec 2015: decision and game theory for security, LNCS 9406. Springer, pp 346–357
45.
Zurück zum Zitat Rass S, König S, Panaousis E (2019) Cut-the-rope: a game of stealthy intrusion. In: Alpcan T, Vorobeychik Y, Baras JS, Dán G (eds) Decision and game theory for security. Springer International Publishing, Cham, pp 404–416CrossRef Rass S, König S, Panaousis E (2019) Cut-the-rope: a game of stealthy intrusion. In: Alpcan T, Vorobeychik Y, Baras JS, Dán G (eds) Decision and game theory for security. Springer International Publishing, Cham, pp 404–416CrossRef
47.
Zurück zum Zitat Van Dijk M, Juels A, Oprea A, Rivest RL (2013) Flipit: the game of “stealthy takeover”. J Cryptol 26(4):655–713MathSciNetCrossRef Van Dijk M, Juels A, Oprea A, Rivest RL (2013) Flipit: the game of “stealthy takeover”. J Cryptol 26(4):655–713MathSciNetCrossRef
48.
Zurück zum Zitat Von Stackelberg H (1934) Marktform und gleichgewicht. J. springer, Wien Von Stackelberg H (1934) Marktform und gleichgewicht. J. springer, Wien
49.
Zurück zum Zitat Xu Z, Zhu Q (2015) A cyber-physical game framework for secure and resilient multi-agent autonomous systems. In: Decision and control (CDC), 2015 IEEE 54th annual conference on. IEEE, pp 5156–5161 Xu Z, Zhu Q (2015) A cyber-physical game framework for secure and resilient multi-agent autonomous systems. In: Decision and control (CDC), 2015 IEEE 54th annual conference on. IEEE, pp 5156–5161
50.
Zurück zum Zitat Xu Z, Zhu Q (2017) A game-theoretic approach to secure control of communication-based train control systems under jamming attacks. In: Proceedings of the 1st international workshop on safe control of connected and autonomous vehicles. ACM, pp 27–34. http://dl.acm.org/citation.cfm?id=3055381 Xu Z, Zhu Q (2017) A game-theoretic approach to secure control of communication-based train control systems under jamming attacks. In: Proceedings of the 1st international workshop on safe control of connected and autonomous vehicles. ACM, pp 27–34. http://​dl.​acm.​org/​citation.​cfm?​id=​3055381
51.
Zurück zum Zitat Zhang R, Zhu Q (2015) Secure and resilient distributed machine learning under adversarial environments. In: 2015 18th international conference on information fusion (fusion). IEEE, pp 644–651 Zhang R, Zhu Q (2015) Secure and resilient distributed machine learning under adversarial environments. In: 2015 18th international conference on information fusion (fusion). IEEE, pp 644–651
55.
Zurück zum Zitat Zhang T, Zhu Q (2017) Strategic defense against deceptive civilian GPS spoofing of unmanned aerial vehicles. In: International conference on decision and game theory for security. Springer, pp 213–233 Zhang T, Zhu Q (2017) Strategic defense against deceptive civilian GPS spoofing of unmanned aerial vehicles. In: International conference on decision and game theory for security. Springer, pp 213–233
56.
Zurück zum Zitat Zhang R, Zhu Q (2018) A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans Neural Netw Learn Syst 29(11):5512–5527MathSciNetCrossRef Zhang R, Zhu Q (2018) A game-theoretic approach to design secure and resilient distributed support vector machines. IEEE Trans Neural Netw Learn Syst 29(11):5512–5527MathSciNetCrossRef
58.
Zurück zum Zitat Zhang T, Huang L, Pawlick J, Zhu Q (2019) Game-theoretic analysis of cyber deception: evidence-based strategies and dynamic risk mitigation. arXiv preprint arXiv:1902.03925 Zhang T, Huang L, Pawlick J, Zhu Q (2019) Game-theoretic analysis of cyber deception: evidence-based strategies and dynamic risk mitigation. arXiv preprint arXiv:1902.03925
59.
Zurück zum Zitat Zhu Q, Başar T (2009) Dynamic policy-based IDS configuration. In: Decision and control, 2009 held jointly with the 2009 28th Chinese control conference. CDC/CCC 2009. Proceedings of the 48th IEEE conference on. IEEE, pp 8600–8605 Zhu Q, Başar T (2009) Dynamic policy-based IDS configuration. In: Decision and control, 2009 held jointly with the 2009 28th Chinese control conference. CDC/CCC 2009. Proceedings of the 48th IEEE conference on. IEEE, pp 8600–8605
60.
Zurück zum Zitat Zhu Q, Başar T (2011) Indices of power in optimal IDS default configuration: theory and examples. In: Decision and game theory for security. Springer, pp 7–21 Zhu Q, Başar T (2011) Indices of power in optimal IDS default configuration: theory and examples. In: Decision and game theory for security. Springer, pp 7–21
61.
Zurück zum Zitat Zhu Q, Başar T (2012) A dynamic game-theoretic approach to resilient control system design for cascading failures. In: Proceedings of the 1st international conference on high confidence networked systems. ACM, pp 41–46 Zhu Q, Başar T (2012) A dynamic game-theoretic approach to resilient control system design for cascading failures. In: Proceedings of the 1st international conference on high confidence networked systems. ACM, pp 41–46
62.
Zurück zum Zitat Zhu Q, Başar T (2013) Game-theoretic approach to feedback-driven multi-stage moving target defense. In: International conference on decision and game theory for security. Springer, pp 246–263 Zhu Q, Başar T (2013) Game-theoretic approach to feedback-driven multi-stage moving target defense. In: International conference on decision and game theory for security. Springer, pp 246–263
63.
Zurück zum Zitat Zhu Q, Basar T (2015) Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. Control Syst IEEE 35(1):46–65MathSciNetCrossRef Zhu Q, Basar T (2015) Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems. Control Syst IEEE 35(1):46–65MathSciNetCrossRef
64.
Zurück zum Zitat Zhu Q, Han Z, Başar T (2010) No-regret learning in collaborative spectrum sensing with malicious nodes. In: Communications (ICC), 2010 IEEE international conference on. IEEE, pp 1–6 Zhu Q, Han Z, Başar T (2010) No-regret learning in collaborative spectrum sensing with malicious nodes. In: Communications (ICC), 2010 IEEE international conference on. IEEE, pp 1–6
65.
Zurück zum Zitat Zhu Q, Li H, Han Z, Basar T (2010) A stochastic game model for jamming in multi-channel cognitive radio systems. In: 2010 IEEE international conference on communications. IEEE, pp 1–6 Zhu Q, Li H, Han Z, Basar T (2010) A stochastic game model for jamming in multi-channel cognitive radio systems. In: 2010 IEEE international conference on communications. IEEE, pp 1–6
66.
Zurück zum Zitat Zhu Q, Tembine H, Başar T (2010) Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Decision and control (CDC), 2010 49th IEEE conference on. IEEE, pp 219–224 Zhu Q, Tembine H, Başar T (2010) Heterogeneous learning in zero-sum stochastic games with incomplete information. In: Decision and control (CDC), 2010 49th IEEE conference on. IEEE, pp 219–224
67.
Zurück zum Zitat Zhu Q, Tembine H, Basar T (2010) Network security configurations: a nonzero-sum stochastic game approach. In: American control conference (ACC), 2010. IEEE, pp 1059–1064 Zhu Q, Tembine H, Basar T (2010) Network security configurations: a nonzero-sum stochastic game approach. In: American control conference (ACC), 2010. IEEE, pp 1059–1064
68.
Zurück zum Zitat Zhu Q, Tembine H, Basar T (2011) Distributed strategic learning with application to network security. In: American control conference (ACC), 2011. IEEE, pp 4057–4062 Zhu Q, Tembine H, Basar T (2011) Distributed strategic learning with application to network security. In: American control conference (ACC), 2011. IEEE, pp 4057–4062
69.
Zurück zum Zitat Zhu Q, Saad W, Han Z, Poor HV, Başar T (2011) Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: 2011-MILCOM 2011 military communications conference. IEEE, pp 119–124 Zhu Q, Saad W, Han Z, Poor HV, Başar T (2011) Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: 2011-MILCOM 2011 military communications conference. IEEE, pp 119–124
70.
Zurück zum Zitat Zhu Q, Song JB, Başar T (2011) Dynamic secure routing game in distributed cognitive radio networks. In: Global telecommunications conference (GLOBECOM 2011), 2011 IEEE. IEEE, pp 1–6 Zhu Q, Song JB, Başar T (2011) Dynamic secure routing game in distributed cognitive radio networks. In: Global telecommunications conference (GLOBECOM 2011), 2011 IEEE. IEEE, pp 1–6
71.
Zurück zum Zitat Zhu Q, Yuan Z, Song JB, Han Z, Başar T (2012) Interference aware routing game for cognitive radio multi-hop networks. Sel Areas Commun IEEE J 30(10):2006–2015CrossRef Zhu Q, Yuan Z, Song JB, Han Z, Başar T (2012) Interference aware routing game for cognitive radio multi-hop networks. Sel Areas Commun IEEE J 30(10):2006–2015CrossRef
72.
Zurück zum Zitat Zhu Q, Rass S, Schartner P (2018) Community-based security for the Internet of things. arXiv preprint arXiv:1810.00281 Zhu Q, Rass S, Schartner P (2018) Community-based security for the Internet of things. arXiv preprint arXiv:1810.00281
Metadaten
Titel
Types of Games
verfasst von
Stefan Rass
Stefan Schauer
Sandra König
Quanyan Zhu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-46908-5_4

Premium Partner