Show simple item record

dc.contributor.authorMavronicolas, Mariosen
dc.contributor.authorLesta, Vicky Papadopoulouen
dc.contributor.authorPhilippou, Annaen
dc.contributor.authorSpirakis, Paul G.en
dc.creatorMavronicolas, Mariosen
dc.creatorLesta, Vicky Papadopoulouen
dc.creatorPhilippou, Annaen
dc.creatorSpirakis, Paul G.en
dc.date.accessioned2019-11-13T10:41:11Z
dc.date.available2019-11-13T10:41:11Z
dc.date.issued2008
dc.identifier.issn1754-8632
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/54493
dc.description.abstractConsider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multi-player game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. We are interested in the associated Nash equilibria, where no network entity can unilaterally improve its local objective. We obtain the following results: For certain families of graphs, mixed Nash equilibria can be computed in polynomially time. These families include, among others, regular graphs, graphs with perfect matchings and trees. The corresponding price of anarchy for any mixed Nash equilibria of the game is upper and lower bounded by a linear function of the number of vertices of the graph. (We define the price of anarchy to reflect the utility of the protector). Finally, we introduce a generalised version of the game. We show that the existence problem of pure Nash equilibria here is NP-complete. Copyright © 2008 Inderscience Enterprises Ltd.en
dc.sourceInternational Journal of Autonomous and Adaptive Communications Systemsen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-81855194700&doi=10.1504%2fIJAACS.2008.021488&partnerID=40&md5=71e5f56185694a07f028cf0be99fd354
dc.subjectNon-cooperativeen
dc.subjectGraph theoryen
dc.subjectNetwork securityen
dc.subjectSystem securityen
dc.subjectTrees (mathematics)en
dc.subjectComputer virusesen
dc.subjectVirusesen
dc.subjectLinear functionsen
dc.subjectNP Completeen
dc.subjectPrice of anarchyen
dc.subjectMultiplayer gamesen
dc.subjectNash equilibriaen
dc.subjectPure Nash equilibriumen
dc.subjectPerfect matchingsen
dc.subjectExistence problemsen
dc.subjectGraph-theoreticen
dc.subjectNetwork scenarioen
dc.subjectNetwork security gamesen
dc.subjectRegular graphsen
dc.subjectSecurity softwareen
dc.subjectViral infectionsen
dc.titleA graph-theoretic network security gameen
dc.typeinfo:eu-repo/semantics/article
dc.identifier.doi10.1504/IJAACS.2008.021488
dc.description.volume1
dc.description.issue4
dc.description.startingpage390
dc.description.endingpage410
dc.author.faculty002 Σχολή Θετικών και Εφαρμοσμένων Επιστημών / Faculty of Pure and Applied Sciences
dc.author.departmentΤμήμα Πληροφορικής / Department of Computer Science
dc.type.uhtypeArticleen
dc.description.notes<p>Cited By :3</p>en
dc.source.abbreviationInt.J.Auton.Adapt.Commun.Syst.en
dc.contributor.orcidSpirakis, Paul G. [0000-0001-5396-3749]
dc.contributor.orcidLesta, Vicky Papadopoulou [0000-0003-2920-8473]
dc.gnosis.orcid0000-0001-5396-3749
dc.gnosis.orcid0000-0003-2920-8473


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record