A reputation score policy and Bayesian game theory based incentivized mechanism for DDoS attacks mitigation and cyber defense

A Dahiya, BB Gupta - Future Generation Computer Systems, 2021 - Elsevier
DDoS attack is one of the most powerful cyber-weapons as it does not wait for a specific
server configuration or particular network state to attack or to disrupt any operation of the …

[HTML][HTML] Game theory and evolutionary optimization approaches applied to resource allocation problems in computing environments: A survey

S Shamshirband, JH Joloudari… - Mathematical …, 2021 - aimspress.com
Today's intelligent computing environments, including the Internet of Things (IoT), Cloud
Computing (CC), Fog Computing (FC), and Edge Computing (EC), allow many …

A game theoretic-based distributed detection method for VM-to-hypervisor attacks in cloud environment

A Nezarat, Y Shams - The Journal of Supercomputing, 2017 - Springer
Cloud computing is a pool of scalable virtual resources serving a large number of users who
pay fees depending on the extent of utilized service. From payment perspective, cloud is like …

[PDF][PDF] Game theory and Evolutionary-optimization methods applied to resource allocation problems in emerging computing environments: a survey

F Rahmani, JH Joloudari… - arXiv preprint arXiv …, 2020 - ask.qcloudimg.com
Today's intelligent computing environments, including Internet of Things, cloud computing
and fog computing, allow many organizations around the world to optimize their resource …

[PDF][PDF] Distributed Intrusion Detection System Based on Mixed Cooperative and Non-Cooperative Game Theoretical Model.

A Nezarat - Int. J. Netw. Secur., 2018 - researchgate.net
Abstract Intrusion Detection Systems (IDS) are systems to protect the network resources
against the attacks. Considering the extent of the attacks in the internet environment and the …

Resource Allocation in Vehicular Fog Computing for an Optimal Use of EVs Electric Vehicles Energy

H Birhanie - 2019 - theses.hal.science
Technological advancements made it possible for Electric vehicles (EVs) to have onboard
computation, communication, storage, and sensing capabilities. Nevertheless, most of the …