Exploring an unknown dangerous graph using tokens
Consider a team of (one or more) mobile agents operating in a graph G. Unaware of the
graph topology and starting from the same node, the team must explore the graph. This …
graph topology and starting from the same node, the team must explore the graph. This …
Black hole search with finite automata scattered in a synchronous torus
We consider the problem of locating a black hole in synchronous anonymous networks
using finite state agents. A black hole is a harmful node in the network that destroys any …
using finite state agents. A black hole is a harmful node in the network that destroys any …
Black hole search in computer networks: State-of-the-art, challenges and future directions
As the size and use of networks continue to increase, network anomalies and faults are
commonplace. Consequently, effective detection of such network issues is crucial for the …
commonplace. Consequently, effective detection of such network issues is crucial for the …
Dangerous graphs
Anomalies and faults are inevitable in computer networks, today more than ever before. This
is due to the large scale and dynamic nature of the networks used to process big data and to …
is due to the large scale and dynamic nature of the networks used to process big data and to …
Tight bounds for black hole search with scattered agents in synchronous rings
We study the problem of locating a particularly dangerous node, the so-called black hole in
a synchronous anonymous ring network with mobile agents. A black hole is a harmful …
a synchronous anonymous ring network with mobile agents. A black hole is a harmful …
Decontaminating a network from a black virus
J Cai, P Flocchini, N Santoro - International Journal of Networking …, 2014 - jstage.jst.go.jp
In this paper, we consider the problem of decontaminating a network from a black virus (BV)
using a team of mobile system agents. The BV is a harmful process which, like the …
using a team of mobile system agents. The BV is a harmful process which, like the …
Black hole search and exploration in unoriented tori with synchronous scattered finite automata
E Markou, M Paquette - … , OPODIS 2012, Rome, Italy, December 18-20 …, 2012 - Springer
We consider the problem of locating a black hole in a synchronous, anonymous, and
unoriented torus network using mobile agents. A black hole is a harmful network node that …
unoriented torus network using mobile agents. A black hole is a harmful network node that …
[PDF][PDF] Identifying hostile nodes in networks using mobile agents
E Markou - Bulletin of EATCS, 2013 - eatcs.org
In distributed mobile computing environments one of the most pressing concerns is security.
Two are the most important security threats: a malicious mobile process which can move …
Two are the most important security threats: a malicious mobile process which can move …
Searching for a black hole in interconnected networks using mobile agents and tokens
We study the impact of the topological structure on the complexity of the Black hole search
(Bhs) problem using mobile agents that communicate via tokens. First, we show that the …
(Bhs) problem using mobile agents that communicate via tokens. First, we show that the …
Network decontamination from a black virus
J Cai, P Flocchini, N Santoro - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
In this paper, we consider the problem of decontaminating a network from a black virus (BV)
using a team of mobile system agents. The BV is a harmful process which, like the …
using a team of mobile system agents. The BV is a harmful process which, like the …