Resource Allocation Strategies under Considerations of Attack Preference and Multiple Deceptive Methods
碩士 === 國立臺灣大學 === 資訊管理學研究所 === 102 === With the rapid growing of the Internet, information system has become an irreplaceable part of the businesses daily operation. However, although the Internet brings lots of advantages but also brings more threats to the businesses. It would create devastating f...
Main Authors: | Yi-Jhen Lin, 林怡蓁 |
---|---|
Other Authors: | 林永松 |
Format: | Others |
Language: | zh-TW |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09512900759389948483 |
Similar Items
-
Optimal Resource Allocation Strategies Under Collaborative Defense and Collaborative Attack in Multiple Rounds
by: Jen-Hua Chi, et al.
Published: (2014) -
Resource Allocation Strategies under Attack-Defense Dual-Role and Collaborative Attacks
by: Ying-Ju Chen, et al.
Published: (2012) -
Leader-Following Consensus of Multiple Euler-Lagrange Systems Under Deception Attacks
by: Lizhang Wang, et al.
Published: (2021-01-01) -
Power Allocation for a Downlink Non-Orthogonal Multiple Access System
by: Chen, Yi Jhen, et al.
Published: (2015) -
Exploitative and Deceptive Resource Acquisition Strategies
by: Joshua J. Reynolds, et al.
Published: (2015-07-01)