×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [9]
内容类型
期刊论文 [9]
发表日期
2019 [1]
2017 [1]
2016 [1]
2015 [2]
2014 [1]
2011 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
内容类型:期刊论文
专题:山东大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Decentralization is Vulnerable Under the Gap Game
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 90999-91008
作者:
Liu, Yiran
;
Ke, Junming
;
Xu, Qiuliang
;
Jiang, Han
;
Wang, Hao
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/12/11
Blockchain security
decentralization
reward
gap game
mining
Optimal joint control and triggering strategies against denial of service attacks: a zero-sum game
期刊论文
IET CONTROL THEORY AND APPLICATIONS, 2017, 卷号: 11, 期号: 14, 页码: 2352-2360
作者:
Zhao, Yinghong
;
He, Xiao
;
Zhou, Donghua
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/11
networked control systems
linear systems
scheduling
computer network
security
sensors
telecommunication channels
linear quadratic control
game theory
control system synthesis
optimal joint control
triggering
strategies
denial of service attacks
scheduling problem
linear
networked control systems
communication constraints
communication
channel
remote sensors
transmission capability
optimal controller
strategies
external attacker
linear quadratic criteria
system
performance improvement
zero-sum static game
Nash equilibrium
nonpure-strategy NE
security
A distributed game-theoretic approach for IaaS service trading in an auction-based cloud market
期刊论文
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016, 2016, 页码: 1543-1550
作者:
Wei, Yi
;
Pan, Li
;
Yuan, Dong
;
Liu, Shijun
;
Wu, Lei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/17
Auction
Cloud computing
Game theory
Infrastructure as a Service
Nash equilibrium
Resource allocation
Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 期号: 18, 页码: 3690-3700
作者:
Wang, Yilei
;
Wong, Duncan S.
;
Susilo, Willy
;
Chen, Xiaofeng
;
Xu, Qiuliang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/17
game theory
Nash equilibrium
reputation
rational party
Fair two-party computation with rational parties holding private types
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2015, 卷号: 8, 期号: 2, 页码: 284-297
作者:
Wang, Yilei
;
Wong, Duncan S.
;
Zhao, Chuan
;
Xu, Qiuliang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/17
asymmetric information
extensive game with incomplete information
computationally sequential equilibrium
rational secure two-party
computation
private type
New rational parties relying on reputation
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2014, 卷号: 7, 期号: 7, 页码: 1128-1137
作者:
Wang, Yilei
;
Liu, Zhe
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/17
game theory
Nash equilibrium
reputation
rational party
2-out-of-2 rational secret sharing in extensive form
期刊论文
Proceedings - 2011 7th International Conference on Computational Intelligence and Security, CIS 2011, 2011, 页码: 847-851
作者:
Wang, Yilei
;
Xu, Qiuliang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/23
Extensive game
Non-simultaneous channel
Rational secret sharing
Sequential equilibrium
Game-based verification of multi-party contract signing protocols
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 卷号: 5983 LNCS, 页码: 186-200
作者:
Zhang, Ying
;
Zhang, Chenyi
;
Pang, Jun
;
Mauw, Sjouke
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/26
Intrusion response method based on attack graph
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2008, 卷号: 19, 期号: 10, 页码: 2746-2753
作者:
Shi J.
;
Guo S.-Q.
;
Lu Y.
;
Xie L.
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/26
Attack graph
Game theory
Information security
Intrusion response
Security metric
©版权所有 ©2017 CSpace - Powered by
CSpace