2011
DOI: 10.1007/978-3-642-25280-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
4
0
2

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 27 publications
0
4
0
2
Order By: Relevance
“…Congestion games have been applied in the field of networking to account for security aspects [8], link congestion [6] and pricing of infrastructures and users [4]. In [5], the authors study Bitcoin as a congestion game, where the congestion occurs due to an increase in the number of transaction requests from users.…”
Section: Related Workmentioning
confidence: 99%
“…Congestion games have been applied in the field of networking to account for security aspects [8], link congestion [6] and pricing of infrastructures and users [4]. In [5], the authors study Bitcoin as a congestion game, where the congestion occurs due to an increase in the number of transaction requests from users.…”
Section: Related Workmentioning
confidence: 99%
“…Congestion games have been applied in the field of networking to account for security aspects (Maillé et al, 2011), link congestion (Johari and Tsitsiklis, 2003) and pricing of infrastructures and users (Hassin and Haviv, 1997). In Huberman et al (2017), the authors study Bitcoin as a congestion game, where the congestion occurs due to an increase in the number of transaction requests from users.…”
Section: Related Workmentioning
confidence: 99%
“…Maille et al [53] have also studied network externalities related to security countermeasures, but without accounting for epidemic aspects. Their focus is on financial and economic motivations behind malicious actions, assuming that the number of vulnerable devices is directly proportional to the incentives an attacker has to produce an exploit for that vulnerability.…”
Section: Related Workmentioning
confidence: 99%