2011 6th International Conference on Risks and Security of Internet and Systems (CRiSIS) 2011
DOI: 10.1109/crisis.2011.6061841
|View full text |Cite
|
Sign up to set email alerts
|

Optimal voting strategy against rational attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…All attacked unprotected units are compromised. The probability that out of attacked protected units are compromised is (18) If protected units and unprotected units are compromised, the total number of compromised units is .…”
Section: Distribution Of Number Of Compromised Voting Unitsmentioning
confidence: 99%
See 2 more Smart Citations
“…All attacked unprotected units are compromised. The probability that out of attacked protected units are compromised is (18) If protected units and unprotected units are compromised, the total number of compromised units is .…”
Section: Distribution Of Number Of Compromised Voting Unitsmentioning
confidence: 99%
“…The probability that exactly units are compromised given units are protected and units are attacked is (19) where is determined using (18). The probability of TVS success given units are protected and units are attacked is (20) IV.…”
Section: Asmentioning
confidence: 99%
See 1 more Smart Citation
“…Following the previous research, Wang et al [12] analyzed the nodes decision in a cluster. There are n clusters of m nodes, with a total of n*m nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The authors showed how an attacker can infiltrate a network at one node, and from the compromised node, the attacker can breach easily and access other nodes of the network infrastructure. Wang et al [81] analyzed the nodes' decision in a cluster environment. The cluster environment is composed of n clusters of m nodes, which is n x m individual nodes.…”
Section: Contributionmentioning
confidence: 99%