A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications.
Ashis Kumar SamantaNabendu ChakiPublished in: CISIM (2023)
Keyphrases
- malicious users
- video games
- game theory
- computer games
- game play
- nash equilibrium
- game theoretic
- game playing
- watermarking scheme
- game players
- virtual world
- role playing
- denial of service attacks
- security risks
- nash equilibria
- game based learning
- game design
- serious games
- security threats
- virtual environment
- educational games
- countermeasures
- monte carlo tree search
- malicious attacks
- real time strategy games
- malicious nodes
- pursuit evasion