A generic scheme for cyber security in resource constraint network using incomplete information game.
Moirangthem Tiken SinghSurajit BorkotokeyRachid Ait Maalem LahcenRam N. MohapatraPublished in: Evol. Intell. (2023)
Keyphrases
- incomplete information
- cyber security
- constraint networks
- nash equilibria
- repeated games
- smart grid
- intrusion detection
- temporal reasoning
- query answering
- autonomous agents
- constraint satisfaction problems
- security issues
- resource allocation
- intrusion detection system
- network security
- game theory
- constraint satisfaction
- stochastic games
- arc consistency
- first order logic
- intelligent agents
- constraint programming
- communication networks
- nash equilibrium