Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (31)
  • Open Access

    ARTICLE

    IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems

    Dinesh Mavaluru1,*, Chettupally Anil Carie2, Ahmed I. Alutaibi3, Satish Anamalamudi2, Bayapa Reddy Narapureddy4, Murali Krishna Enduri2, Md Ezaz Ahmed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1487-1503, 2024, DOI:10.32604/cmes.2023.045277

    Abstract In this paper, we present a comprehensive system model for Industrial Internet of Things (IIoT) networks empowered by Non-Orthogonal Multiple Access (NOMA) and Mobile Edge Computing (MEC) technologies. The network comprises essential components such as base stations, edge servers, and numerous IIoT devices characterized by limited energy and computing capacities. The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption. The system operates in discrete time slots and employs a quasi-static approach, with a specific focus on the complexities of task partitioning and the management… More >

  • Open Access

    ARTICLE

    MF2-DMTD: A Formalism and Game-Based Reasoning Framework for Optimized Drone-Type Moving Target Defense

    Sang Seo1, Jaeyeon Lee2, Byeongjin Kim2, Woojin Lee2, Dohoon Kim3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2595-2628, 2023, DOI:10.32604/cmc.2023.042668

    Abstract Moving-target-defense (MTD) fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutations. However, the existing naive MTD studies were conducted focusing only on wired network mutations. And these cases have also been no formal research on wireless aircraft domains with attributes that are extremely unfavorable to embedded system operations, such as hostility, mobility, and dependency. Therefore, to solve these conceptual limitations, this study proposes normalized drone-type MTD that maximizes defender superiority by mutating the unique fingerprints of wireless drones and that optimizes the period-based mutation principle… More >

  • Open Access

    ARTICLE

    Honeypot Game Theory against DoS Attack in UAV Cyber

    Shangting Miao1, Yang Li2,*, Quan Pan2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2745-2762, 2023, DOI:10.32604/cmc.2023.037257

    Abstract A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking the UAV cyber. It is a robust security risk for UAV cyber and has recently become an active research area. Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network. In addition, the honeypot, an effective security vulnerability defense mechanism, has not been widely adopted or modeled for defense against DoS attack… More >

  • Open Access

    ARTICLE

    Social Engineering Attack-Defense Strategies Based on Reinforcement Learning

    Rundong Yang1,*, Kangfeng Zheng1, Xiujuan Wang2, Bin Wu1, Chunhua Wu1

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2153-2170, 2023, DOI:10.32604/csse.2023.038917

    Abstract Social engineering attacks are considered one of the most hazardous cyberattacks in cybersecurity, as human vulnerabilities are often the weakest link in the entire network. Such vulnerabilities are becoming increasingly susceptible to network security risks. Addressing the social engineering attack defense problem has been the focus of many studies. However, two main challenges hinder its successful resolution. Firstly, the vulnerabilities in social engineering attacks are unique due to multistage attacks, leading to incorrect social engineering defense strategies. Secondly, social engineering attacks are real-time, and the defense strategy algorithms based on gaming or reinforcement learning are too complex to make rapid… More >

  • Open Access

    ARTICLE

    Computation of PoA for Selfish Node Detection and Resource Allocation Using Game Theory

    S. Kanmani1,*, M. Murali2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2583-2598, 2023, DOI:10.32604/csse.2023.037265

    Abstract The introduction of new technologies has increased communication network coverage and the number of associating nodes in dynamic communication networks (DCN). As the network has the characteristics like decentralized and dynamic, few nodes in the network may not associate with other nodes. These uncooperative nodes also known as selfish nodes corrupt the performance of the cooperative nodes. Namely, the nodes cause congestion, high delay, security concerns, and resource depletion. This study presents an effective selfish node detection method to address these problems. The Price of Anarchy (PoA) and the Price of Stability (PoS) in Game Theory with the Presence of… More >

  • Open Access

    ARTICLE

    The Cloud Manufacturing Resource Scheduling Optimization Method Based on Game Theory

    Xiaoxuan Yang*, Zhou Fang

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 229-243, 2022, DOI:10.32604/jai.2022.035368

    Abstract In order to optimize resource integration and optimal scheduling problems in the cloud manufacturing environment, this paper proposes to use load balancing, service cost and service quality as optimization goals for resource scheduling, however, resource providers have resource utilization requirements for cloud manufacturing platforms. In the process of resource optimization scheduling, the interests of all parties have conflicts of interest, which makes it impossible to obtain better optimization results for resource scheduling. Therefore, a multithreaded auto-negotiation method based on the Stackelberg game is proposed to resolve conflicts of interest in the process of resource scheduling. The cloud manufacturing platform first… More >

  • Open Access

    ARTICLE

    Enhanced Parallelized DNA-Coded Stream Cipher Based on Multiplayer Prisoners’ Dilemma

    Khaled M. Suwais*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2685-2704, 2023, DOI:10.32604/cmc.2023.036161

    Abstract Data encryption is essential in securing exchanged data between connected parties. Encryption is the process of transforming readable text into scrambled, unreadable text using secure keys. Stream ciphers are one type of an encryption algorithm that relies on only one key for decryption and as well as encryption. Many existing encryption algorithms are developed based on either a mathematical foundation or on other biological, social or physical behaviours. One technique is to utilise the behavioural aspects of game theory in a stream cipher. In this paper, we introduce an enhanced Deoxyribonucleic acid (DNA)-coded stream cipher based on an iterated n-player… More >

  • Open Access

    ARTICLE

    Energy-Efficient Clustering Using Optimization with Locust Game Theory

    P. Kavitha Rani1, Hee-Kwon Chae2, Yunyoung Nam2,*, Mohamed Abouhawwash3,4

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2591-2605, 2023, DOI:10.32604/iasc.2023.033697

    Abstract Wireless sensor networks (WSNs) are made up of several sensors located in a specific area and powered by a finite amount of energy to gather environmental data. WSNs use sensor nodes (SNs) to collect and transmit data. However, the power supplied by the sensor network is restricted. Thus, SNs must store energy as often as to extend the lifespan of the network. In the proposed study, effective clustering and longer network lifetimes are achieved using multi-swarm optimization (MSO) and game theory based on locust search (LS-II). In this research, MSO is used to improve the optimum routing, while the LS-II… More >

  • Open Access

    ARTICLE

    Behavioral Decision-Making of Key Stakeholders in Public-Private Partnerships: A Hybrid Method and Benefit Distribution Study

    Guoshuai Sun1,2,3, Wanyi Zhang1, Jiuying Dong4,*, Shuping Wan2, Jiao Feng5

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2895-2934, 2023, DOI:10.32604/cmes.2023.025652

    Abstract Public-private partnerships (PPPs) have been used by governments around the world to procure and construct infrastructural amenities. It relies on private sector expertise and funding to achieve this lofty objective. However, given the uncertainties of project management, transparency, accountability, and expropriation, this phenomenon has gained tremendous attention in recent years due to the important role it plays in curbing infrastructural deficits globally. Interestingly, the reasonable benefit distribution scheme in a PPP project is related to the behavior decision-making of the government and social capital, as well as the performance of the project. In this paper, the government and social capital… More >

  • Open Access

    ARTICLE

    Edge-Cloud Computing for Scheduling the Energy Consumption in Smart Grid

    Abdulaziz Alorf*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 273-286, 2023, DOI:10.32604/csse.2023.035437

    Abstract Nowadays, smart electricity grids are managed through advanced tools and techniques. The advent of Artificial Intelligence (AI) and network technology helps to control the energy demand. These advanced technologies can resolve common issues such as blackouts, optimal energy generation costs, and peak-hours congestion. In this paper, the residential energy demand has been investigated and optimized to enhance the Quality of Service (QoS) to consumers. The energy consumption is distributed throughout the day to fulfill the demand in peak hours. Therefore, an Edge-Cloud computing-based model is proposed to schedule the energy demand with reward-based energy consumption. This model gives priority to… More >

Displaying 1-10 on page 1 of 31. Per Page