The Complexity of the Infinity Replacement Problem in the Cyber Security Model
© 2017 IEEE. In this article we present a new defensive problem on a security system. Let M be a security model (T, C, P), where T = (V, E) is a rooted tree rooted at r, C is a multiset of E(T) costs and P is a multiset of V(T)-1 prizes and let (T, c, p) be a security system, where c and p are bijec...
Saved in:
Main Authors: | Supachai Mukdasanit, Sanpawat Kantabutra |
---|---|
Format: | Conference Proceeding |
Published: |
2018
|
Subjects: | |
Online Access: | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053450546&origin=inward http://cmuir.cmu.ac.th/jspui/handle/6653943832/62655 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Chiang Mai University |
Similar Items
-
Time complexity of the edge replacement problem in a cyber security system
by: Supachai Mukdasanit
Published: (2019) -
The complexity of cyber attacks in a new layered-security model and the maximum-weight, rooted-subtree problem
by: Geir Agnarsson, et al.
Published: (2018) -
The complexity of cyber attacks in a new layered-security model and the maximum-weight, rooted-subtree problem
by: Geir Agnarsson, et al.
Published: (2018) -
The structure of rooted weighted trees modeling layered cyber-security systems
by: Geir Agnarsson, et al.
Published: (2018) -
On cyber attacks and the maximum-weight rooted-subtree problem
by: Geir Agnarsson, et al.
Published: (2018)