Please use this identifier to cite or link to this item:
http://cmuir.cmu.ac.th/jspui/handle/6653943832/71860
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Supachai Mukdasanit | en_US |
dc.contributor.author | Sanpawat Kantabutra | en_US |
dc.date.accessioned | 2021-01-27T04:16:51Z | - |
dc.date.available | 2021-01-27T04:16:51Z | - |
dc.date.issued | 2021-02-01 | en_US |
dc.identifier.issn | 10902724 | en_US |
dc.identifier.issn | 00220000 | en_US |
dc.identifier.other | 2-s2.0-85088658418 | en_US |
dc.identifier.other | 10.1016/j.jcss.2020.07.001 | en_US |
dc.identifier.uri | https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85088658418&origin=inward | en_US |
dc.identifier.uri | http://cmuir.cmu.ac.th/jspui/handle/6653943832/71860 | - |
dc.description.abstract | © 2020 Elsevier Inc. Let M=(T,C,P) be a security model, where T is a rooted tree, C is a multiset of costs and P is a multiset of prizes and let (T,c,p) be a security system, where c and p are bijections of costs and prizes. The problems of computing an optimal attack on a security system and of determining an edge e∈E(T) such that the maximum sum of prizes obtained from an optimal attack in (T,c,p) is minimized when c(e)=∞ are considered. An O(G2n)-time algorithm to compute an optimal attack as well as an O(G2n2)-time algorithm to determine such an edge are given, in addition to a (1-ϵ) FPTAS with the time bound [Formula presented] and a (1+ϵ) FPTAS with the time bound [Formula presented] for the first and second problems, respectively. | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Mathematics | en_US |
dc.title | Attack and defense in the layered cyber-security model and their (1 ± ϵ)-approximation schemes | en_US |
dc.type | Journal | en_US |
article.title.sourcetitle | Journal of Computer and System Sciences | en_US |
article.volume | 115 | en_US |
article.stream.affiliations | Chiang Mai University | en_US |
Appears in Collections: | CMUL: Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.