Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/62655
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSupachai Mukdasaniten_US
dc.contributor.authorSanpawat Kantabutraen_US
dc.date.accessioned2018-11-29T07:38:12Z-
dc.date.available2018-11-29T07:38:12Z-
dc.date.issued2018-08-21en_US
dc.identifier.other2-s2.0-85053450546en_US
dc.identifier.other10.1109/ICSEC.2017.8443870en_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053450546&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/62655-
dc.description.abstract© 2017 IEEE. In this article we present a new defensive problem on a security system. Let M be a security model (T, C, P), where T = (V, E) is a rooted tree rooted at r, C is a multiset of E(T) costs and P is a multiset of V(T)-1 prizes and let (T, c, p) be a security system, where c and p are bijections c: E(T) C and p: V(T) r P, respectively. Given a budget BZ+, we consider the problem of determining the existence of an edge e E(T), where c(e)=i such that the maximum total of prizes obtained from an optimal attack in the security system (T, c, p) is minimum when i is replaced by ∞. We define the decision and optimization versions of the problem and examine their computational complexities. We prove that the decision problem is NP-hard and provide a pseudopolynomial time algorithm for the optimization version of the problem. Additionally, we show that some restricted instances can be solved in polynomial time. In the end conclusion and an example of the application of the algorithm are given.en_US
dc.subjectComputer Scienceen_US
dc.titleThe Complexity of the Infinity Replacement Problem in the Cyber Security Modelen_US
dc.typeConference Proceedingen_US
article.title.sourcetitleICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceedingen_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.