Please use this identifier to cite or link to this item: http://cmuir.cmu.ac.th/jspui/handle/6653943832/71860
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSupachai Mukdasaniten_US
dc.contributor.authorSanpawat Kantabutraen_US
dc.date.accessioned2021-01-27T04:16:51Z-
dc.date.available2021-01-27T04:16:51Z-
dc.date.issued2021-02-01en_US
dc.identifier.issn10902724en_US
dc.identifier.issn00220000en_US
dc.identifier.other2-s2.0-85088658418en_US
dc.identifier.other10.1016/j.jcss.2020.07.001en_US
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85088658418&origin=inwarden_US
dc.identifier.urihttp://cmuir.cmu.ac.th/jspui/handle/6653943832/71860-
dc.description.abstract© 2020 Elsevier Inc. Let M=(T,C,P) be a security model, where T is a rooted tree, C is a multiset of costs and P is a multiset of prizes and let (T,c,p) be a security system, where c and p are bijections of costs and prizes. The problems of computing an optimal attack on a security system and of determining an edge e∈E(T) such that the maximum sum of prizes obtained from an optimal attack in (T,c,p) is minimized when c(e)=∞ are considered. An O(G2n)-time algorithm to compute an optimal attack as well as an O(G2n2)-time algorithm to determine such an edge are given, in addition to a (1-ϵ) FPTAS with the time bound [Formula presented] and a (1+ϵ) FPTAS with the time bound [Formula presented] for the first and second problems, respectively.en_US
dc.subjectComputer Scienceen_US
dc.subjectMathematicsen_US
dc.titleAttack and defense in the layered cyber-security model and their (1 ± ϵ)-approximation schemesen_US
dc.typeJournalen_US
article.title.sourcetitleJournal of Computer and System Sciencesen_US
article.volume115en_US
article.stream.affiliationsChiang Mai Universityen_US
Appears in Collections:CMUL: Journal Articles

Files in This Item:
There are no files associated with this item.


Items in CMUIR are protected by copyright, with all rights reserved, unless otherwise indicated.