4.7 Article

Optimal Epidemics Policy Seeking on Networks-of-Networks Under Malicious Attacks by Geometric Programming

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TSMC.2023.3234065

关键词

Epidemics; Optimization; Network topology; Games; Topology; Resource management; Eigenvalues and eigenfunctions; Epidemics policy; games-of-games (GoG); geometric programming (GP); malicious attacks; networks-ofnetworks (NoN)

向作者/读者索取更多资源

This work investigates the optimal epidemics policy-seeking problem on networks-of-networks (NoN) in the presence of unknown malicious adding-edge attacks. The conflicts between each network policymaker and the attacker are captured by a series of Stackelberg games, while all network policymakers together compose a Nash game. A Heuristic algorithm based on iterative geometric programming is proposed to seek the gestalt Nash equilibrium (GNE) of the game, with a demonstrated asymptotical convergence. The practicability and validity of the theoretical results and algorithms are illustrated through a simulation example.
This work deals with the optimal epidemics policy-seeking problem on networks-of-networks (NoN) in the presence of unknown malicious adding-edge attacks. This problem is investigated in a framework of games-of-games (GoG), in which the conflicts between each network policymaker and the attacker are captured by a series of the Stackelberg games, while all network policymakers together compose a Nash game. First, the tolerable maximum attack magnitude is investigated and given implicitly. Then, we prove the existence of the gestalt Nash equilibrium (GNE) under mild attacks bounded by the above magnitude. A Heuristic algorithm based on iterative geometric programming is proposed to seek the GNE of the above GoG, whose asymptotical convergence is verified. Correspondingly, a greedy Heuristic strategy for the malicious attacker to compromise the NoN topology is developed. The practicability and validity of the above theoretical results and algorithms are illustrated via a simulation example.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据