dc.contributor.author | Liu, Xu | |
dc.contributor.author | Di, Xiaoqiang | |
dc.contributor.author | Li, Jinqing | |
dc.contributor.author | Wang, Huan | |
dc.contributor.author | Zhao, Jinping | |
dc.contributor.author | Yang, Huamin | |
dc.contributor.author | Cong, Ligang | |
dc.contributor.author | Jiang, Yuming | |
dc.date.accessioned | 2020-01-23T13:43:06Z | |
dc.date.available | 2020-01-23T13:43:06Z | |
dc.date.created | 2019-09-03T14:09:24Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Mathematical problems in engineering. 2019, 2019 1-16. | nb_NO |
dc.identifier.issn | 1024-123X | |
dc.identifier.uri | http://hdl.handle.net/11250/2637686 | |
dc.description.abstract | Resource allocation is the process of optimizing the rare resources. In the area of security, how to allocate limited resources to protect a massive number of targets is especially challenging. This paper addresses this resource allocation issue by constructing a game theoretic model. A defender and an attacker are players and the interaction is formulated as a trade-off between protecting targets and consuming resources. The action cost which is a necessary role of consuming resource is considered in the proposed model. Additionally, a bounded rational behavior model (quantal response: QR), which simulates a human attacker of the adversarial nature, is introduced to improve the proposed model. To validate the proposed model, we compare the different utility functions and resource allocation strategies. The comparison results suggest that the proposed resource allocation strategy performs better than others in the perspective of utility and resource effectiveness. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Hindawi Publishing Corporation | nb_NO |
dc.relation.uri | https://doi.org/10.1155/2019/5475341 | |
dc.rights | Navngivelse 4.0 Internasjonal | * |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/deed.no | * |
dc.title | Allocating Limited Resources to Protect a Massive Number of Targets Using a Game Theoretic Model | nb_NO |
dc.type | Journal article | nb_NO |
dc.type | Peer reviewed | nb_NO |
dc.description.version | publishedVersion | nb_NO |
dc.source.pagenumber | 1-16 | nb_NO |
dc.source.volume | 2019 | nb_NO |
dc.source.journal | Mathematical problems in engineering | nb_NO |
dc.identifier.doi | 10.1155/2019/5475341 | |
dc.identifier.cristin | 1721051 | |
dc.description.localcode | Copyright © 2019 Xu Liu et al. Tis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | original | |
cristin.qualitycode | 1 | |