{"title":"Some Strategic Decision Problems in Networks","authors":"M. Holler, Florian Rupp","doi":"10.2139/ssrn.3598832","DOIUrl":"https://doi.org/10.2139/ssrn.3598832","url":null,"abstract":"The following analysis demonstrates that network efficiency is a very delicate matter. Neither the restriction to suitable core-subnets, nor intelligent enlargements guarantee efficient results in any case. For instance, the numerical example in Myerson (1977) contains a prisoners’ dilemma situation for some agents in the network. Of course, the outcome is inefficient from the perspective of these players – but not for the unrestricted network. Breass’ paradox shows that the enlargement of a network can lead to an inefficient outcome in the Nash equilibrium even if all players are taken into consideration. Restricting the network can create a Pareto efficient outcome. A third model discusses the strategic problem of a cyber network attack in the form of an inspection game. From the defender’s point of view, the question arises which nodes of the network are essential attack targets and thus need special security attention. In principle two types of nodes are critical: important ones and unimportant ones. Important nodes, as they connect to many other essential nodes and are therefore suitable multipliers for network malware and information capture, and unimportant nodes, from the attacker’s point of view, which are, in general, not in the focus of security attention, such that infiltration via them may be undetected for a long time.","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131236183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Probabilistic Unified Approach for Power Indices in Simple Games","authors":"J. Freixas, M. Pons","doi":"10.1007/978-3-662-60555-4_11","DOIUrl":"https://doi.org/10.1007/978-3-662-60555-4_11","url":null,"abstract":"","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Van-Giap Le, Huu-Tung Nguyen, Duy-Phuc Pham, Van-On Phung, N. Nguyen
{"title":"GuruWS: A Hybrid Platform for Detecting Malicious Web Shells and Web Application Vulnerabilities","authors":"Van-Giap Le, Huu-Tung Nguyen, Duy-Phuc Pham, Van-On Phung, N. Nguyen","doi":"10.1007/978-3-662-58611-2_5","DOIUrl":"https://doi.org/10.1007/978-3-662-58611-2_5","url":null,"abstract":"","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124000930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Ins and Outs of Network-Oriented Modeling: From Biological Networks and Mental Networks to Social Networks and Beyond","authors":"Jan Treur","doi":"10.1007/978-3-662-58611-2_2","DOIUrl":"https://doi.org/10.1007/978-3-662-58611-2_2","url":null,"abstract":"","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133773892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrew O. Martin, J. Bishop, E. Robinson, D. R. Myatt
{"title":"Local Termination Criteria for Swarm Intelligence: A Comparison Between Local Stochastic Diffusion Search and Ant Nest-Site Selection","authors":"Andrew O. Martin, J. Bishop, E. Robinson, D. R. Myatt","doi":"10.1007/978-3-662-58611-2_3","DOIUrl":"https://doi.org/10.1007/978-3-662-58611-2_3","url":null,"abstract":"","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling of Emotional Contagion in Soccer Fans","authors":"Berend Jutte, C. N. V. D. Wal","doi":"10.1007/978-3-319-99810-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-99810-7_2","url":null,"abstract":"","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115864046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Web Service Selection and Dynamic Composition Based on Linked Open Data","authors":"Nikos Vesyropoulos, C. Georgiadis, E. Pimenidis","doi":"10.1007/978-3-319-99810-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-99810-7_3","url":null,"abstract":"","PeriodicalId":406035,"journal":{"name":"Trans. Comput. Collect. Intell.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122524663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}