scholarly journals Individual Security and Network Design with Malicious Nodes

Information ◽  
2018 ◽  
Vol 9 (9) ◽  
pp. 214
Author(s):  
Tomasz Janus ◽  
Mateusz Skomra ◽  
Marcin Dziubiński

Networks are beneficial to those being connected but can also be used as carriers of contagious hostile attacks. These attacks are often facilitated by exploiting corrupt network users. To protect against the attacks, users can resort to costly defense. The decentralized nature of such protection is known to be inefficient, but the inefficiencies can be mitigated by a careful network design. Is network design still effective when not all users can be trusted? We propose a model of network design and defense with byzantine nodes to address this question. We study the optimal defended networks in the case of centralized defense and, for the case of decentralized defense, we show that the inefficiencies due to decentralization can be mitigated arbitrarily well when the number of nodes in the network is sufficiently large, despite the presence of the byzantine nodes.

2017 ◽  
Vol 170 ◽  
pp. 182-226 ◽  
Author(s):  
Diego A. Cerdeiro ◽  
Marcin Dziubiński ◽  
Sanjeev Goyal

1977 ◽  
Vol 5 (1) ◽  
pp. 6-28 ◽  
Author(s):  
A. L. Browne

Abstract An analytical tool is presented for the prediction of the effects of changes in tread pattern design on thick film wet traction performance. Results are reported for studies in which the analysis, implemented on a digital computer, was used to determine the effect of different tread geometry features, among these being the number, width, and lateral spacing of longitudinal grooves and the angle of zigzags in longitudinal grooves, on thick film wet traction. These results are shown to be in good agreement with experimental data appearing in the literature and are used to formulate guidelines for tread groove network design practice.


2021 ◽  
Author(s):  
Stewart J. Reid ◽  
Ruben E. Perez ◽  
Peter W. Jansen ◽  
Cees Bil

Sign in / Sign up

Export Citation Format

Share Document