Security and Communication Networks / 2020 / Article / Tab 3

Research Article

Game Theoretical Method for Anomaly-Based Intrusion Detection

Table 3

The results showing whether the inequality conditions in Theorems 4 and 5 and (4) in Theorem 6 are satisfied when and .

Scenario L.4Scenario L.5Scenario L.6Scenario L.6

IC 4.1×IC 5.1×IC 5.1×IC 5.1×
IC 4.2IC 5.2IC 5.2IC 5.2×

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.