no code implementations • 8 May 2018 • Tomáš Brázdil, Antonín Kučera, Vojtěch Řehák
We propose an algorithm for constructing efficient patrolling strategies in the Internet environment, where the protected targets are nodes connected to the network and the patrollers are software agents capable of detecting/preventing undesirable activities on the nodes.