-
1
-
-
2442604387
-
-
A. Afgah, S. K. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In Proc. International Performance Computing and Communications Conference (IPCCC), April 2004.
-
A. Afgah, S. K. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In Proc. International Performance Computing and Communications Conference (IPCCC), April 2004.
-
-
-
-
2
-
-
52249103237
-
-
A. Afgah, S. K. Das, and K. Basu. A non-cooperative game approach for intrusion detection in sensor networks. In Proc. VTC 2004, Fall 2004.
-
A. Afgah, S. K. Das, and K. Basu. A non-cooperative game approach for intrusion detection in sensor networks. In Proc. VTC 2004, Fall 2004.
-
-
-
-
3
-
-
52249089571
-
-
T. Alpcan and T. Basar. A game theoretic approach to decision and analysis in network intrusion detection. In Proc. 43rd IEEE Conference on Decision and Control, December 2004.
-
T. Alpcan and T. Basar. A game theoretic approach to decision and analysis in network intrusion detection. In Proc. 43rd IEEE Conference on Decision and Control, December 2004.
-
-
-
-
4
-
-
0004260007
-
-
The MIT Press, Cambridge, Massachusetts
-
D. Fudenberg and J. Tirole. Game Theory. The MIT Press, Cambridge, Massachusetts, 1991.
-
(1991)
Game Theory
-
-
Fudenberg, D.1
Tirole, J.2
-
5
-
-
85141907621
-
-
Y. Liu, H. Man, and C. Comaniciu. A game theoretic approach to efficient mixed strategies for intrusion detection. In proc. IEEE International Conference on Communications (ICC 2006), 2006.
-
Y. Liu, H. Man, and C. Comaniciu. A game theoretic approach to efficient mixed strategies for intrusion detection. In proc. IEEE International Conference on Communications (ICC 2006), 2006.
-
-
-
-
6
-
-
0242552717
-
Architecture of the mobile ad-hoc network security (mans) system
-
Man and Cybernetics, October
-
C. Manikopoulos and L. Ling. Architecture of the mobile ad-hoc network security (mans) system. In Proc. of the IEEE International Conference on Systems, Man and Cybernetics, 4:3122-3127, October 2004.
-
(2004)
Proc. of the IEEE International Conference on Systems
, vol.4
, pp. 3122-3127
-
-
Manikopoulos, C.1
Ling, L.2
-
7
-
-
85177498914
-
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in a mobile ad-hoc environment. In Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255-265, August 2000.
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in a mobile ad-hoc environment. In Proc. of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255-265, August 2000.
-
-
-
-
8
-
-
52249123429
-
-
P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. IFIP - Communication and Multimedia Security Conference 2002, September 2002.
-
P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. IFIP - Communication and Multimedia Security Conference 2002, September 2002.
-
-
-
-
9
-
-
52249090187
-
-
P. Michiardi and R. Molva. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In Proc. WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.
-
P. Michiardi and R. Molva. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks. In Proc. WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, March 2003.
-
-
-
-
10
-
-
1442353534
-
-
K. Nadkarni and A. Mishra. Intrusion detection in manets - the second wall of defense. In Proc. of the IEEE Industrial Electronics Society Conference, pages 1235-1239, November 2003.
-
K. Nadkarni and A. Mishra. Intrusion detection in manets - the second wall of defense. In Proc. of the IEEE Industrial Electronics Society Conference, pages 1235-1239, November 2003.
-
-
-
-
11
-
-
33646552392
-
-
A. Partwardan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure routing and intrusion detection in ad-hoc networks. In Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, March 2005.
-
A. Partwardan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis. Secure routing and intrusion detection in ad-hoc networks. In Proc. 3rd IEEE International Conference on Pervasive Computing and Communications, March 2005.
-
-
-
-
12
-
-
84874825833
-
A game theoretic formulation for intrusion detection in mobile ad hoc networks
-
March
-
A. Patcha and J.-M. Park. A game theoretic formulation for intrusion detection in mobile ad hoc networks. International Journal of Network Security, 2(2): 146-152, March 2006.
-
(2006)
International Journal of Network Security
, vol.2
, Issue.2
, pp. 146-152
-
-
Patcha, A.1
Park, J.-M.2
-
13
-
-
85177503934
-
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proc. Mobicom 2000, August 2000.
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proc. Mobicom 2000, August 2000.
-
-
-
|