메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 507-511

A bayesian game approach for preventing DoS attacks in wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN GAMES; DEFENSE STRATEGIES; DOS ATTACKS; GAME APPROACHES; INTRUSION-DETECTION SYSTEMS; MALICIOUS NODES; NASH EQUILIBRIUM; NEW TECHNOLOGIES; RESOURCE LIMITATIONS; SECURE ROUTING PROTOCOLS;

EID: 64749095465     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CMC.2009.325     Document Type: Conference Paper
Times cited : (49)

References (13)
  • 2
    • 4143084830 scopus 로고    scopus 로고
    • H. Deng, Q. Zeng, and D.P. intrusion detection system networks-, In Proc. of Technology Conf. (VTC'03), 2147-2151.
    • H. Deng, Q. Zeng, and D.P. intrusion detection system networks-, In Proc. of Technology Conf. (VTC'03), 2147-2151.
  • 3
    • 64749095951 scopus 로고    scopus 로고
    • O. Kachirski and R. Guha using mobile agents in wirel In Proc. of the IEEE Wor Media Networking, July 2006
    • O. Kachirski and R. Guha using mobile agents in wirel In Proc. of the IEEE Wor Media Networking, July 2006
  • 5
    • 64749101004 scopus 로고    scopus 로고
    • R. Bace, and P. Mell. 200 detection systems, NIST S Intrusion Detection s http://www.snort.Org/docs/ n
    • R. Bace, and P. Mell. (200 detection systems, NIST S Intrusion Detection s http://www.snort.Org/docs/ n
  • 7
    • 64749105950 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Dem for Ad Hoc Networks
    • M. Hu, Y. Chun, A. Perr "Ariadne: A Secure On-Dem for Ad Hoc Networks", I Journal, vol.11, no.1, 2005.
    • (2005) I Journal , vol.11 , Issue.1
    • Hu, M.1    Chun, Y.2    Perr, A.3
  • 9
    • 64749090197 scopus 로고    scopus 로고
    • S. Basagni, K. Herrin, D. B -Secure Pebblenets-, In Pro Int'l. symposium on Mobile and Computing, ACM press 163.
    • S. Basagni, K. Herrin, D. B -Secure Pebblenets-, In Pro Int'l. symposium on Mobile and Computing, ACM press 163.
  • 10
    • 64749088407 scopus 로고    scopus 로고
    • A. Agah, S. K. Das, and security for prevention of D sensor networks using econ the Proc. of 2nd IEEE Int'l Hoc and Sensor Systems D.C., Nov. 2005.
    • A. Agah, S. K. Das, and security for prevention of D sensor networks using econ the Proc. of 2nd IEEE Int'l Hoc and Sensor Systems D.C., Nov. 2005.
  • 11
    • 64749113817 scopus 로고    scopus 로고
    • A. Agah, S. K. Das, and K. B attack in sensor and acto theoretic approach-, IEE Communications (ICC), Seo pp. 3218-3222.
    • A. Agah, S. K. Das, and K. B attack in sensor and acto theoretic approach-, IEE Communications (ICC), Seo pp. 3218-3222.
  • 12
    • 64749100810 scopus 로고    scopus 로고
    • Fudenberg, D, and J. Tirol MIT Press, Cambridge, Mass
    • Fudenberg, D., and J. Tirol MIT Press, Cambridge, Mass
  • 13
    • 64749101698 scopus 로고    scopus 로고
    • W.R. Heinzelman, A. Ch Balakrishnan, Energy-effi protocol for wireless sensor n of the Hawaii Int'l. Conf. Hawaii, Jan. 2000, pp. 3005-1000 1200 Agrawal, -SVM-based for wireless ad hoc the IEEE Vehicular 3, Oct. 2003, pp. a, -Intrusion detection less ad hoc networks-, rkshop on Knowledge 6, pp. 153-158.
    • W.R. Heinzelman, A. Ch Balakrishnan, "Energy-effi protocol for wireless sensor n of the Hawaii Int'l. Conf. Hawaii, Jan. 2000, pp. 3005-1000 1200 Agrawal, -SVM-based for wireless ad hoc the IEEE Vehicular vol. 3, Oct. 2003, pp. a, -Intrusion detection less ad hoc networks-, rkshop on Knowledge 6, pp. 153-158.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.