-
1
-
-
34548132722
-
Using game theory to analyze wireless ad hoc networks
-
V. Srivastava, J. Neel, A. Mackenzie, R. Menon, L. Dasilva, J. Hicks, J. Reed, and R. Gilles, "Using game theory to analyze wireless ad hoc networks, " IEEE Communications Surveys and Tutorials, , pp. 46-56, 2005.
-
(2005)
IEEE Communications Surveys and Tutorials
, pp. 46-56
-
-
Srivastava, V.1
Neel, J.2
Mackenzie, A.3
Menon, R.4
Dasilva, L.5
Hicks, J.6
Reed, J.7
Gilles, R.8
-
3
-
-
2442604387
-
A game theory based approach for security in wireless sensor networks
-
A. Agah, S. Das, and K. Basu, "A game theory based approach for security in wireless sensor networks, " in 2004 IEEE International Conference on Performance, Computing, and Communications, , 2004, pp. 259-263.
-
(2004)
2004 IEEE International Conference on Performance, Computing, and Communications
, pp. 259-263
-
-
Agah, A.1
Das, S.2
Basu, K.3
-
4
-
-
1542288809
-
A game theoretic approach to decision and analysis in network intrusion detection
-
Dec. 2003
-
T. Alpcan and T. Basar, "A game theoretic approach to decision and analysis in network intrusion detection, " in Proceedings. 42nd IEEE Conference on Decision and Control, 2003., Dec. 2003, pp. 2595-2600.
-
(2003)
Proceedings. 42nd IEEE Conference on Decision and Control
, pp. 2595-2600
-
-
Alpcan, T.1
Basar, T.2
-
5
-
-
84874825833
-
A game theoretic formulation for intrusion detection in mobile ad hoc networks
-
A. Patcha and J. min Park, "A game theoretic formulation for intrusion detection in mobile ad hoc networks, " International Journal of Network Security, vol.2, pp. 131-137, 2006.
-
(2006)
International Journal of Network Security
, vol.2
, pp. 131-137
-
-
Patcha, A.1
Min Park, J.2
-
6
-
-
70349236493
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
Y. Liu, C. Comaniciu, and H. Man, "A bayesian game approach for intrusion detection in wireless ad hoc networks, " in GameNets '06: Proceeding from the 2006 workshop on Game theory for communications and networks, 2006, p. 4.
-
(2006)
GameNets '06: Proceeding from the 2006 Workshop on Game Theory for Communications and Networks
, pp. 4
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
7
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
W. Yu and K. J. R. Liu, "Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks, " IEEE Transactions on Mobile Computing, vol.6, no.5, pp. 507-521, 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.5
, pp. 507-521
-
-
Yu, W.1
Liu, K.J.R.2
-
8
-
-
14844282678
-
On cheating in csma/ca ad hoc networks
-
M. Cagalj, "On cheating in csma/ca ad hoc networks, " EPFL, Tech. Rep., 2004.
-
(2004)
EPFL, Tech. Rep.
-
-
Cagalj, M.1
-
9
-
-
0034250315
-
Analysis of an onoff jamming situation as a dynamic game
-
Aug
-
R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an onoff jamming situation as a dynamic game, " IEEE Transactions on Communications, , vol.48, no.8, pp. 1360-1373, Aug 2000.
-
(2000)
IEEE Transactions on Communications
, vol.48
, Issue.8
, pp. 1360-1373
-
-
Mallik, R.1
Scholtz, R.2
Papavassilopoulos, G.3
-
10
-
-
34548295754
-
Spread: Foiling smart jammers using multi-layer agility
-
May
-
X. Liu, G. Noubir, R. Sundaram, and S. Tan, "Spread: Foiling smart jammers using multi-layer agility, " in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, vol.6- 12, May 2007, pp. 2536 - 2540.
-
(2007)
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE
, vol.6-12
, pp. 2536-2540
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
11
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks, " in MobiHoc '05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, 2005, pp. 46-57.
-
(2005)
MobiHoc '05: Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
13
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
Y.-a. Huang, W. Fan, W. Lee, and P. S. Yu, "Cross-feature analysis for detecting ad-hoc routing anomalies, " in ICDCS '03: Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003, p. 478.
-
(2003)
ICDCS '03: Proceedings of the 23rd International Conference on Distributed Computing Systems
, pp. 478
-
-
Huang, Y.-A.1
Fan, W.2
Lee, W.3
Yu, P.S.4
|