-
2
-
-
77951729734
-
A survey of game theory as applied to network security
-
Sankardas Roy, "A survey of game theory as applied to network security," Proc. of the 43rd HICSS, 2010.
-
(2010)
Proc. of the 43rd HICSS
-
-
Roy, S.1
-
3
-
-
84994139277
-
A game theoretic approach to gray hole attacks in wireless mesh networks
-
Devu Manikantan Shila, Tricha Anjali, "A game theoretic approach to gray hole attacks in wireless mesh networks," Military Communications Conference, 2008.
-
(2008)
Military Communications Conference
-
-
Shila, D.M.1
Anjali, T.2
-
4
-
-
0020497622
-
The Gaussian test channel with an intelligent jammer
-
January
-
T. Basar, "The Gaussian test channel with an intelligent jammer." IEEE Transactions on Information Theory, vol. 29, pp.152-157, January 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, pp. 152-157
-
-
Basar, T.1
-
5
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
September
-
A. Kashyap, "Correlated jamming on MIMO Gaussian fading channels." IEEE Transactions on Information Theory, vol. 50, pp.2119-2123, September 2004.
-
(2004)
IEEE Transactions on Information Theory
, vol.50
, pp. 2119-2123
-
-
Kashyap, A.1
-
6
-
-
34249339428
-
Securing cooperative ad-hoc networks under noise and imperfect monitoring: Strategies and game theoretic analysis
-
June
-
Wei Yu, Zhu Ji, K. J. Ray Liu, "Securing cooperative ad-hoc networks under noise and imperfect monitoring: strategies and game theoretic analysis." IEEE Transactions on Information Forensics and Security, vol. 2, June 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
-
-
Yu, W.1
Ji, Z.2
Liu, K.J.R.3
-
8
-
-
74349094229
-
Physical layer security: Coalitional games for distributed cooperation
-
W. Saad, Z. Han, T. Basar, "Physical Layer Security: Coalitional Games for Distributed Cooperation," 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless, 2009.
-
(2009)
7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless
-
-
Saad, W.1
Han, Z.2
Basar, T.3
-
9
-
-
44149118108
-
Attacks and countermeasures in sensor networks: A survey
-
K. Xing, "Attacks and countermeasures in sensor networks: a survey," Network Security, 2009.
-
(2009)
Network Security
-
-
Xing, K.1
-
10
-
-
79959875003
-
Game theory meets network security and privacy
-
M. H. Manshaei, "Game theory meets network security and privacy," EPFL Technical Report, 2010.
-
(2010)
EPFL Technical Report
-
-
Manshaei, M.H.1
-
11
-
-
70349996116
-
MAC games for distributed wireless network security with Incomplete Information of Selfish and Malicious User Types
-
Y. E. Sagduyu, "MAC games for distributed wireless network security with Incomplete Information of Selfish and Malicious User Types," 20th International Conference on Game Theory for Networks, 2009.
-
(2009)
20th International Conference on Game Theory for Networks
-
-
Sagduyu, Y.E.1
-
14
-
-
36849010124
-
A survey on attacks and countermeasures in mobile ad hoc networks
-
B. Wu, J. Chen, "A survey on attacks and countermeasures in mobile ad hoc networks," Wireless/ Mobile Network Security, 2006.
-
(2006)
Wireless/ Mobile Network Security
-
-
Wu, B.1
Chen, J.2
-
15
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y. C. Hu, A. Perrig, and D.Johnson, "Packet leashes: a defense against wormhole attacks in wireless ad hoc networks," Proceedings of INFOCOMM, pp.1976-1986, 2003.
-
(2003)
Proceedings of INFOCOMM
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
16
-
-
48049122172
-
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
-
J. S. Baras, S. Radosavac, G. Theodorakopoulos, "Intrusion detection system resiliency to byzantine attacks: the case study of wormholes in OLSR," IEEE Military Communications Conference, pp.243-256, 2007.
-
(2007)
IEEE Military Communications Conference
, pp. 243-256
-
-
Baras, J.S.1
Radosavac, S.2
Theodorakopoulos, G.3
-
17
-
-
56449123247
-
Game theoretic approach in routing protocol for wireless ad hoc networks
-
May
-
M. Naserian, K. Tepe, "Game theoretic approach in routing protocol for wireless ad hoc networks," Ad Hoc Networks, vol.7, May 2009.
-
(2009)
Ad Hoc Networks
, vol.7
-
-
Naserian, M.1
Tepe, K.2
-
23
-
-
80052124570
-
A puzzle-based defense strategy against flooding attacks using game theory
-
September
-
W. Saad, Z. Han, M. Debbah, "A puzzle-based defense strategy against flooding attacks using game theory." IEEE Signal Processing Magazine, September 2009.
-
(2009)
IEEE Signal Processing Magazine
-
-
Saad, W.1
Han, Z.2
Debbah, M.3
-
24
-
-
0034250315
-
Analysis of an on-off jamming situation as a dynamic game
-
R. Mallik, R. Scholtz, and G.Papavassilopoulos, "Analysis of an on-off jamming situation as a dynamic game." IEEE Transactions on Communication, vol. 48, pp.1360-1373, 2000.
-
(2000)
IEEE Transactions on Communication
, vol.48
, pp. 1360-1373
-
-
Mallik, R.1
Scholtz, R.2
Papavassilopoulos, G.3
-
25
-
-
74349087595
-
Jamming in wireless networks under uncertainty
-
E. Altman, K. Avrachenkov, "Jamming in wireless networks under uncertainty," 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless, 2009.
-
(2009)
7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless
-
-
Altman, E.1
Avrachenkov, K.2
-
27
-
-
0026240492
-
Jamming in slotted ALOHA multihop packet radio networks
-
J. Zander, "Jamming in slotted ALOHA multihop packet radio networks." IEEE Transactions on Communication, vol. 39, 1991.
-
(1991)
IEEE Transactions on Communication
, vol.39
-
-
Zander, J.1
-
28
-
-
0036804761
-
Routing security in ad hoc networks
-
October
-
H. Deng, W. Li, and D. P. Agrawal, "Routing security in ad hoc networks." IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, vol. 40, no. 10, pp.70-75, October 2002.
-
(2002)
IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
|