-
2
-
-
77952255404
-
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
-
D.M. Shila, Y. Cheng, and T. Anjali Mitigating selective forwarding attacks with a channel-aware approach in WMNs IEEE Transactions on Wireless Communications 9 5 2010 1661 1675
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.5
, pp. 1661-1675
-
-
Shila, D.M.1
Cheng, Y.2
Anjali, T.3
-
3
-
-
34547438136
-
Guest editorial non-cooperative behavior in networking
-
L. Buttyan, J.P. Hubaux, L. Li, X.-Y. Li, T. Roughgarden, and A. Leon-Garcia Guest editorial non-cooperative behavior in networking IEEE Journal on Selected Areas in Communications 25 6 2007 1065 1068
-
(2007)
IEEE Journal on Selected Areas in Communications
, vol.25
, Issue.6
, pp. 1065-1068
-
-
Buttyan, L.1
Hubaux, J.P.2
Li, L.3
Li, X.-Y.4
Roughgarden, T.5
Leon-Garcia, A.6
-
4
-
-
34548370980
-
Game theory in wireless networks: A tutorial
-
accepted to ACM Computing Surveys and withdrawn for copyright reasons, Jun. 2006
-
M. Felegyhazi, J.-P. Hubaux, Game theory in wireless networks: a tutorial, EPFL Technical Report: LCA-REPORT-2006-002, accepted to ACM Computing Surveys and withdrawn for copyright reasons, Jun. 2006.
-
EPFL Technical Report: LCA-REPORT-2006-002
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
-
5
-
-
77952581914
-
Maintaining defender's reputation in anomaly detection against insider attacks
-
N. Zhang, W. Yu, X. Fu, and S.K. Das Maintaining defender's reputation in anomaly detection against insider attacks IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 40 3 2010 597 611
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.40
, Issue.3
, pp. 597-611
-
-
Zhang, N.1
Yu, W.2
Fu, X.3
Das, S.K.4
-
6
-
-
0041939831
-
Cooperation in wireless ad hoc networks
-
April 2003
-
C.F. Chiasserini, P. Nuggehalli, V. Srinivasan, R.R. Rao, Cooperation in wireless ad hoc networks, in: The proceedings of IEEE INFOCOM 2003, April 2003, pp. 808-817.
-
The Proceedings of IEEE INFOCOM 2003
, pp. 808-817
-
-
Chiasserini, C.F.1
Nuggehalli, P.2
Srinivasan, V.3
Rao, R.R.4
-
7
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
W. Yu, and K.J.R. Liu Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks IEEE Transactions on Mobile Computing 6 5 2007 507 521
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.5
, pp. 507-521
-
-
Yu, W.1
Liu, K.J.R.2
-
8
-
-
79960730671
-
From access control to trust management, and back - A petition
-
D. Gollmann, From access control to trust management, and back - a petition, in: Proceedings of IFIPTM'2011, 2011, pp.1-8.
-
(2011)
Proceedings of IFIPTM'2011
, pp. 1-8
-
-
Gollmann, D.1
-
9
-
-
62349114584
-
A game theoretic approach to gray hole attacks in wireless mesh networks
-
Nov. 2008
-
D.M. Shila, T. Anjali. A game theoretic approach to gray hole attacks in wireless mesh networks, in: The proceedings of IEEE MILCOM08, Nov. 2008, pp. 1-7.
-
The Proceedings of IEEE MILCOM08
, pp. 1-7
-
-
Shila, D.M.1
Anjali, T.2
-
10
-
-
77951287085
-
A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks
-
E.A. Panaousis, C. Politis, A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks, in: Proceedings of IEEE WLN'09, 2009, pp. 985-992.
-
(2009)
Proceedings of IEEE WLN'09
, pp. 985-992
-
-
Panaousis, E.A.1
Politis, C.2
-
11
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. of MOBICOM'2000, 2000, pp. 255-265.
-
(2000)
Proc. of MOBICOM'2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
12
-
-
1642307979
-
Prevention of cooperative black hole attack in wireless Ad Hoc netoworks
-
S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, Prevention of cooperative black hole attack in wireless Ad Hoc netoworks, in: Proc. of ICWN'03, 2003, pp. 570-575.
-
(2003)
Proc. of ICWN'03
, pp. 570-575
-
-
Ramaswamy, S.1
Fu, H.2
Sreekantaradhya, M.3
Dixon, J.4
Nygard, K.5
-
13
-
-
34548852836
-
CHEMAS: Identify suspect nodes in selective forwarding attacks
-
B. Xiao, B. Yu, and C. Gao CHEMAS: Identify suspect nodes in selective forwarding attacks Journal of Parallel and Distributed Computing 67 11 2007 1218 1230
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, Issue.11
, pp. 1218-1230
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
-
14
-
-
58049135707
-
Cooperative black and gray hole attacks in mobile ad hoc networks
-
P. Agrawal, R.K. Ghosh, S.K. Das, Cooperative black and gray hole attacks in mobile ad hoc networks, in: Proceedings of ICUIMC'2008, 2008, pp. 310-314.
-
(2008)
Proceedings of ICUIMC'2008
, pp. 310-314
-
-
Agrawal, P.1
Ghosh, R.K.2
Das, S.K.3
-
15
-
-
38549083086
-
-
Proceedings of PAKDD workshops'2007
-
C.W. Yu, T.K. Wu, R.H. Cheng, S.C. Chang, A distributed and cooperative black hole node detection and elimination mechanism for Ad Hoc networks, in: Proceedings of PAKDD workshops'2007, 2007, pp. 538-549.
-
(2007)
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism For Ad Hoc Networks
, pp. 538-549
-
-
Yu, C.W.1
Wu, T.K.2
Cheng, R.H.3
Chang, S.C.4
-
16
-
-
77951535483
-
Cooperative strategy by stackelberg games under energy constraint in multi-hop relay networks
-
H. Kwon, H.J. Lee, J.M. Cioffi, Cooperative strategy by stackelberg games under energy constraint in multi-hop relay networks, in: Proceedings of IEEE GLOBECOM'2009, 2009, pp. 1-6.
-
(2009)
Proceedings of IEEE GLOBECOM'2009
, pp. 1-6
-
-
Kwon, H.1
Lee, H.J.2
Cioffi, J.M.3
-
19
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of ACM MOBICOM 2002, 2002, pp. 12-23.
-
(2002)
Proceedings of ACM MOBICOM 2002
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
20
-
-
78650504762
-
Model checking ad hoc network routing protocols: ARAN vs. endairA
-
D. Benetti, M. Merro, L. Vigano, Model checking ad hoc network routing protocols: ARAN vs. endairA, in: Proceedings of SEFM 2010, 2010, pp. 191-202.
-
(2010)
Proceedings of SEFM 2010
, pp. 191-202
-
-
Benetti, D.1
Merro, M.2
Vigano, L.3
-
21
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
February 2004
-
L.-X. Hu, D. Evans, Using directional antennas to prevent wormhole attacks. In proceedings of NDSS 2004, February 2004, pp. 131-141.
-
Proceedings of NDSS 2004
, pp. 131-141
-
-
Hu, L.-X.1
Evans, D.2
-
22
-
-
68349086979
-
Mitigation of colluding route falsification attacks by insider nodes in mobile networks
-
X. Su, and V.B. Rajendra Mitigation of colluding route falsification attacks by insider nodes in mobile networks Wireless Communications and Mobile Computing 2009 1141 1157
-
(2009)
Wireless Communications and Mobile Computing
, pp. 1141-1157
-
-
Su, X.1
Rajendra, V.B.2
-
23
-
-
72949088707
-
The Alohanet - Surfing for wireless data [History of Communications]
-
Dec. 2009
-
M. Schwartz, N. Abramson, The Alohanet - surfing for wireless data [History of Communications], in: EEE Communications Magazine, vol.47, no.12, Dec. 2009, pp. 21-25.
-
EEE Communications Magazine
, vol.47
, Issue.12
, pp. 21-25
-
-
Schwartz, M.1
Abramson, N.2
-
24
-
-
34247271637
-
-
DTN research group, October 2006
-
S. Farrell, S. Symington, H. Weiss, Delay-Tolerant networking security overview, IRTF, DTN research group, October 2006.
-
Delay-Tolerant Networking Security Overview, IRTF
-
-
Farrell, S.1
Symington, S.2
Weiss, H.3
-
25
-
-
27744460948
-
Belief-free equilibria in repeated games
-
C.E. Jeffrey, H. Johannes, and O. Wojciech Belief-free equilibria in repeated games Econometrica 73 2 2005 377 415
-
(2005)
Econometrica
, vol.73
, Issue.2
, pp. 377-415
-
-
Jeffrey, C.E.1
Johannes, H.2
Wojciech, O.3
-
26
-
-
84866743763
-
Automated equilibrium analysis of repeated games with private monitoring: A POMDP approach
-
June 2012
-
Y.-J. Joe, A. Iwasaki, M. Kandori, I. Obara, M. Yokoo. Automated equilibrium analysis of repeated games with private monitoring: a POMDP approach. in: Proceedings of AAMAS 2012, June 2012, pp. 4-8.
-
Proceedings of AAMAS 2012
, pp. 4-8
-
-
Joe, Y.-J.1
Iwasaki, A.2
Kandori, M.3
Obara, I.4
Yokoo, M.5
|