메뉴 건너뛰기




Volumn , Issue , 2012, Pages 4965-4969

A game theoretic approach to integrate security with Quality of Service

Author keywords

Game theory; Quality of Security Service (QoSS); Quality of Service (QoS); Service Level Specification (SLS)

Indexed keywords

DIFFERENT SERVICES; GAME-THEORETIC; IEEE 802.11S; NETWORK USERS; PACKET LOSS RATES; QOS PARAMETERS; QOS REQUIREMENTS; QUALITY OF SERVICE PARAMETERS; QUALITY-OF-SECURITY; RUNTIMES; SECURITY PARAMETERS; SERVICE LEVEL AGREEMENTS; SERVICE LEVEL SPECIFICATIONS; SERVICE LEVELS; SERVICE REQUIREMENTS; TUNABLE SECURITY;

EID: 84872003002     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6364011     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 1
    • 0003209840 scopus 로고
    • Integrated services in the internet architecture: An overview
    • Jun.
    • R. Braden, D. Clark, and S. Shenker, "Integrated Services in the Internet Architecture: An Overview," IETF, RFC 1633, Jun. 1994.
    • (1994) IETF, RFC 1633
    • Braden, R.1    Clark, D.2    Shenker, S.3
  • 5
    • 70450277340 scopus 로고    scopus 로고
    • Exploring the security requirements for quality of service in combined wired and wireless networks
    • Leipzig, Germany, Jun.
    • Z. Fadlullah, T. Taleb, N. Nasser, and N. Kato, "Exploring the security requirements for quality of service in combined wired and wireless networks," in Proc. IWCMC'09, Leipzig, Germany, Jun. 2009.
    • (2009) Proc. IWCMC'09
    • Fadlullah, Z.1    Taleb, T.2    Nasser, N.3    Kato, N.4
  • 7
    • 39149117050 scopus 로고    scopus 로고
    • A game-theoretic intrusion detection model for mobile ad hoc networks
    • Mar.
    • H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya, "A game-theoretic intrusion detection model for mobile ad hoc networks," Computer Communications, vol. 31, no. 4, Mar. 2008, pp. 708-721.
    • (2008) Computer Communications , vol.31 , Issue.4 , pp. 708-721
    • Otrok, H.1    Mohammed, N.2    Wang, L.3    Debbabi, M.4    Bhattacharya, P.5
  • 9
    • 70349236493 scopus 로고    scopus 로고
    • A bayesian game approach for intrusion detection in wireless ad hoc networks
    • Pisa, Italy, Oct.
    • Y. Liu, C. Comaniciu, and H. Man, "A bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. ACM GameNets'06, Pisa, Italy, Oct. 2006.
    • (2006) Proc. ACM GameNets'06
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 10
    • 50649099699 scopus 로고    scopus 로고
    • A game theoretic framework of distributed power and rate control in ieee 802.11 wlans
    • Sep.
    • L. Chen and J. Leneutre, "A game theoretic framework of distributed power and rate control in ieee 802.11 wlans," IEEE Journal on Selected Areas in Communications, vo. 26, no. 7, Sep. 2008, pp. 1128-1137.
    • (2008) IEEE Journal on Selected Areas in Communications , vol.26 , Issue.7 , pp. 1128-1137
    • Chen, L.1    Leneutre, J.2
  • 11
    • 34848845258 scopus 로고    scopus 로고
    • Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks
    • Pisa, Italy, Oct.
    • L. Chen and J. Leneutre, "Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks," in Proc. ICDCS'07, Pisa, Italy, Oct. 2007.
    • (2007) Proc. ICDCS'07
    • Chen, L.1    Leneutre, J.2
  • 12
    • 77955771346 scopus 로고    scopus 로고
    • Dtrab: Combating against attacks on encrypted protocols through traffic-feature analysis
    • Aug.
    • Z. M. Fadlullah, T. Taleb, A. Vasilakos, M. Guizani, and N. Kato, "Dtrab: Combating against attacks on encrypted protocols through traffic-feature analysis," IEEE/ACM Transactions on Networking, vol. 18, no. 4, Aug. 2010, pp. 1234-1247.
    • (2010) IEEE/ACM Transactions on Networking , vol.18 , Issue.4 , pp. 1234-1247
    • Fadlullah, Z.M.1    Taleb, T.2    Vasilakos, A.3    Guizani, M.4    Kato, N.5
  • 15
    • 84875379930 scopus 로고    scopus 로고
    • MATLAB, available at: www.mathworks.com
    • MATLAB


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.