-
3
-
-
84863386481
-
A survey of cyber crimes
-
Apr
-
Y. Zhang, Y. Xiao, K. Ghaboosi, J. Zhang, and H. Deng, "A Survey of Cyber Crimes," (Wiley Journal of) Security and Communication Networks, Vol. 5, No. 4, pp. 422-437, Apr. 2012.
-
(2012)
Wiley Journal of Security and Communication Networks
, vol.5
, Issue.4
, pp. 422-437
-
-
Zhang, Y.1
Xiao, Y.2
Ghaboosi, K.3
Zhang, J.4
Deng, H.5
-
5
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
WeA05.6, 2004 43rd IEEE Conference on Decision and Control (CDC)
-
T. Alpcan and T. Baser, "A game theoretic analysis of intrusion detection in access control systems," Proc. 43rd IEEE Conference on Decision and Control, Vol. 2, pp. 1568-1573,2004. (Pubitemid 40291179)
-
(2004)
Proceedings of the IEEE Conference on Decision and Control
, vol.2
, pp. 1568-1573
-
-
Alpcan, T.1
Basar, T.2
-
6
-
-
39649111300
-
Intrusion response as a resource allocation problem
-
4177356, Proceedings of the 45th IEEE Conference on Decision and Control 2006, CDC
-
M. Bloem, T. Alpcan, and T. Basar, "Intrusion response as a resource allocation problem,". IEEE Conference on Descision and Control, pp. 6283-6288, 2006. (Pubitemid 351283649)
-
(2006)
Proceedings of the IEEE Conference on Decision and Control
, pp. 6283-6288
-
-
Bloem, M.1
Alpcan, T.2
Basar, T.3
-
7
-
-
34548314598
-
Optimal jamming attacks and network defense policies in wireless sensor networks
-
DOI 10.1109/INFCOM.2007.155, 4215737, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," In Proc. IEEE International Conference on Computer Communications (INFOCOM), pp. 1307 - 1315, 2007. (Pubitemid 47334355)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1307-1315
-
-
Li, M.1
Koutsopoulos, I.2
Poovendran, R.3
-
9
-
-
52449084729
-
The role of game theory in information warfare
-
S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, "The role of game theory in information warfare," Proc. 4th information survivability workshop (ISW-2001/2002), 2002. Available: http://www.cert.org/research/isw/ isw2001/papers/index.html.
-
(2002)
Proc. 4th Information Survivability Workshop (ISW-2001/2002)
-
-
Hamilton, S.N.1
Miller, W.L.2
Ott, A.3
Saydjari, O.S.4
-
11
-
-
79951501558
-
A game theoretical attack-defense model oriented to network security risk assessment
-
W. He, C. Xia, H. Wang, C. Zheng, and Y. Ji, "A game theoretical attack-defense model oriented to network security risk assessment," 2008 International Conference on Computer Science and Software Engineering, pp. 498 - 504, 2008.
-
(2008)
2008 International Conference on Computer Science and Software Engineering
, pp. 498-504
-
-
He, W.1
Xia, C.2
Wang, H.3
Zheng, C.4
Ji, Y.5
-
12
-
-
0004260006
-
-
Academic Press, 3rd edition
-
G. Owen, Game Theory. Academic Press, 3rd edition, 2001.
-
(2001)
Game Theory.
-
-
Owen, G.1
-
16
-
-
15944395410
-
A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
-
464, Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
-
A. Patcha and J. Park, "A game theoretic approach to modeling intrusion detection in mobile ad hoc networks," Proc. 2004 IEEE workshop on Information Assurance and Security, pp. 280 - 284, 2004. (Pubitemid 40442803)
-
(2004)
Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
, pp. 280-284
-
-
Patcha, A.1
Park, J.-M.2
-
17
-
-
77951754388
-
Modelling information warfare as a game
-
J. Jormakka and J. V. E. Molsa, "Modelling information warfare as a game," Journal of Information Warfare, Vol. 4(2), pp. 12-25, 2005.
-
(2005)
Journal of Information Warfare
, vol.4
, Issue.2
, pp. 12-25
-
-
Jormakka, J.1
Molsa, J.V.E.2
-
19
-
-
67649521992
-
A game theoreticcal framework on intrusion detection in heterogeneous networks
-
June
-
L. Chen and J. Leneutre, "A game theoreticcal framework on intrusion detection in heterogeneous networks," IEEE Trans. Inf. Forens. Security, Vol. 4, No. 2, pp. 165-178, June 2009.
-
(2009)
IEEE Trans. Inf. Forens. Security
, vol.4
, Issue.2
, pp. 165-178
-
-
Chen, L.1
Leneutre, J.2
-
20
-
-
76949106169
-
A Puzzle-based defense strategy against flooding attacks using game theory
-
M. Fallah, "A Puzzle-based defense strategy against flooding attacks using game theory," IEEE Transactions on Dependable and Secure Computing, Vol. 7, No. 1, pp. 5-19, 2010.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 5-19
-
-
Fallah, M.1
-
21
-
-
14844293542
-
Game strategies in network security
-
DOI 10.1007/s10207-004-0060-x
-
K. Lye and J. Wing, "Game strategies in network security," International Journal of Information Security, Vol. 4, No. 1-2, pp. 71-86, 2005. (Pubitemid 40347202)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 71-86
-
-
Lye, K.-W.1
Wing, J.M.2
-
22
-
-
79951507952
-
A markov game theory-based risk assessment model for network information systems
-
C. Xiaolin, T. Xiaobin, Z. Yong, and X. Hongsheng, "A markov game theory-based risk assessment model for network information systems," International conference on computer science and software engineering, Vol. 3, pp. 57-61, 2008.
-
(2008)
International Conference on Computer Science and Software Engineering
, vol.3
, pp. 57-61
-
-
Xiaolin, C.1
Xiaobin, T.2
Yong, Z.3
Hongsheng, X.4
-
23
-
-
70449485072
-
Security games with incomplete information
-
Dresden, Germany, June
-
K. C. Nguyen, T. Alpcan, and T. Basar, "Security Games with Incomplete Information," Proc. 2009 IEEE International Conference on Communications (ICC 2009), Dresden, Germany, pp. 1-6, June 2009.
-
(2009)
Proc. 2009 IEEE International Conference on Communications (ICC 2009)
, pp. 1-6
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
25
-
-
49949092806
-
Cybersecurity strategies: The QuERIES methodology
-
L. Carin, G. Cybenko, and J. Hughes, "Cybersecurity strategies: the QuERIES methodology," IEEE Computer, Vol. 41, Issue 8, pp. 20-26, 2008.
-
(2008)
IEEE Computer
, vol.41
, Issue.8
, pp. 20-26
-
-
Carin, L.1
Cybenko, G.2
Hughes, J.3
-
26
-
-
60449090394
-
On stochastic modeling for integrated security and dependability evaluation
-
September
-
K. Sallhammar, B. Helvik, and S. Knapskog, "On stochastic modeling for integrated security and dependability evaluation," Journal of Networks, Vol. 1, No. 5, pp. 31-42, September 2006.
-
(2006)
Journal of Networks
, vol.1
, Issue.5
, pp. 31-42
-
-
Sallhammar, K.1
Helvik, B.2
Knapskog, S.3
-
27
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
DOI 10.1109/TDSC.2004.2
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Trans. Dependable Secure Computing, Vol. 1, Issue 1, pp. 11-33, January-March 2004. (Pubitemid 40134576)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
28
-
-
0014873273
-
Markov approach to finding failure times of repairable systems
-
November
-
John A. Buzacot, "Markov approach to finding failure times of repairable systems" IEEE Trans. Reliab., Vol. R-19, Issue 4, pp. 128- 134, November 1970.
-
(1970)
IEEE Trans. Reliab.
, vol.19
, Issue.4
, pp. 128-134
-
-
Buzacot John, A.1
-
29
-
-
33947173819
-
Using stochastic game theory to compute the expected behavior of attackers
-
1619988, Proceedings - 2005 Symposium on Applications and the Internet Workshops, SAINT2005
-
K. Sallhammar, S. Knapskog, and B. Helvik, "Using stochastic game theory to compute the expected behavior of attackers," In Proc. 2005 International Symposiu on Applications and the Internet Workshops (Saint2005), pp. 102-105, 2005. (Pubitemid 46402089)
-
(2005)
Proceedings - 2005 Symposium on Applications and the Internet Workshops, SAINT2005
, vol.2005
, pp. 102-105
-
-
Sallhammar, K.1
Knapskog, S.J.2
Helvik, B.E.3
-
30
-
-
33750944742
-
Towards a stochastic model for integrated security and dependability evaluation
-
K. Sallhammar, B. Helvik, and S. Knapskog, "Towards a stochastic model for integrated security and dependability evaluation," In Proc. First International Conference on Availability, Reliability and Security (AReS), 2006. Available: http://www.sis.pitt.edu/?dtipper/3957/Paper11.pdf.
-
(2006)
Proc. First International Conference on Availability, Reliability and Security (AReS)
-
-
Sallhammar, K.1
Helvik, B.2
Knapskog, S.3
-
31
-
-
51349132716
-
Stochastic game theoretic method of quantification for network situational awareness
-
H. Wang, Y. Liang, and X. Liu, "Stochastic game theoretic method of quantification for network situational awareness," In Proc. 2008 International Conference on Internet Computing in Science and Engineering, pp. 312-316, 2008.
-
(2008)
Proc. 2008 International Conference on Internet Computing in Science and Engineering
, pp. 312-316
-
-
Wang, H.1
Liang, Y.2
Liu, X.3
-
32
-
-
77951729734
-
A survey of game theory as applied to network security
-
S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya and O. Wu, "A survey of game theory as applied to network security," In Proc. 43rd Hawaii International Conference on System Science, pp. 1-10, 2010.
-
(2010)
Proc. 43rd Hawaii International Conference on System Science
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, O.6
-
33
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
DOI 10.1145/1053283.1053288
-
P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," ACM Trans. Information and System Security (TISSEC), Vol. 8, Issue 1, pp. 78-118, 2005. (Pubitemid 40479430)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
35
-
-
0000392613
-
Stochastic games
-
L. Shapley, "Stochastic games," Proc. National Academy of Science USA, Vol. 39, Issue 10, pp, 1095-1100.
-
Proc. National Academy of Science USA
, vol.39
, Issue.10
, pp. 1095-1100
-
-
Shapley, L.1
-
36
-
-
70350000208
-
Stochastic games for security in networks with interdependent nodes
-
K. C. Nguyen, T. Alpcan, and T. Basar, "Stochastic games for security in networks with interdependent nodes," Proc. Intl. Conf. on Game Theory for Networks (GameNets), pp. 697-703, 2009.
-
(2009)
Proc. Intl. Conf. on Game Theory for Networks (GameNets)
, pp. 697-703
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
37
-
-
57849124412
-
A framework for predicting security and dependability measure in real-time
-
March
-
K. Sallhammar, B. Helvik, and S. Knapskog, "A framework for predicting security and dependability measure in real-time," International Journal of Computer Science and Network Security, Vol. 7 No. 3, pp. 169-183, March 2007.
-
(2007)
International Journal of Computer Science and Network Security
, vol.7
, Issue.3
, pp. 169-183
-
-
Sallhammar, K.1
Helvik, B.2
Knapskog, S.3
-
39
-
-
70449485072
-
Security games with incomplete information
-
K. C. Nguyen, T. Alpcan, and T. Basar, "Security games with incomplete information," Proc. IEEE Intl. Conf. on Communications (ICC), pp. 1-6, 2009.
-
(2009)
Proc. IEEE Intl. Conf. on Communications (ICC)
, pp. 1-6
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
41
-
-
21344494344
-
How to analyse the results of linear program- part 3: Infeasibility diagnoses
-
H. Greenberg.,"How to analyse the results of linear program- part 3: infeasibility diagnoses," interfaces, Vol. 23, No. 6, pp. 120-139, 1993.
-
(1993)
Interfaces
, vol.23
, Issue.6
, pp. 120-139
-
-
Greenberg, H.1
-
42
-
-
84857756899
-
Game theory based network security
-
Y. Luo, F. Szidarovszky, Y. Al-Nashif, and S. Hariri, "Game Theory Based Network Security," Journal of Information Security, Vol. 1, pp. 41-44, 2010.
-
(2010)
Journal of Information Security
, vol.1
, pp. 41-44
-
-
Luo, Y.1
Szidarovszky, F.2
Al-Nashif, Y.3
Hariri, S.4
-
43
-
-
77954531996
-
Coalitional game theory for security risk management
-
W. Saad, T. Alpcan, T. Basar and A. Hjørungnes, "Coalitional game theory for security risk management," In Proc. 5th Intl. Conf. on Internet Monitoring and Protection, pp. 35-40, 2010.
-
(2010)
Proc. 5th Intl. Conf. on Internet Monitoring and Protection
, pp. 35-40
-
-
Saad, W.1
Alpcan, T.2
Basar, T.3
Hjørungnes, A.4
-
46
-
-
57349198694
-
Secure or insure? A gametheoretic analysis of information security games
-
J. Grossklags, N. Christin, and J. Chuang, "Secure or insure? A gametheoretic analysis of information security games," In Proc. 2008 World Wide Web Conference (WWW'08), pp. 209-218, 2008.
-
(2008)
Proc. 2008 World Wide Web Conference (WWW'08)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
47
-
-
79955481246
-
How bad are selfish Investments in network security?
-
L. Jiang and V. Anantharam, "How bad are selfish Investments in network security?" IEEE/ACM Trans. Netw., Vol. 19, No. 2, pp. 549- 560, 2011.
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.2
, pp. 549-560
-
-
Jiang, L.1
Anantharam, V.2
-
48
-
-
80051717392
-
Jamming games in wireless networks with incomplete information
-
Y. Sagduyu, R. Berry and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Commun. Mag., Vol. 49, Issue 8, pp. 112-118, 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.8
, pp. 112-118
-
-
Sagduyu, Y.1
Berry, R.2
Ephremides, A.3
-
49
-
-
16244381482
-
Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
-
DOI 10.1109/TAC.2005.843878
-
J. S. Shamma and G. Arslan, "Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria," IEEE Trans. Autom. Control, Vol. 50, No. 3, pp. 312-327, Mar. 2005. (Pubitemid 40448583)
-
(2005)
IEEE Transactions on Automatic Control
, vol.50
, Issue.3
, pp. 312-327
-
-
Shamma, J.S.1
Arslan, G.2
-
51
-
-
84867441658
-
Editorial
-
H. Chen and B. Sun, "Editorial," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 65-66.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 65-66
-
-
Chen, H.1
Sun, B.2
-
52
-
-
84857178198
-
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
-
M. Barua, X. Liang, R. Lu, X. Shen, "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing, " International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 67-76.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 67-76
-
-
Barua, M.1
Liang, X.2
Lu, R.3
Shen, X.4
-
53
-
-
84857174454
-
A three dimensional sender anonymity metric
-
N. Jaggi, U. M. Reddy, and R. Bagai, "A Three Dimensional Sender Anonymity Metric," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 77-89.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 77-89
-
-
Jaggi, N.1
Reddy, U.M.2
Bagai, R.3
-
54
-
-
84857155268
-
Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks
-
M. J. Sharma and V. C. M. Leung, "Improved IP Multimedia Subsystem Authentication Mechanism for 3G-WLAN Networks," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 90-100.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 90-100
-
-
Sharma, M.J.1
Leung, V.C.M.2
-
55
-
-
84857145254
-
Rendezvous based trust propagation to enhance distributed network security
-
N. Cheng, K. Govindan, and P. Mohapatra, "Rendezvous Based Trust Propagation to Enhance Distributed Network Security," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 101-111.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 101-111
-
-
Cheng, N.1
Govindan, K.2
Mohapatra, P.3
-
56
-
-
84857173760
-
A source authentication scheme using network coding
-
A. Fathy, T. ElBatt, and M. Youssef, "A Source Authentication Scheme Using Network Coding," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 112-122.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 112-122
-
-
Fathy, A.1
Elbatt, T.2
Youssef, M.3
-
57
-
-
84863152521
-
Hidden information in microsoft word
-
L. Liu, Y. Xiao, J. Zhang, A. Faulkner, and K. Weber, "Hidden Information in Microsoft Word," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 123-135.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 123-135
-
-
Liu, L.1
Xiao, Y.2
Zhang, J.3
Faulkner, A.4
Weber, K.5
-
58
-
-
84857150179
-
Exclusion-intersection encryption
-
S. S.M. Chow and S. Yiu, "Exclusion-Intersection Encryption," International Journal of Security and Networks, Vol. 6 Nos. 2/3, 2011, pp. 136-146.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 136-146
-
-
Chow, S.S.M.1
Yiu, S.2
-
59
-
-
84857163085
-
Partial iris recognition as a viable biometric scheme
-
D. Walker and S. Latifi, "Partial Iris Recognition as a Viable Biometric Scheme," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 147-152.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 147-152
-
-
Walker, D.1
Latifi, S.2
-
60
-
-
84857177856
-
Edustega: An education-centric steganography methodology
-
A. Desoky, "Edustega: An Education-Centric Steganography Methodology," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 153-173.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 153-173
-
-
Desoky, A.1
-
61
-
-
84857176805
-
An intrusion detection technique based on continuous binary communication channels
-
N. Ampah, C. Akujuobi, S. Alam, and M. Sadiku, "An intrusion detection technique based on continuous binary communication channels," International Journal of Security and Networks, Vol. 6 Nos. 2-3, 2011, pp. 174-180.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.2-3
, pp. 174-180
-
-
Ampah, N.1
Akujuobi, C.2
Alam, S.3
Sadiku, M.4
-
62
-
-
84857204654
-
Is that you? Authentication in a network without identities
-
T. Choi, H.B. Acharya, and M. G. Gouda, "Is that you? Authentication in a network without identities," International Journal of Security and Networks, Vol. 6 No. 4, 2011, pp. 181-190.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
, pp. 181-190
-
-
Choi, T.1
Acharya, H.B.2
Gouda, M.G.3
-
63
-
-
84857202234
-
On the (in) security of two Joint Encryption and Error Correction schemes
-
Q. Chai and G. Gong, "On the (in) security of two Joint Encryption and Error Correction schemes," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 191 - 200.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
, pp. 191-200
-
-
Chai, Q.1
Gong, G.2
-
64
-
-
84863170280
-
An epidemic model with adaptive virus spread control for Wireless Sensor Networks
-
S. Tang and W. Li, "An epidemic model with adaptive virus spread control for Wireless Sensor Networks," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 201 - 210.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
, pp. 201-210
-
-
Tang, S.1
Li, W.2
-
65
-
-
84857206460
-
KL-sense secure image steganography
-
G. Luo and K.P. Subbalakshmi, "KL-sense secure image steganography," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 211 - 225.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
, pp. 211-225
-
-
Luo, G.1
Subbalakshmi, K.P.2
-
66
-
-
84863150088
-
Friendship-based location privacy in Mobile Social Networks
-
W. Chang, J. Wu, and C. C. Tan, "Friendship-based location privacy in Mobile Social Networks," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 226 - 236.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
, pp. 226-236
-
-
Chang, W.1
Wu, J.2
Tan, C.C.3
-
67
-
-
84863152158
-
Authenticating strangers in Online Social Networks
-
X. Zhao, L. Li, and G. Xue, "Authenticating strangers in Online Social Networks," International Journal of Security and Networks, Vol. 6, No. 4, 2011, pp. 237 - 248.
-
(2011)
International Journal of Security and Networks
, vol.6
, Issue.4
, pp. 237-248
-
-
Zhao, X.1
Li, L.2
Xue, G.3
-
68
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
DOI 10.1109/TVT.2006.874579
-
B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Trans. Veh. Technol., Vol. 55, No. 4, July 2006, pp.1385-1396. (Pubitemid 44111432)
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.4
, pp. 1385-1396
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
69
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
DOI 10.1109/MWC.2007.4396943
-
B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion Detection Techniques in Mobile Ad Hoc and Wireless Sensor Networks," IEEE Wireless Commun. Mag., Special Issue on Security in Wireless Mobile Ad Hoc and Sensor Networks, Oct. 2007, pp. 56-63. (Pubitemid 350231654)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
-
70
-
-
34250761381
-
Integration of mobility and intrusion detection for wireless ad hoc networks
-
DOI 10.1002/dac.853
-
B. Sun, K. Wu, Y. Xiao, and R. Wang, "Integration of mobility and intrusion detection for wireless Ad Hoc networks," (Wiley) International Journal of Communication Systems, Vol. 20, No. 6, pp. 695-721, Jun. 2007. (Pubitemid 46959707)
-
(2007)
International Journal of Communication Systems
, vol.20
, Issue.6
, pp. 695-721
-
-
Sun, B.1
Wu, K.2
Xiao, Y.3
Wang, R.4
-
71
-
-
36749008467
-
Detection of fraudulent usage in wireless networks
-
DOI 10.1109/TVT.2007.901875
-
B. Sun, Y. Xiao, and R. Wang, "Detection of Fraudulent Usage in Wireless Networks," IEEE Trans. Veh. Technol., Vol. 56, No.6, Nov. 2007, pp. 3912 - 3923. (Pubitemid 350201083)
-
(2007)
IEEE Transactions on Vehicular Technology
, vol.56
, Issue.II6
, pp. 3912-3923
-
-
Sun, B.1
Xiao, Y.2
Wang, R.3
-
72
-
-
84873692516
-
-
Wireless Network Security, Springer, ISBN-10 0-387- 28040-5, ISBN-13 978-0-387-28040-5, Chapter 8
-
B. Sun, Y. Xiao, and K. Wu, "Intrusion Detection in Cellular Mobile Networks," Wireless Network Security, Springer, 2007, ISBN-10 0-387- 28040-5, ISBN-13 978-0-387-28040-5, Chapter 8, pp. 183-210.
-
(2007)
Intrusion Detection in Cellular Mobile Networks
, pp. 183-210
-
-
Sun, B.1
Xiao, Y.2
Wu, K.3
-
73
-
-
55349125312
-
Vertical and horizontal synchronization services with outlier detection in underwater sensor networks
-
John Wiley & Sons, Nov
-
F. Hu, Y. Malkawi, S. Kumar, and Y. Xiao, "Vertical and Horizontal Synchronization Services with Outlier Detection in Underwater Sensor Networks," (Wiley) Wireless Communications and Mobile Computing (WCMC), John Wiley & Sons, Vol. 8, No. 9, Nov. 2008, pp. 1165 - 1181.
-
(2008)
(Wiley) Wireless Communications and Mobile Computing (WCMC)
, vol.8
, Issue.9
, pp. 1165-1181
-
-
Hu, F.1
Malkawi, Y.2
Kumar, S.3
Xiao, Y.4
-
76
-
-
50949124171
-
Enhancing security using calling activity for wireless networks
-
B. Sun, Y. Xiao, R. Wang, and S. Guizani, "Enhancing Security using Calling Activity for Wireless Networks," Proc. GLOBECOM 2006.
-
(2006)
Proc. GLOBECOM
-
-
Sun, B.1
Xiao, Y.2
Wang, R.3
Guizani, S.4
-
77
-
-
39349092398
-
Change-point monitoring for secure in-network aggregation in wireless sensor networks
-
DOI 10.1109/GLOCOM.2007.180, 4411090, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings
-
B. Sun, N. Chand, K. Wu, and Y. Xiao, "Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks," Proc. IEEE GLOBECOM 2007, pp. 936-940. (Pubitemid 351259168)
-
(2007)
GLOBECOM - IEEE Global Telecommunications Conference
, pp. 936-940
-
-
Sun, B.1
Chand, N.2
Wu, K.3
Xiao, Y.4
-
78
-
-
38549091210
-
Integration of secure in-network aggregation and system monitoring for Wireless Sensor Networks
-
DOI 10.1109/ICC.2007.246, 4288917, 2007 IEEE International Conference on Communications, ICC'07
-
B. Sun, X. Jin, K. Wu, and Y. Xiao, "Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks," Proc. IEEE ICC 2007, pp. 1466- 1471. (Pubitemid 351145742)
-
(2007)
IEEE International Conference on Communications
, pp. 1466-1471
-
-
Sun, B.1
Jin, X.2
Wu, K.3
Xiao, Y.4
-
79
-
-
76349095151
-
Bio-inspired true coalition formation on intrusion detection by mobile robots
-
X. Liang and Y. Xiao, "Bio-inspired True Coalition Formation on Intrusion Detection by Mobile Robots," Proc. CollaborateCom09.
-
Proc. CollaborateCom09
-
-
Liang, X.1
Xiao, Y.2
-
80
-
-
77952582720
-
Studying bio-inspired coalition formation of robots for detecting intrusions using game theory
-
June
-
X. Liang and Y Xiao, "Studying Bio-inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory," IEEE Trans. Syst. Man Cybern., Part B, Special Issue on Game Theory, Vol. 40, No. 3, June 2010, pp. 683-693.
-
(2010)
IEEE Trans. Syst. Man Cybern., Part B, Special Issue on Game Theory
, vol.40
, Issue.3
, pp. 683-693
-
-
Liang, X.1
Xiao, Y.2
|