-
1
-
-
18144409187
-
Selfish behavior and stability of the internet: a game-theoretic analysis of TCP
-
tech-nologies, architectures, and protocols for computer communications (SIGCOMM 2002:)
-
A. Akella, S. Seshan, R. Karp, S. Shenker, and C. Papadimitriou, "Selfish behavior and stability of the internet: a game-theoretic analysis of TCP," in Pro-ceedings of the 2002 conference on Applications, tech-nologies, architectures, and protocols for computer communications (SIGCOMM 2002:), pp. 117-130, 2002.
-
(2002)
Pro-ceedings of the 2002 conference on Applications
, pp. 117-130
-
-
Akella, A.1
Seshan, S.2
Karp, R.3
Shenker, S.4
Papadimitriou, C.5
-
2
-
-
85048046913
-
A game theoretic ap-proach to decision and analysis in network intrusion detection
-
Piscataway, NJ, USA, Dec
-
T. Alpacan and T. Basar, "A game theoretic ap-proach to decision and analysis in network intrusion detection," in Proceedings of 42rd IEEE Conference on Decision and Control, pp. 1880-1889, Piscataway, NJ, USA, Dec. 2003.
-
(2003)
Proceedings of 42rd IEEE Conference on Decision and Control
, pp. 1880-1889
-
-
Alpacan, T.1
Basar, T.2
-
3
-
-
8744291719
-
A power control game based on outage probabilities for multicell wire-less data networks
-
Piscat-away, NJ, USA, July
-
T. Alpcan, T. Basar, and S. Dey, "A power control game based on outage probabilities for multicell wire-less data networks," in Proceedings of the American Control Conference, vol. 2, pp. 1661-1666, Piscat-away, NJ, USA, July 2004.
-
(2004)
Proceedings of the American Control Conference
, vol.2
, pp. 1661-1666
-
-
Alpcan, T.1
Basar, T.2
Dey, S.3
-
4
-
-
0004048154
-
-
Technical Report, Contract 79F26400, James P. Anderson Co., Fort Washington, Fort Washington, PA
-
J. P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical Report, Contract 79F26400, James P. Anderson Co., Fort Washington, Fort Washington, PA, 1980.
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
5
-
-
15944370066
-
A game based analysis of the client puzzle approach to de-fend against dos attacks
-
Telecommunications and Computer Networks
-
B. Bencsath, I. Vajda, and L. Buttyan, "A game based analysis of the client puzzle approach to de-fend against dos attacks," in Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks, pp. 763-767, 2003.
-
(2003)
Proceedings of the IEEE Conference on Software
, pp. 763-767
-
-
Bencsath, B.1
Vajda, I.2
Buttyan, L.3
-
6
-
-
0023294428
-
An intrusion detection model
-
Piscataway, NJ, USA
-
D. E. Denning, "An intrusion detection model," in IEEE Transactions on Software Engineering, vol. 13, pp. 222-232, Piscataway, NJ, USA, 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.13
, pp. 222-232
-
-
Denning, D.E.1
-
7
-
-
84874892948
-
-
Game Theory. Cambridge, MA: The MIT Press
-
D. Fudenberg and J. Tirole, Game Theory. Cambridge, MA: The MIT Press, 2002.
-
(2002)
-
-
Fudenberg, D.1
Tirole, J.2
-
8
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anoma-lies
-
Y. Huang, W. Fan, W. Lee, and P. S. Yu, "Cross-feature analysis for detecting ad-hoc routing anoma-lies," in Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003:), pp. 478-487, 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003:)
, pp. 478-487
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
9
-
-
84950162203
-
Intrusion detection using mobile agents in wireless ad hoc networks
-
Piscataway, NJ, USA, July
-
O. Kachirski and R. K Guha, "Intrusion detection using mobile agents in wireless ad hoc networks," in Proceedings of the IEEE Workshop on Knowl-edge Media Networking, pp. 153-158, Piscataway, NJ, USA, July 2002.
-
(2002)
Proceedings of the IEEE Workshop on Knowl-edge Media Networking
, pp. 153-158
-
-
Kachirski, O.1
Guha, R.K.2
-
10
-
-
0042474230
-
Detecting network intrusions via sampling: A game theoretic ap-proach
-
Piscataway, NJ, USA, Apr
-
M. Kodialam and T. V. Lakshman, "Detecting net-work intrusions via sampling: A game theoretic ap-proach," in IEEE INFOCOMM 2003, pp. 1880-1889, Piscataway, NJ, USA, Apr. 2003.
-
(2003)
IEEE INFOCOMM 2003
, pp. 1880-1889
-
-
Kodialam, M.1
Lakshman, T.V.2
-
11
-
-
35248851967
-
Flexible, mobile agent based intrusion detection for dynamic networks
-
Distributed Systems Group at the Technical University of Vi-enna, 3rd Floor, Central Entrance, 1040 Vienna, Austria, Apr. 30
-
C. Kruegel and T. Toth, "Flexible, mobile agent based intrusion detection for dynamic networks," Technical Report TUV-1841-2002-27, Distributed Systems Group at the Technical University of Vi-enna, 3rd Floor, Central Entrance, 1040 Vienna, Austria, Apr. 30 2002.
-
(2002)
Technical Report TUV-1841-2002-27
-
-
Kruegel, C.1
Toth, T.2
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile Ad hoc networks
-
New York, NY, USA
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigat-ing routing misbehavior in mobile Ad hoc networks," in Proceedings of the 6th annual international con-ference on Mobile computing and networking (ACM MobiCom 2000: ), pp. 255-265, New York, NY, USA, 2000.
-
(2000)
Proceedings of the 6th annual international con-ference on Mobile computing and networking (ACM MobiCom 2000: ),
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
14
-
-
1842665110
-
Intrusion detection in wireless Ad hoc networks
-
Piscataway, NJ, USA, Feb
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless Ad hoc networks," in IEEE Wireless Communications, vol. 11, pp. 48-60, Pis-cataway, NJ, USA, Feb. 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
15
-
-
84874877890
-
-
A Course in Game Theory. Cambridge, MA: The MIT Press
-
M. J. Osborne and A. Rubinstein, A Course in Game Theory. Cambridge, MA: The MIT Press, 1994.
-
(1994)
-
-
Osborne, M.J.1
Rubinstein, A.2
-
16
-
-
35248836100
-
A modular architecture for distributed IDS inMANET
-
Springer, May
-
R. S. Puttini, J. M. Percher, L. Me, O. Camp, R. T. S. Jnior, C. J. B. Abbas, and L. J. Garca-Villalba, "A modular architecture for distributed IDS inMANET," in Proceedings of the 2003 International Conference on Computational Science and Its Appli-cations (ICCSA), LNCS 2669, pp. 91-113, Springer, May 2003.
-
(2003)
Proceedings of the 2003 International Conference on Computational Science and Its Applications (ICCSA), LNCS 2669
, pp. 91-113
-
-
Puttini, R.S.1
Percher, J.M.2
Me, L.3
Camp, O.4
Jnior, R.T.S.5
Abbas, C.J.B.6
Garca-Villalba, L.J.7
-
17
-
-
0029533860
-
Making greed work in networks: a game-theoretic analysis of switch service disci-plines
-
S. J. Shenker, "Making greed work in networks: a game-theoretic analysis of switch service disci-plines," IEEE/ACM Transactions of Networking, vol. 3, no. 6, pp. 819-831, 1995.
-
(1995)
IEEE/ACM Transactions of Networking
, vol.3
, Issue.6
, pp. 819-831
-
-
Shenker, S.J.1
-
18
-
-
0037885580
-
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile Ad-hoc networks
-
Washington, DC, USA
-
J. Y. L. B. Sonja Buchegger, "Nodes bearing grudges: towards routing security, fairness, and robustness in mobile Ad-hoc networks," in Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, pp. 403-410, Washington, DC, USA, 2002.
-
(2002)
Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Sonja Buchegger, J.Y.L.B.1
-
19
-
-
84952307800
-
Routing anomaly detection in mobile Ad-hoc networks
-
Piscataway, NJ, USA
-
B. Sun, K. Wu, and U. Pooch, "Routing anomaly detection in mobile Ad-hoc networks," in Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 03), pp. 25- 31, Piscataway, NJ, USA, 2003.
-
(2003)
Proceedings of the 12th International Conference on Computer Communications and Networks (ICCCN 03)
-
-
Sun, B.1
Wu, K.2
Pooch, U.3
-
20
-
-
0034546898
-
Intrusion detection in wire-less Ad hoc networks
-
New York, NY, USA
-
Y. Zhang and W. Lee, "Intrusion detection in wire-less Ad hoc networks," in Proceedings of the 6th an-nual international conference on Mobile computing and networking (ACM MOBICOM 2000), pp. 275- 283, New York, NY, USA, 2000.
-
(2000)
Proceedings of the 6th an-nual international conference on Mobile computing and networking (ACM MOBICOM 2000)
-
-
Zhang, Y.1
Lee, W.2
|