-
1
-
-
13844296408
-
Cognitive radio: Brain-empowered wireless communications
-
Haykin, S.: Cognitive radio: brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications 23, 201-220 (2005)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, pp. 201-220
-
-
Haykin, S.1
-
3
-
-
33745648091
-
Next generation/dynamic spectrum access/cognitive radio wireless networks: A survey
-
Akyildiz, I.F., Lee, W.Y., Vuran, M.C., Mohanty, S.: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Computer Networks 50, 2127-2159 (2006)
-
(2006)
Computer Networks
, vol.50
, pp. 2127-2159
-
-
Akyildiz, I.F.1
Lee, W.Y.2
Vuran, M.C.3
Mohanty, S.4
-
5
-
-
70349696172
-
ALDO: An anomaly detection framework for dynamic spectrum access networks
-
Liu, S., Chen, Y., Trappe, W., Greenstein, L.J.: ALDO: An anomaly detection framework for dynamic spectrum access networks. In: INFOCOM 2009, pp. 675-683 (2009)
-
(2009)
INFOCOM 2009
, pp. 675-683
-
-
Liu, S.1
Chen, Y.2
Trappe, W.3
Greenstein, L.J.4
-
8
-
-
33847674846
-
On the energy detection of unknown signals over fading channels
-
Digham, F.F., Alouini, M.S., Simon, M.K.: On the energy detection of unknown signals over fading channels. IEEE Transactions on Communications 55, 21-24 (2007)
-
(2007)
IEEE Transactions on Communications
, vol.55
, pp. 21-24
-
-
Digham, F.F.1
Alouini, M.S.2
Simon, M.K.3
-
9
-
-
51749122504
-
Energy detection of unknown deterministic signals
-
Urkowitz, H.: Energy detection of unknown deterministic signals. Proceedings of the IEEE 55, 523-531 (1967)
-
(1967)
Proceedings of the IEEE
, vol.55
, pp. 523-531
-
-
Urkowitz, H.1
-
10
-
-
85184305615
-
Dependence of Optimal Monitoring Strategy on the Application to be Protected
-
Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of Optimal Monitoring Strategy on the Application to be Protected. In: IEEE GlobeCom 2012, pp. 1072-1077 (2012)
-
(2012)
IEEE GlobeCom 2012
, pp. 1072-1077
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
11
-
-
84890827106
-
Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments
-
Garnaev, A., Trappe, W., Kung, C.-T.: Optimizing Scanning Strategies: Selecting Scanning Bandwidth in Adversarial RF Environments. In: Crowncom 2013 (2013)
-
(2013)
Crowncom 2013
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
12
-
-
60649107168
-
A Bayesian game approach for intrusion detection in wireless Ad Hoc networks
-
Liu, Y., Comaniciu, C., Man, H.: A Bayesian game approach for intrusion detection in wireless Ad Hoc networks. In: GameNets 2006 (2006)
-
(2006)
GameNets 2006
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
13
-
-
18844454790
-
Intrusion detection in sensor networks: A non-cooperative game approach
-
Agah, A., Das, S.K., Basu, K., Asadi, M.: Intrusion detection in sensor networks: A non-cooperative game approach. In: NCA 2004, pp. 343-346 (2004)
-
(2004)
NCA 2004
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
14
-
-
0039630450
-
Remark on the Princess and Monster Search Game
-
Garnaev, A.: Remark on the Princess and Monster Search Game. International Journal of Game Theory 20, 269-276 (1992)
-
(1992)
International Journal of Game Theory
, vol.20
, pp. 269-276
-
-
Garnaev, A.1
-
15
-
-
0031494003
-
On the Infiltration Game
-
Garnaev, A., Garnaeva, G., Goutal, P.: On the Infiltration Game. International Journal of Game Theory 26, 215-221 (1997)
-
(1997)
International Journal of Game Theory
, vol.26
, pp. 215-221
-
-
Garnaev, A.1
Garnaeva, G.2
Goutal, P.3
-
16
-
-
84874284297
-
Game theory meets network security and privacy
-
Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.-P.: Game theory meets network security and privacy. J. ACM Computing Survey 453 (2013)
-
(2013)
J. ACM Computing Survey
, pp. 453
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.-P.5
-
17
-
-
0004260006
-
-
W.B. Sanders, Philadelphia
-
Owen, G.: Game Theory. W.B. Sanders, Philadelphia (1982)
-
(1982)
Game Theory
-
-
Owen, G.1
-
18
-
-
84856969548
-
Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach
-
Zhu, Q., Saad, W., Han, Z., Poor, H.V., Basar, T.: Eavesdropping and Jamming in Next-Generation Wireless Networks: A Game-Theoretic Approach. In: MILCOM 2011, pp. 119-124 (2011)
-
(2011)
MILCOM 2011
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Basar, T.5
-
19
-
-
77955905862
-
Taxation for green communication
-
Altman, E., Avrachenkov, K., Garnaev, A.: Taxation for green communication. In: WiOpt 2010, pp. 108-112 (2010)
-
(2010)
WiOpt 2010
, pp. 108-112
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
20
-
-
63749110244
-
A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access
-
Sagduyu, Y.E., Ephremides, A.: A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access. Journal of Wireless Networks 15, 651-666 (2009)
-
(2009)
Journal of Wireless Networks
, vol.15
, pp. 651-666
-
-
Sagduyu, Y.E.1
Ephremides, A.2
-
21
-
-
84869597150
-
Jamming Game in a Dynamic Slotted ALOHA Network
-
Jain, R., Kannan, R. (eds.) GameNets 2011. Springer, Heidelberg
-
Garnaev, A., Hayel, Y., Altman, E., Avrachenkov, K.: Jamming Game in a Dynamic Slotted ALOHA Network. In: Jain, R., Kannan, R. (eds.) GameNets 2011. LNICST, vol. 75, pp. 429-443. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.75
, pp. 429-443
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
Avrachenkov, K.4
-
22
-
-
0031161887
-
On a Ruckle problem in discrete games of ambush
-
Garnaev, A.: On a Ruckle problem in discrete games of ambush. Naval Research Logistics 44, 353-364 (1997)
-
(1997)
Naval Research Logistics
, vol.44
, pp. 353-364
-
-
Garnaev, A.1
-
23
-
-
70349996104
-
Jamming in Wireless Networks: The Case of Several Jammers
-
Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in Wireless Networks: the Case of Several Jammers. In: GameNets 2009, pp. 585-592 (2009)
-
(2009)
GameNets 2009
, pp. 585-592
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
24
-
-
63449130855
-
Transmission Power Control Game with SINR as Objective Function
-
Altman, E., Chaintreau, A. (eds.) NETCOOP 2008. Springer, Heidelberg
-
Altman, E., Avrachenkov, K., Garnaev, A.: Transmission Power Control Game with SINR as Objective Function. In: Altman, E., Chaintreau, A. (eds.) NETCOOP 2008. LNCS, vol. 5425, pp. 112-120. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5425
, pp. 112-120
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
25
-
-
34047222940
-
Combined power control and transmission rate selection in cellular networks
-
Kim, S.L., Rosberg, Z., Zander, J.: Combined power control and transmission rate selection in cellular networks. In: IEEE VTC 1999, pp. 1653-1657 (1999)
-
(1999)
IEEE VTC 1999
, pp. 1653-1657
-
-
Kim, S.L.1
Rosberg, Z.2
Zander, J.3
-
26
-
-
0032658512
-
Analysis of Erlang capacity for the multimedia DS-CDMA systems
-
Koo, I., Ahn, J., Lee, H.A., Kim, K.: Analysis of Erlang capacity for the multimedia DS-CDMA systems. IEICE Trans. Fundamentals E82-A(5), 849-855 (1999)
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A
, Issue.5
, pp. 849-855
-
-
Koo, I.1
Ahn, J.2
Lee, H.A.3
Kim, K.4
-
27
-
-
79958178271
-
Closed Form Solutions for Water-Filling Problem in Optimization and Game Frameworks
-
Altman, E., Avrachenkov, K., Garnaev, A.: Closed Form Solutions for Water-Filling Problem in Optimization and Game Frameworks. Telecommunication Systems Journal 47, 153-164 (2011)
-
(2011)
Telecommunication Systems Journal
, vol.47
, pp. 153-164
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
28
-
-
33751087288
-
-
Springer, Heidelberg
-
Comaniciu, C., Mandayam, N.B., Poor, H.V.: Wireless Networks Multiuser Detection in Cross-Layer Design. Springer, Heidelberg (2005)
-
(2005)
Wireless Networks Multiuser Detection in Cross-Layer Design
-
-
Comaniciu, C.1
Mandayam, N.B.2
Poor, H.V.3
|