-
2
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Commun. ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
3
-
-
42649126015
-
Intrusion detection in homogeneous and heterogeneous wireless sensor networks
-
Jun
-
Y. Wang, X. Wang, B. Xie, D. Wang, and D. P. Agrawal, "Intrusion detection in homogeneous and heterogeneous wireless sensor networks," IEEE Trans. Mobile Comput., vol. 7, no. 6, pp. 698-711, Jun. 2008.
-
(2008)
IEEE Trans. Mobile Comput
, vol.7
, Issue.6
, pp. 698-711
-
-
Wang, Y.1
Wang, X.2
Xie, B.3
Wang, D.4
Agrawal, D.P.5
-
4
-
-
36849062699
-
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
-
DOI 10.1109/MWC.2007.4396943
-
B. Sun, L. Osborne, Y. Xiao, and S. Guizani, "Intrusion detection techniques in mobile ad hoc and wireless sensor networks," IEEE Wireless Commun., vol. 14, no. 5, pp. 56-63, Oct. 2007. (Pubitemid 350231654)
-
(2007)
IEEE Wireless Communications
, vol.14
, Issue.5
, pp. 56-63
-
-
Sun, B.1
Osborne, L.2
Xiao, Y.3
Guizani, S.4
-
5
-
-
84874284297
-
Game theory meets network security and privacy
-
Jul
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Baçsar, and J.-P. Hubaux, "Game theory meets network security and privacy," ACM Comput. Surv., vol. 45, no. 3, pp. 25:1-25:39, Jul. 2013.
-
(2013)
ACM Comput. Surv
, vol.45
, Issue.3
, pp. 251-2539
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Baçsar, T.4
Hubaux, J.-P.5
-
6
-
-
85037175440
-
Wireless sensor network security: A survey
-
Y. Xiao, Ed. Boca Raton, FL, USA CRC Press ch. 16
-
J. P. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," in Security in Distributed, Grid, Mobile, and Pervasive Computing, Y. Xiao, Ed. Boca Raton, FL, USA: CRC Press, 2007, ch. 16, pp. 367-410.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 367-410
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
7
-
-
33746345578
-
Efficient in-network moving object tracking in wireless sensor networks
-
DOI 10.1109/TMC.2006.115, 1644749
-
C.-Y. Lin, W.-C. Peng, and Y.-C. Tseng, "Efficient in-network moving object tracking in wireless sensor networks," IEEE Trans. Mobile Comput., vol. 5, no. 8, pp. 1044-1056, Aug. 2006. (Pubitemid 44109571)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.8
, pp. 1044-1056
-
-
Lin, C.-Y.1
Peng, W.-C.2
Tseng, Y.-C.3
-
8
-
-
33947424408
-
Design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks
-
DOI 10.1109/TPDS.2007.41
-
S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, "Design and analysis of sensing scheduling algorithms under partial coverage for object detection in sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 3, pp. 334-350, Mar. 2007. (Pubitemid 46444100)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.3
, pp. 334-350
-
-
Ren, S.1
Li, Q.2
Wang, H.3
Chen, X.4
Zhang, X.5
-
9
-
-
53249147143
-
A survey of game-theoretic approaches in wireless sensor networks
-
R. Machado and S. Tekinay, "A survey of game-theoretic approaches in wireless sensor networks," Comput. Netw., vol. 52, no. 16, pp. 3047-3061, 2008.
-
(2008)
Comput. Netw
, vol.52
, Issue.16
, pp. 3047-3061
-
-
Machado, R.1
Tekinay, S.2
-
10
-
-
67649521992
-
A game theoretical framework on intrusion detection in heterogeneous networks
-
Jun
-
L. Chen and J. Leneutre, "A game theoretical framework on intrusion detection in heterogeneous networks," IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp. 165-178, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.2
, pp. 165-178
-
-
Chen, L.1
Leneutre, J.2
-
12
-
-
27544432072
-
Detection of denial-of-message attacks on sensor network broadcasts
-
Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
-
J. M. McCune, E. Shi, A. Perrig, and M. K. Reiter, "Detection of denialof-message attacks on sensor network broadcasts," in Proc. IEEE Symp. Security Privacy, May 2005, pp. 64-78. (Pubitemid 41543647)
-
(2005)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 64-78
-
-
McCune, J.M.1
Shi, E.2
Perrig, A.3
Reiter, M.K.4
-
13
-
-
38149061688
-
Preventing dos attacks in wireless sensor networks: A repeated game theory approach
-
A. Agah and S. K. Das, "Preventing dos attacks in wireless sensor networks: A repeated game theory approach," Int. J. Netw. Security, vol. 5, no. 2, pp. 145-153, 2007.
-
(2007)
Int. J. Netw. Security
, vol.5
, Issue.2
, pp. 145-153
-
-
Agah, A.1
Das, S.K.2
-
14
-
-
60649107168
-
A bayesian game approach for intrusion detection in wireless ad hoc networks
-
New York, NY, USA
-
Y. Liu, C. Comaniciu, and H. Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. Workshop Game Theory Commun. Netw., New York, NY, USA, 2006.
-
(2006)
Proc. Workshop Game Theory Commun. Netw
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
15
-
-
80053140894
-
Distributed strategic learning with application to network security
-
Jul
-
Q. Zhu, H. Tembine, and T. Basar, "Distributed strategic learning with application to network security," in Proc. Amer. Control Conf. (ACC), Jul. 2011, pp. 4057-4062.
-
(2011)
Proc. Amer. Control Conf. (ACC
, pp. 4057-4062
-
-
Zhu, Q.1
Tembine, H.2
Basar, T.3
-
16
-
-
14244258931
-
Stochastic games with a single controller and incomplete information
-
D. Rosenberg, E. Solan, and N. Vieille, "Stochastic games with a single controller and incomplete information," SIAM J. Control Optim., vol. 43, no. 1, pp. 86-110, 2004.
-
(2004)
SIAM J. Control Optim
, vol.43
, Issue.1
, pp. 86-110
-
-
Rosenberg, D.1
Solan, E.2
Vieille, N.3
-
17
-
-
79957509569
-
Discounted robust stochastic games and an application to queueing control
-
Mar./Apr
-
E. Kardȩs, F. Ordóñez, and R. W. Hall, "Discounted robust stochastic games and an application to queueing control," Oper. Res., vol. 59, no. 2, pp. 365-382, Mar./Apr. 2011.
-
(2011)
Oper. Res
, vol.59
, Issue.2
, pp. 365-382
-
-
Kardȩs, E.1
Ordóñez, F.2
Hall, R.W.3
-
18
-
-
0000392613
-
Stochastic games
-
L. S. Shapley, "Stochastic games," Proc. Nat. Acad. Sci. United States Amer., vol. 39, no. 10, pp. 1095-1100, 1953.
-
(1953)
Proc. Nat. Acad. Sci. United States Amer
, vol.39
, Issue.10
, pp. 1095-1100
-
-
Shapley, L.S.1
-
19
-
-
84972535636
-
Equilibrium in a stochastic n-person game
-
A. M. Fink, "Equilibrium in a stochastic n-person game," Hiroshima Math. J., vol. 28, no. 1, pp. 89-93, 1964.
-
(1964)
Hiroshima Math. J
, vol.28
, Issue.1
, pp. 89-93
-
-
Fink, A.M.1
-
20
-
-
4344678574
-
Stationary equilibria in stochastic games: Structure, selection, and computation
-
DOI 10.1016/j.jet.2003.10.001, PII S0022053103003417
-
P. Herings and R. J. A. P. Peeters, "Stationary equilibria in stochastic games: Structure, selection, and computation," J. Econ. Theory, vol. 118, no. 1, pp. 32-60, 2004. (Pubitemid 39145867)
-
(2004)
Journal of Economic Theory
, vol.118
, Issue.1
, pp. 32-60
-
-
Herings, P.J.-J.1
Peeters, R.J.A.P.2
-
21
-
-
84905720835
-
Stochastic games and stationary strategies
-
New York, NY, USA: Springer-Verlag
-
O. J. Vrieze, "Stochastic games and stationary strategies," in Stochastic Games and Applications. New York, NY, USA: Springer-Verlag, 2003, pp. 37-50.
-
(2003)
Stochastic Games and Applications
, pp. 37-50
-
-
Vrieze, O.J.1
-
22
-
-
0032207223
-
Robust convex optimization
-
A. Ben-Tal and A. Nemirovski, "Robust convex optimization," Math. Oper. Res., vol. 23, no. 4, pp. 769-805, 1998. (Pubitemid 128508557)
-
(1998)
Mathematics of Operations Research
, vol.23
, Issue.4
, pp. 769-805
-
-
Ben-Tal, A.1
Nemirovski, A.2
-
23
-
-
84863596726
-
-
Englewood Cliffs, NJ, USA Prentice-Hall
-
K. Zhou, J. C. Doyle, and K. Glover, Robust and Optimal Control, vol. 272. Englewood Cliffs, NJ, USA: Prentice-Hall, 1996.
-
(1996)
Robust and Optimal Control
, vol.272
-
-
Zhou, K.1
Doyle, J.C.2
Glover, K.3
-
25
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A survey of key management schemes in wireless sensor networks," Comput. Commun., vol. 30, no. 11, pp. 2314-2341, 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
26
-
-
34247606829
-
Efficient hybrid security mechanisms for heterogeneous sensor networks
-
Jun
-
P. Traynor, R. Kumar, H. Choi, G. Cao, S. Zhu, and T. La Porta, "Efficient hybrid security mechanisms for heterogeneous sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 6, pp. 663-677, Jun. 2007.
-
(2007)
IEEE Trans. Mobile Comput
, vol.6
, Issue.6
, pp. 663-677
-
-
Traynor, P.1
Kumar, R.2
Choi, H.3
Cao, G.4
Zhu, S.5
La Porta, T.6
-
27
-
-
42449117164
-
Guide to intrusion detection and prevention systems (idps
-
Boulder, CO, USA, Tech. Rep. 800-94
-
K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems (IDPS)," Dept. Commerce, NIST, Boulder, CO, USA, Tech. Rep. 800-94, 2007.
-
(2007)
Dept. Commerce, NIST
-
-
Scarfone, K.1
Mell, P.2
-
30
-
-
85149834820
-
Markov games as a framework for multi-agent reinforcement learning
-
M. L. Littman, "Markov games as a framework for multi-agent reinforcement learning," in Proc. Int. Conf. Mach. Learn. (ICML), vol. 94. 1994, pp. 157-163.
-
(1994)
Proc. Int. Conf. Mach. Learn. (ICML
, vol.94
, pp. 157-163
-
-
Littman, M.L.1
-
31
-
-
84881313532
-
On the vital areas of intrusion detection systems in wireless sensor networks
-
Third Quarter
-
A. Abduvaliyev, A.-S. K. Pathan, J. Zhou, R. Roman, and W.-C. Wong, "On the vital areas of intrusion detection systems in wireless sensor networks," IEEE Commun. Surv. Tuts., vol. 15, no. 3, pp. 1223-1237, Third Quarter 2013.
-
(2013)
IEEE Commun. Surv. Tuts
, vol.15
, Issue.3
, pp. 1223-1237
-
-
Abduvaliyev, A.1
Pathan, A.-S.K.2
Zhou, J.3
Roman, R.4
Wong, W.-C.5
-
32
-
-
0003404231
-
-
2nd ed. Stamford, CT, USA Cengage Learning
-
B. W. Kernighan, R. Fourer, and D. M. Gay, AMPL: A Modeling Language for Mathematical Programming, 2nd ed. Stamford, CT, USA: Cengage Learning, 2002.
-
(2002)
AMPL: A Modeling Language for Mathematical Programming
-
-
Kernighan, B.W.1
Fourer, R.2
Gay, D.M.3
-
33
-
-
0033293912
-
Loqo: An interior point code for quadratic programming
-
R. J. Vanderbei, "LOQO: An interior point code for quadratic programming," Optim. Methods Softw., vol. 11, nos. 1-4, pp. 451-484, 1999.
-
(1999)
Optim. Methods Softw
, vol.11
, Issue.1-4
, pp. 451-484
-
-
Vanderbei, R.J.1
-
34
-
-
0032117028
-
The neos server
-
Se
-
J. Czyzyk, M. P. Mesnier, and J. J. Moré, "The NEOS server," IEEE Comput. Sci. Eng., vol. 5, no. 3, pp. 68-75, Sep. 1998.
-
(1998)
IEEE Comput. Sci. Eng
, vol.5
, Issue.3
, pp. 68-75
-
-
Czyzyk, J.1
Mesnier, M.P.2
Moré, J.J.3
-
35
-
-
0000741507
-
Noncooperative stochastic games
-
M. J. Sobel, "Noncooperative stochastic games," Ann. Math. Statist., vol. 42, no. 6, pp. 1930-1935, 1971.
-
(1971)
Ann. Math. Statist
, vol.42
, Issue.6
, pp. 1930-1935
-
-
Sobel, M.J.1
-
36
-
-
34249928324
-
Nonlinear programming and stationary equilibria in stochastic games
-
J. A. Filar, T. A. Schultz, F. Thuijsman, and O. J. Vrieze, "Nonlinear programming and stationary equilibria in stochastic games," Math. Program., vol. 50, nos. 1-3, pp. 227-237, 1991.
-
(1991)
Math. Program
, vol.50
, Issue.1-3
, pp. 227-237
-
-
Filar, J.A.1
Schultz, T.A.2
Thuijsman, F.3
Vrieze, O.J.4
-
37
-
-
25444493818
-
Robust dynamic programming
-
DOI 10.1287/moor.1040.0129
-
G. N. Iyengar, "Robust dynamic programming," Math. Oper. Res., vol. 30, no. 2, pp. 257-280, 2005. (Pubitemid 43126832)
-
(2005)
Mathematics of Operations Research
, vol.30
, Issue.2
, pp. 257-280
-
-
Iyengar, G.N.1
|