-
2
-
-
47949132863
-
Adaptive markov game theoretic data fusion approach for cyber network defense
-
D. Shen, G. Chen, E. Blasch, G. Tadda, "Adaptive Markov Game Theoretic Data Fusion Approach for Cyber Network Defense," Proc. IEEE Military Communications Conference (MILCOM), 2007.
-
(2007)
Proc. IEEE Military Communications Conference (MILCOM)
-
-
Shen, D.1
Chen, G.2
Blasch, E.3
Tadda, G.4
-
3
-
-
50149100504
-
Game theoretic approach to threat prediction and situation awareness
-
G. Chen, D. Shen, C. Kwan, J.B. Cruz, M. Kruger, E. Blasch, "Game Theoretic Approach to Threat Prediction and Situation Awareness," Journal of Advances in Information Fusion, Vol. 2, No. 1, pp. 35-48, 2007.
-
(2007)
Journal of Advances in Information Fusion
, vol.2
, Issue.1
, pp. 35-48
-
-
Chen, G.1
Shen, D.2
Kwan, C.3
Cruz, J.B.4
Kruger, M.5
Blasch, E.6
-
4
-
-
79951507952
-
A markov game theory-based risk assessment model for network information system
-
C. Xiaolin, T. Xiaobin, Z. Yong, X. Hongsheng, "A Markov Game Theory-based Risk Assessment Model for Network Information System," Proc. International Conference on Computer Science and Software Engineering, 1057-1061, 2008.
-
(2008)
Proc. International Conference on Computer Science and Software Engineering
, pp. 1057-1061
-
-
Xiaolin, C.1
Xiaobin, T.2
Yong, Z.3
Hongsheng, X.4
-
5
-
-
84873968328
-
On the connection between leakage tolerance and adaptive security
-
Nara, Japan
-
J. B. Nielsen, D. Venturi, A. Zottarel, "On the Connection between Leakage Tolerance and Adaptive Security," Proc. International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, 2013.
-
(2013)
Proc. International Conference on Practice and Theory in Public-Key Cryptography
-
-
Nielsen, J.B.1
Venturi, D.2
Zottarel, A.3
-
7
-
-
84906998569
-
Node capture games: A game theoretic approach to modeling and mitigating node capture attacks
-
Maryland, USA
-
T. Bonaci, L. Bushnell, "Node Capture Games: A Game Theoretic Approach to Modeling and Mitigating Node Capture Attacks," Proc. Second International GameSec Conference, Maryland, USA, 2011.
-
(2011)
Proc. Second International GameSec Conference
-
-
Bonaci, T.1
Bushnell, L.2
-
8
-
-
74249096583
-
Randmoly directed exploration: An efficient node clone detection protocol in wireless sensor networks
-
Z. Li, G. Gong,"Randmoly Directed Exploration: An Efficient Node Clone Detection Protocol in Wireless Sensor Networks," Proc. IEEE Conference on Mobile AdHoc and Sensor Systems, pp. 1030-1035, 2009.
-
(2009)
Proc. IEEE Conference on Mobile AdHoc and Sensor Systems
, pp. 1030-1035
-
-
Li, Z.1
Gong, G.2
-
9
-
-
8344248840
-
Performance aware tasking for environmentally powered sensor networks
-
A. Kansal, D. Potter, M.B. Srivastava, "Performance Aware Tasking for Environmentally Powered Sensor Networks," Proc. ACM SIMETRICS Performance Evaluation Rev., Vol. 32, No. 1, pp. 223-234, 2004.
-
(2004)
Proc. ACM SIMETRICS Performance Evaluation Rev.
, vol.32
, Issue.1
, pp. 223-234
-
-
Kansal, A.1
Potter, D.2
Srivastava, M.B.3
-
10
-
-
0035394136
-
Improving battery performance by using traffic shaping techniques
-
July
-
C.F. Chiasserini, R.R. Rao, "Improving Battery Performance by Using traffic Shaping Techniques," IEEE Journal on Selected Areas in Communications, Vol. 19, No. 7, pp. 1385-1394, July 2001.
-
(2001)
IEEE Journal on Selected Areas in Communications
, vol.19
, Issue.7
, pp. 1385-1394
-
-
Chiasserini, C.F.1
Rao, R.R.2
-
11
-
-
15544383217
-
Nakagamim phase-envelope joint distribution
-
Mar. 3
-
M. D. Yacoub, G. Fraidenraich, and J. C. S. Santos Filho, "Nakagamim phase-envelope joint distribution," Electron. Lett., vol. 41, no. 5, pp. 259-261, Mar. 3, 2005.
-
(2005)
Electron. Lett.
, vol.41
, Issue.5
, pp. 259-261
-
-
Yacoub, M.D.1
Fraidenraich, G.2
Santos Filho, J.C.S.3
-
12
-
-
62749092595
-
Message batching in wireless sensor networks-a perturbation analysis approach
-
New Orleans, USA
-
X. Ning, C.G. Cassandras, "Message Batching in Wireless Sensor Networks-A Perturbation Analysis Approach," proc. IEEE Conference on Decision and Control, New Orleans, USA, 2007.
-
(2007)
Proc. IEEE Conference on Decision and Control
-
-
Ning, X.1
Cassandras, C.G.2
-
14
-
-
85000276942
-
Multi-level? Tesla: Broadcast authentication for distributed sensor networks
-
D. Liu, P. Ning, "Multi-level?Tesla: Broadcast Authentication for Distributed Sensor Networks," ACM Transactions in Embedded Computing Systems, Vol. 3, pp. 800-836, 2004.
-
(2004)
ACM Transactions in Embedded Computing Systems
, vol.3
, pp. 800-836
-
-
Liu, D.1
Ning, P.2
-
15
-
-
84855203308
-
Computational and energy costs of cryptographic algorithms on handheld devices
-
H. Rifa-Pous, J. Herrera-Joancomarti, "Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices," Future Internet, Vol. 3, pp. 31-48, 2011.
-
(2011)
Future Internet
, vol.3
, pp. 31-48
-
-
Rifa-Pous, H.1
Herrera-Joancomarti, J.2
|