-
3
-
-
37149048467
-
A jamming game in wireless networks with transmission cost
-
Network Control and Optimization - First EuroFGI International Conference, NET-COOP 2007, Proceedings
-
E. Altman, K. Avrachenkov, and A. Garnaev. A jamming game in wireless networks with transmission cost. In Network Control and Optimization, pages 1-12. Springer, 2007. (Pubitemid 350259792)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4465 LNCS
, pp. 1-12
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
4
-
-
63449130855
-
Transmission power control game with SINR as objective function
-
Springer
-
E. Altman, K. Avrachenkov, and A. Garnaev. Transmission power control game with SINR as objective function. In Network Control and Optimization, pages 112-120. Springer, 2009.
-
(2009)
Network Control and Optimization
, pp. 112-120
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
5
-
-
28544447405
-
Zero-sum constrained stochastic games with independent state processes
-
DOI 10.1007/s00186-005-0034-4
-
E. Altman, K. Avrachenkov, R. Marquez, and G. Miller. Zero-sum constrained stochastic games with independent state processes. Mathematical Methods of Operations Research, 62(3):375-386, 2005. (Pubitemid 41744430)
-
(2005)
Mathematical Methods of Operations Research
, vol.62
, Issue.3
, pp. 375-386
-
-
Altman, E.1
Avrachenkov, K.2
Marquez, R.3
Miller, G.4
-
8
-
-
51649118582
-
Control channel jamming: Resilience and identification of traitors
-
A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007.
-
Proc. IEEE International Symposium on Information Theory, Nice, France, June 2007
-
-
Chan, A.1
Liu, X.2
Noubir, G.3
Thapa, B.4
-
9
-
-
84877672955
-
STIR-ing the wireless ether with self-tuned, inference-based, real-time jamming
-
IEEE
-
B. DeBruhl, Y. Kim, Z. Weinberg, and P. Tague. STIR-ing the wireless ether with self-tuned, inference-based, real-time jamming. In Proc. 9th IEEE Conference on Mobile Ad-hoc and Sensor Systems, Las Vegas, USA, Oct. 2012. IEEE.
-
Proc. 9th IEEE Conference on Mobile Ad-hoc and Sensor Systems, Las Vegas, USA, Oct. 2012
-
-
DeBruhl, B.1
Kim, Y.2
Weinberg, Z.3
Tague, P.4
-
11
-
-
84901641660
-
Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents
-
B. DeBruhl and P. Tague. Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents. Pervasive and Mobile Computing, 2014.
-
(2014)
Pervasive and Mobile Computing
-
-
DeBruhl, B.1
Tague, P.2
-
17
-
-
84874286087
-
A dynamic transmitter-jammer game with asymmetric information
-
A. Gupta, A. Nayyar, C. Langbort, and T. Başar. A dynamic transmitter-jammer game with asymmetric information. In 51st IEEE Annual Conference on Decision and Control, 2012, pages 6477-6482.
-
51st IEEE Annual Conference on Decision and Control, 2012
, pp. 6477-6482
-
-
Gupta, A.1
Nayyar, A.2
Langbort, C.3
Başar, T.4
-
18
-
-
84893605474
-
Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning
-
IEEE
-
Y. Gwon, S. Dastangoo, C. Fossa, and H. Kung. Competing mobile network game: Embracing antijamming and jamming strategies with reinforcement learning. In IEEE Conference on Communications and Network Security, pages 28-36. IEEE, 2013.
-
(2013)
IEEE Conference on Communications and Network Security
, pp. 28-36
-
-
Gwon, Y.1
Dastangoo, S.2
Fossa, C.3
Kung, H.4
-
19
-
-
70349991516
-
Physical layer security game: How to date a girl with her boyfriend on the same table
-
Z. Han, N. Marina, M. Debbah, and A. Hjorungnes. Physical layer security game: How to date a girl with her boyfriend on the same table. In IEEE International Conference on Game Theory for Networks, 2009, pages 287-294.
-
IEEE International Conference on Game Theory for Networks, 2009
, pp. 287-294
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjorungnes, A.4
-
22
-
-
79953786886
-
Selective jamming dropping insider attacks in wireless mesh networks
-
L. Lazos and M. Krunz. Selective jamming dropping insider attacks in wireless mesh networks. IEEE Network, 25(1):30-34, 2011.
-
(2011)
IEEE Network
, vol.25
, Issue.1
, pp. 30-34
-
-
Lazos, L.1
Krunz, M.2
-
24
-
-
0242466944
-
Friend-or-foe Q-learning in general-sum games
-
M. L. Littman. Friend-or-foe Q-learning in general-sum games. In ICML, volume 1, pages 322-328, 2001.
-
(2001)
ICML
, vol.1
, pp. 322-328
-
-
Littman, M.L.1
-
25
-
-
34548295754
-
SPREAD: Foiling smart jammers using multi-layer agility
-
X. Liu, G. Noubir, R. Sundaram, and S. Tan. SPREAD: Foiling smart jammers using multi-layer agility. In 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, May 2007.
-
26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, May 2007
-
-
Liu, X.1
Noubir, G.2
Sundaram, R.3
Tan, S.4
-
26
-
-
0034250315
-
Analysis of an on-off jamming situation as a dynamic game
-
R. K. Mallik, R. A. Scholtz, and G. P. Papavassilopoulos. Analysis of an on-off jamming situation as a dynamic game. Communications, IEEE Transactions on, 48(8):1360-1373, 2000.
-
(2000)
Communications, IEEE Transactions on
, vol.48
, Issue.8
, pp. 1360-1373
-
-
Mallik, R.K.1
Scholtz, R.A.2
Papavassilopoulos, G.P.3
-
27
-
-
84893156993
-
Game theory meets network security and privacy
-
M. Manshaei, Q. Zhu, T. Alpcan, T. Başar, and J.-P. Hubaux. Game theory meets network security and privacy. ACM transaction on Computational Logic, 5, 2011.
-
(2011)
ACM Transaction on Computational Logic
, pp. 5
-
-
Manshaei, M.1
Zhu, Q.2
Alpcan, T.3
Başar, T.4
Hubaux, J.-P.5
-
30
-
-
33750825847
-
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
-
DOI 10.1109/TMC.2006.183, 1717438
-
M. Raya, I. Aad, J.-P. Hubaux, and A. El Fawal. DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots. IEEE Transactions on Mobile Computing, 5(12):1691-1705, Dec. 2006. (Pubitemid 44711828)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.12
, pp. 1691-1705
-
-
Raya, M.1
Aad, I.2
Hubaux, J.-P.3
El, F.A.4
-
32
-
-
84907417606
-
Pulse radar systems
-
US Patent 3,029,429
-
J. Rodgers. Pulse radar systems, 1962. US Patent 3,029,429.
-
(1962)
-
-
Rodgers, J.1
-
33
-
-
33745444027
-
Anti-jamming techniques for multichannel SAR imaging
-
DOI 10.1049/ip-rsn:20045090
-
L. Rosenberg and D. Gray. Anti-jamming techniques for multichannel SAR imaging. IEE Proceedings-Radar, Sonar and Navigation, 153(3):234-242, June 2006. (Pubitemid 43952654)
-
(2006)
IEE Proceedings: Radar, Sonar and Navigation
, vol.153
, Issue.3
, pp. 234-242
-
-
Rosenberg, L.1
Gray, D.2
-
36
-
-
51949093106
-
Linear programming models for jamming attacks on network traffic flows
-
Berlin, Germany, Apr.
-
P. Tague, D. Slater, G. Noubir, and R. Poovendran. Linear programming models for jamming attacks on network traffic flows. In Proc. 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, pages 207-216, Berlin, Germany, Apr. 2008.
-
(2008)
Proc. 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, pp. 207-216
-
-
Tague, P.1
Slater, D.2
Noubir, G.3
Poovendran, R.4
-
39
-
-
80051886930
-
Reactive jamming in wireless networks: How realistic is the threat?
-
M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat? In Proc. 4th ACM Conference on Wireless Network Security, Hamburg, Germany, June 2011.
-
Proc. 4th ACM Conference on Wireless Network Security, Hamburg, Germany, June 2011
-
-
Wilhelm, M.1
Martinovic, I.2
Schmitt, J.3
Lenders, V.4
-
40
-
-
33745062882
-
Jamming sensor networks: Attack and defense strategies
-
DOI 10.1109/MNET.2006.1637931
-
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3):41-47, May/June 2006. (Pubitemid 43885286)
-
(2006)
IEEE Network
, vol.20
, Issue.3
, pp. 41-47
-
-
Xu, W.1
Ma, K.2
Trappe, W.3
Zhang, Y.4
-
41
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Başar. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach. In IEEE Military Communication Conference, 2011, pages 119-124.
-
IEEE Military Communication Conference, 2011
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Başar, T.5
|