-
1
-
-
85044120591
-
Security in wireless networks: A tutorial
-
In: Butenko, S., Pasiliao, E.L., Shylo, V. (eds.), IOS Press, Boston
-
Vadlamani, S., Medal, H., Eksioglu, B.: Security in wireless networks: a tutorial. In: Butenko, S., Pasiliao, E.L., Shylo, V. (eds.) Examining Robustness and Vulnerability of Networked Systems, pp. 272–289. IOS Press, Boston (2014)
-
(2014)
Examining Robustness and Vulnerability of Networked Systems
, pp. 272-289
-
-
Vadlamani, S.1
Medal, H.2
Eksioglu, B.3
-
2
-
-
84924091437
-
A survey on data fusion and security threats in CR networks
-
Sharma, A., Ahuja, S., Uddin, M.: A survey on data fusion and security threats in CR networks. Int. J. Curr. Eng. Technol. 4, 1770–1778 (2014)
-
(2014)
Int. J. Curr. Eng. Technol
, vol.4
, pp. 1770-1778
-
-
Sharma, A.1
Ahuja, S.2
Uddin, M.3
-
4
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. MobiHoc 2005, 46–57 (2005)
-
(2005)
Mobihoc 2005
, pp. 46-57
-
-
Xu, W.1
Zhang, Y.2
Wood, T.3
-
5
-
-
84931425598
-
Secret communication using artificial noise
-
Negi, R., Goel, S.: Secret communication using artificial noise. In: IEEE VTC 2005, pp. 1906–1910 (2005)
-
(2005)
IEEE VTC 2005
, pp. 1906-1910
-
-
Negi, R.1
Goel, S.2
-
6
-
-
84924125001
-
Jamming attack defense
-
In: Tilborg, H., Jajodia, S. (eds.), Springer, New York
-
Xu, W.: Jamming attack defense. In: Tilborg, H., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 655–661. Springer, New York (2011)
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 655-661
-
-
Xu, W.1
-
7
-
-
84855466075
-
Anti-jamming games in multi-channel cognitive radio networks
-
Wu, Y., Wang, B., Liu, K.J.R., Clancy, T.C.: Anti-jamming games in multi-channel cognitive radio networks. IEEE JSAC 30, 4–15 (2012)
-
(2012)
IEEE JSAC
, vol.30
, pp. 4-15
-
-
Wu, Y.1
Wang, B.2
Liu, K.3
Clancy, T.C.4
-
8
-
-
77955691304
-
Jamming games for power controlled medium access with dynamic trafficc
-
Sagduyu, Y.E., Berry, R.A., Ephremides, A.: Jamming games for power controlled medium access with dynamic trafficc. In: IEEE ISIT 2010, pp. 1818–1822 (2010)
-
(2010)
IEEE ISIT 2010
, pp. 1818-1822
-
-
Sagduyu, Y.E.1
Berry, R.A.2
Ephremides, A.3
-
10
-
-
84874284297
-
Game theory meets network security and privacy
-
Manshaei, M.H., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.P.: Game theory meets network security and privacy. ACM Comput. Surv. 45, 25:1–25:39 (2013)
-
(2013)
ACM Comput. Surv
, vol.45
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.P.5
-
11
-
-
50649125455
-
Game theoretic modeling of malicious users in collaborative networks
-
Theodorakopoulos, G., Baras, J.S.: Game theoretic modeling of malicious users in collaborative networks. IEEE JSAC 26, 1317–1327 (2008)
-
(2008)
IEEE JSAC
, vol.26
, pp. 1317-1327
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
12
-
-
84904323631
-
On the performance of adaptive packetized wireless communication links under jamming
-
Firouzbakht, K., Noubir, G., Salehi, M.: On the performance of adaptive packetized wireless communication links under jamming. IEEE Trans. Wirel. Commun. 13, 3481–3495 (2014)
-
(2014)
IEEE Trans. Wirel. Commun
, vol.13
, pp. 3481-3495
-
-
Firouzbakht, K.1
Noubir, G.2
Salehi, M.3
-
13
-
-
84904708169
-
Incorporating attack-type uncertainty into network protection
-
Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Trans. Inf. Forensics Secur. 9, 1278–1287 (2014)
-
(2014)
IEEE Trans. Inf. Forensics Secur
, vol.9
, pp. 1278-1287
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
14
-
-
84869597150
-
Konstantin: Jamming game in a dynamic slotted ALOHA network
-
In: Jain, Rahul, Kannan, Rajgopal (eds.), Springer, Heidelberg
-
Garnaev, Andrey, Hayel, Yezekael, Altman, Eitan, Avrachenkov, Konstantin: Jamming game in a dynamic slotted ALOHA network. In: Jain, Rahul, Kannan, Rajgopal (eds.) Gamenets 2011. LNICST, vol. 75, pp. 429–443. Springer, Heidelberg (2012)
-
(2012)
Gamenets 2011. LNICST
, vol.75
, pp. 429-443
-
-
Garnaev1
Andrey2
Hayel3
Yezekael4
Altman5
Eitan6
Avrachenkov7
-
15
-
-
79957496567
-
Fight jamming with jamming - a game theoretic analysis of jamming attack in wireless networks and defense strategy
-
Chen, L., Leneutreb, J.: Fight jamming with jamming - a game theoretic analysis of jamming attack in wireless networks and defense strategy. Comput. Netw. 55, 2259–2270 (2011)
-
(2011)
Comput. Netw
, vol.55
, pp. 2259-2270
-
-
Chen, L.1
Leneutreb, J.2
-
16
-
-
80052117632
-
Classification on attacks in wireless ad hoc networks: A game theoretic view
-
Liao, X., Hao, D., Sakurai, K.: Classification on attacks in wireless ad hoc networks: a game theoretic view. In: 2011 7th International Conference on Networked Computing and Advanced Information Management (NCM), pp. 144–149 (2011)
-
(2011)
2011 7Th International Conference on Networked Computing and Advanced Information Management (NCM),
, pp. 144-149
-
-
Liao, X.1
Hao, D.2
Sakurai, K.3
-
17
-
-
77349115760
-
Fair resource allocation in wireless networks in the presence of a jammer
-
Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338–349 (2010)
-
(2010)
Perform. Eval
, vol.67
, pp. 338-349
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
18
-
-
81855206082
-
Jamming games in fast-fading wireless channels
-
Amariucai, G.T., Wei, S.: Jamming games in fast-fading wireless channels. IJAACS 1, 411–424 (2008)
-
(2008)
IJAACS
, vol.1
, pp. 411-424
-
-
Amariucai, G.T.1
Wei, S.2
-
19
-
-
70350000208
-
Stochastic games for security in networks with interdependent nodes
-
Nguyen, K.C., Alpcan, T., Basar, T.: Stochastic games for security in networks with interdependent nodes. In: GameNets 2009, pp. 697–703 (2009)
-
(2009)
Gamenets 2009
, pp. 697-703
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
20
-
-
79953200186
-
An anti-jamming stochastic game for cognitive radio networks
-
Wang, B., Wu, Y., Liu, K.J.R., Clancy, T.C.: An anti-jamming stochastic game for cognitive radio networks. IEEE JSAC 29, 877–889 (2011)
-
(2011)
IEEE JSAC
, vol.29
, pp. 877-889
-
-
Wang, B.1
Wu, Y.2
Liu, K.3
Clancy, T.C.4
-
21
-
-
84907390630
-
Power napping with loud neighbors: Optimal energy-constrained jamming and anti-jamming
-
DeBruhl, B., Kroer, C., Datta, A., Sandholm, T., Tague, P.: Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. In: 2014 ACM Conference on Security and Privacy inWireless and Mobile Networks (WiSec 2014), pp. 117–128 (2014)
-
(2014)
2014 ACM Conference on Security and Privacy Inwireless and Mobile Networks (Wisec 2014)
, pp. 117-128
-
-
Debruhl, B.1
Kroer, C.2
Datta, A.3
Sandholm, T.4
Tague, P.5
-
22
-
-
84857196311
-
Stochastic strategic routing reduces attack effects
-
Calinescu, G., Kapoor, S., Qiao, K., Shin, J.: Stochastic strategic routing reduces attack effects. In: GLOBECOM 2011, pp. 1–5 (2011)
-
(2011)
GLOBECOM 2011
, pp. 1-5
-
-
Calinescu, G.1
Kapoor, S.2
Qiao, K.3
Shin, J.4
-
23
-
-
84924198860
-
A game theoretic analysis of secret and reliable communication with active and passive adversarial modes
-
submitted)
-
Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: A game theoretic analysis of secret and reliable communication with active and passive adversarial modes. IEEE Trans. Wirel. Commun. (2014, submitted)
-
(2014)
IEEE Trans. Wirel. Commun
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
24
-
-
33751087288
-
-
Springer, New York
-
Comaniciu, C., Mandayam, N.B., Poor, H.V.: Wireless Networks Multiuser Detection in Cross-Layer Design. Springer, New York (2005)
-
(2005)
Wireless Networks Multiuser Detection in Cross-Layer Design
-
-
Comaniciu, C.1
Mandayam, N.B.2
Poor, H.V.3
-
25
-
-
0003579258
-
-
Cambridge University Press, Cambridge
-
Verdu, S.: Multiuser Detection. Cambridge University Press, Cambridge (1998)
-
(1998)
Multiuser Detection
-
-
Verdu, S.1
-
27
-
-
51749122504
-
Energy detection of unknown deterministic signals
-
Urkowitz, H.: Energy detection of unknown deterministic signals. Proc. IEEE 55, 523–531 (1967)
-
(1967)
Proc. IEEE
, vol.55
, pp. 523-531
-
-
Urkowitz, H.1
-
28
-
-
0038648984
-
On the energy detection of unknown signals over fading channels
-
Digham, F.F., Alouini, M.S., Simon, M.K.: On the energy detection of unknown signals over fading channels. In: IEEE ICC 2003, pp. 3575–3579 (2003)
-
(2003)
IEEE ICC 2003
, pp. 3575-3579
-
-
Digham, F.F.1
Alouini, M.S.2
Simon, M.K.3
-
29
-
-
84893122746
-
Wade: Stationary equilibrium strategies for bandwidth scanning
-
In: Jonsson, Magnus, Vinel, Alexey, Bellalta, Boris, Marina, Ninoslav, Dimitrova, Desislava, Fiems, Dieter (eds.), Springer, Heidelberg
-
Garnaev, Andrey, Trappe, Wade: Stationary equilibrium strategies for bandwidth scanning. In: Jonsson, Magnus, Vinel, Alexey, Bellalta, Boris, Marina, Ninoslav, Dimitrova, Desislava, Fiems, Dieter (eds.) MACOM 2013. LNCS, vol. 8310, pp. 168–183. Springer, Heidelberg (2013)
-
(2013)
MACOM 2013. LNCS
, vol.8310
, pp. 168-183
-
-
Garnaev1
Andrey2
Trappe3
Wade4
-
30
-
-
84877655292
-
Dependence of optimal monitoring strategy on the application to be protected
-
Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: 2012 IEEE Global Communications Conference (GLOBECOM), pp. 1054–1059 (2012)
-
(2012)
2012 IEEE Global Communications Conference (GLOBECOM
, pp. 1054-1059
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
31
-
-
37149048467
-
A jamming game in wireless networks with transmission cost
-
In: Chahed, Tijani, Tuffin, Bruno (eds.), Springer, Heidelberg
-
Altman, Eitan, Avrachenkov, Konstantin, Garnaev, Andrey: A jamming game in wireless networks with transmission cost. In: Chahed, Tijani, Tuffin, Bruno (eds.) NET-COOP 2007. LNCS, vol. 4465, pp. 1–12. Springer, Heidelberg (2007)
-
(2007)
NET-COOP 2007. LNCS
, vol.4465
, pp. 1-12
-
-
Altman1
Eitan2
Avrachenkov3
Konstantin4
Garnaev5
Andrey6
-
32
-
-
84866940712
-
A Bayesian jamming game in an OFDM wireless network
-
Garnaev, A., Hayel, Y., Altman, E.: A Bayesian jamming game in an OFDM wireless network. In: 2012 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT), pp. 41–48 (2012)
-
(2012)
2012 10Th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT
, pp. 41-48
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
-
33
-
-
70349996104
-
Jamming in wireless networks: The case of several jammers
-
Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks: the case of several jammers. In: International Conference on Game Theory for Networks (GameNets 2009), pp. 585–592 (2009)
-
(2009)
International Conference on Game Theory for Networks (Gamenets 2009
, pp. 585-592
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
34
-
-
33645658584
-
Analysis of iterative waterfilling algorithm for multiuser power control in digital subscriber lines
-
Luo, Z.-Q., Pang, J.-S.: Analysis of iterative waterfilling algorithm for multiuser power control in digital subscriber lines. EURASIP J. Adv. Sign. Process. 2006, 10 (2006)
-
(2006)
EURASIP J. Adv. Sign. Process. 2006
, pp. 10
-
-
Luo, Z.-Q.1
Pang, J.-S.2
-
35
-
-
0036601296
-
Distributed multiuser power control for digital subscriber lines
-
Yu, W., Ginis, G., Cioffi, J.M.: Distributed multiuser power control for digital subscriber lines. IEEE JSAC 20(5), 1105–1115 (2002)
-
(2002)
IEEE JSAC
, vol.20
, Issue.5
, pp. 1105-1115
-
-
Yu, W.1
Ginis, G.2
Cioffi, J.M.3
-
36
-
-
67651196928
-
Closed form solutions for symmetric water filling games
-
Altman, E., Avrachenkov, K., Garnaev, A.: Closed form solutions for symmetric water filling games. In: 27th IEEE Communications Society Conference on Computer Communications (INFOCOM 2008), pp. 673–681 (2008)
-
(2008)
27Th IEEE Communications Society Conference on Computer Communications (INFOCOM 2008
, pp. 673-681
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
37
-
-
79958178271
-
Closed form solutions for water-filling problem in optimization and game frameworks
-
Altman, E., Avrachenkov, K., Garnaev, A.: Closed form solutions for water-filling problem in optimization and game frameworks. Telecommun. Syst. 47, 153–164 (2011)
-
(2011)
Telecommun. Syst
, vol.47
, pp. 153-164
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
|