-
1
-
-
18844454790
-
Intrusion detection in sensor networks: A noncooperative game approach
-
Washington, DC, USA: IEEE Computer Society
-
A. Agah, S. K. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks: A noncooperative game approach," in Proc. 3rd Intl Symp. on Network Computing and Applications (NCA). Washington, DC, USA: IEEE Computer Society, 2004, pp. 343-346.
-
(2004)
Proc. 3Rd Intl Symp. On Network Computing and Applications (NCA)
, pp. 343-346
-
-
Agah, A.1
Das, S.K.2
Basu, K.3
Asadi, M.4
-
3
-
-
0019529857
-
Solution of nonsymmetric linear complementarity problems by iterative methods
-
B. H. Ahn, "Solution of nonsymmetric linear complementarity problems by iterative methods," J. Optimization Theor. Applic., 33, 185-197, 1981.
-
(1981)
J. Optimization Theor. Applic
, vol.33
, pp. 185-197
-
-
Ahn, B.H.1
-
4
-
-
77955370788
-
-
PhD dissertation, University of Illinois at Urbana-Champaign, Urbana, IL, May
-
T. Alpcan, "Noncooperative games for control of networked systems," PhD dissertation, University of Illinois at Urbana-Champaign, Urbana, IL, May 2006.
-
(2006)
Noncooperative games for control of networked systems
-
-
Alpcan, T.1
-
5
-
-
1542288809
-
A game theoretic approach to decision and analysis in network intrusion detection
-
Maui, HI, Dec
-
T. Alpcan and T. Başar, "A game theoretic approach to decision and analysis in network intrusion detection," in Proc. 42nd IEEE Conf. on Decision and Control (CDC), Maui, HI, Dec. 2003, pp. 2595-2600.
-
(2003)
Proc. 42Nd IEEE Conf. On Decision and Control (CDC)
, pp. 2595-2600
-
-
Alpcan, T.1
Başar, T.2
-
6
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
Paradise Island, Bahamas, Dec
-
T. Alpcan and T. Başar, "A game theoretic analysis of intrusion detection in access control systems," in Proc. 43rd IEEE Conf. on Decision and Control (CDC), Paradise Island, Bahamas, Dec. 2004, pp. 1568-1573.
-
(2004)
Proc. 43rd IEEE Conf. On Decision and Control (CDC)
, pp. 1568-1573
-
-
Alpcan, T.1
Başar, T.2
-
7
-
-
79551639761
-
Distributed algorithms for Nash equilibria of flow control games
-
ser. Annals of Dynamic Games. Boston, MA: Birkhauser
-
T. Alpcan and T. Başar, "Distributed algorithms for Nash equilibria of flow control games," in Advances in Dynamic Games: Applications to Economics, Finance, Optimization, and Stochastic Control, ser. Annals of Dynamic Games. Boston, MA: Birkhauser, 2005, vol. 7, pp. 473-498.
-
(2005)
Advances in Dynamic Games: Applications to Economics, Finance, Optimization, and Stochastic Control
, vol.7
, pp. 473-498
-
-
Alpcan, T.1
Başar, T.2
-
10
-
-
0036847044
-
CDMA uplink power control as a noncooperative game
-
Nov
-
T. Alpcan, T. Başar, R. Srikant, and E. Altman, "CDMA uplink power control as a noncooperative game," Wireless Networks, 8(6), 659-670, Nov. 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.6
, pp. 659-670
-
-
Alpcan, T.1
Başar, T.2
Srikant, R.3
Altman, E.4
-
11
-
-
77957970684
-
A discrete-time parallel update algorithm for distributed learning
-
Tampa, FL, USA, Dec
-
T. Alpcan and C. Bauckhage, "A discrete-time parallel update algorithm for distributed learning," in Proc. 19th Intl Conf. on Pattern Recognition (ICPR), Tampa, FL, USA, Dec. 2008.
-
(2008)
Proc. 19th Intl Conf. On Pattern Recognition (ICPR)
-
-
Alpcan, T.1
Bauckhage, C.2
-
13
-
-
78149472957
-
A probabilistic diffusion scheme for anomaly detection on smartphones
-
Passau, Germany, April
-
T. Alpcan, C. Bauckhage, and A.-D. Schmidt, "A probabilistic diffusion scheme for anomaly detection on smartphones," in Proc. Workshop on Information Security Theory and Practices (WISTP), Passau, Germany, April 2010.
-
(2010)
Proc. Workshop on Information Security Theory and Practices (WISTP)
-
-
Alpcan, T.1
Bauckhage, C.2
Schmidt, A.-D.3
-
15
-
-
46749114372
-
Power control for multicell CDMA wireless networks: A team optimization approach
-
Oct
-
T. Alpcan, X. Fan, T. Başar, M. Arcak, and J. T. Wen, "Power control for multicell CDMA wireless networks: A team optimization approach," Wireless Networks, 14(5), 647-657, Oct. 2008.
-
(2008)
Wireless Networks
, vol.14
, Issue.5
, pp. 647-657
-
-
Alpcan, T.1
Fan, X.2
Başar, T.3
Arcak, M.4
Wen, J.T.5
-
17
-
-
77954494362
-
A game theoretic model for digital identity and trust in online communities
-
April
-
T. Alpcan, C. Orencik, A. Levi, and E. Savas, "A game theoretic model for digital identity and trust in online communities," in Proc. 5th ACM Symp. on Information, Computer and Communications Security (ASIACCS), April 2010.
-
(2010)
Proc. 5th ACM Symp. On Information, Computer and Communications Security (ASIACCS)
-
-
Alpcan, T.1
Orencik, C.2
Levi, A.3
Savas, E.4
-
19
-
-
77950819489
-
A control theoretic approach to noncooperative game design
-
Shanghai, China, December
-
T. Alpcan, L. Pavel, and N. Stefanovic, "A control theoretic approach to noncooperative game design," in Proc. 48th IEEE Conf. on Decision and Control (CDC), Shanghai, China, December 2009.
-
(2009)
Proc. 48th IEEE Conf. On Decision and Control (CDC)
-
-
Alpcan, T.1
Pavel, L.2
Stefanovic, N.3
-
21
-
-
0032115196
-
Multiuser rate-based flow control
-
July
-
E. Altman and T. Başar, "Multiuser rate-based flow control," IEEE Trans. Commun., 46(7), 940-949, July 1998.
-
(1998)
IEEE Trans. Commun
, vol.46
, Issue.7
, pp. 940-949
-
-
Altman, E.1
Başar, T.2
-
22
-
-
0003650411
-
-
Upper Saddle River, NJ, USA: Prentice-Hall, Inc
-
B. D. O. Anderson and J. B. Moore, Optimal Control: Linear Quadratic Methods. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1990.
-
Optimal Control: Linear Quadratic Methods
, pp. 1990
-
-
Anderson, B.D.O.1
Moore, J.B.2
-
24
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
Kent Ridge Digital Labs, Singapore
-
S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," in Proc. 6th ACM Conf. on Computer and Communications Security (CCS), Kent Ridge Digital Labs, Singapore, 1999, pp. 1-7.
-
(1999)
Proc. 6th ACM Conf. On Computer and Communications Security (CCS)
, pp. 1-7
-
-
Axelsson, S.1
-
25
-
-
0003907293
-
-
Indianapolis, IN, USA: Macmillan Technical Publishing
-
R. G. Bace, Intrusion Detection. Indianapolis, IN, USA: Macmillan Technical Publishing, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
27
-
-
38249035395
-
Relaxation techniques and asynchronous algorithms for on-line computation of noncooperative equilibria
-
Dec
-
T. Başar, "Relaxation techniques and asynchronous algorithms for on-line computation of noncooperative equilibria," J. Econ. Dyn. Control, 11(4), 531-549, Dec. 1987.
-
(1987)
J. Econ. Dyn. Control
, vol.11
, Issue.4
, pp. 531-549
-
-
Başar, T.1
-
30
-
-
0024662808
-
Distributed computation of nash equilibria in linear-quadratic stochastic differential games
-
T. Başar and S. Li, "Distributed computation of nash equilibria in linear-quadratic stochastic differential games," SIAM J. Control Optim., 27(3), 563-578, 1989.
-
(1989)
SIAM J. Control Optim
, vol.27
, Issue.3
, pp. 563-578
-
-
Başar, T.1
Li, S.2
-
32
-
-
54249153458
-
Image tagging using pagerank over bipartite graphs
-
G. Rigoll, ed. Berlin /Heidelberg: Springer
-
C. Bauckhage, "Image tagging using pagerank over bipartite graphs," in LNCS: Pattern Recognition, G. Rigoll, ed. Berlin /Heidelberg: Springer, 2008, vol. 5096/2008.
-
(2008)
LNCS: Pattern Recognition
, vol.5096
, Issue.2008
-
-
Bauckhage, C.1
-
34
-
-
12444269117
-
Fictitious play in 2xn games
-
U. Berger, "Fictitious play in 2xn games," J. Econ. Theor., 120(2), 139-154, 2005.
-
(2005)
J. Econ. Theor
, vol.120
, Issue.2
, pp. 139-154
-
-
Berger, U.1
-
35
-
-
0003713964
-
-
2nd edn. Belmont, MA: Athena Scientific
-
D. Bertsekas, Nonlinear Programming, 2nd edn. Belmont, MA: Athena Scientific, 1999.
-
(1999)
Nonlinear Programming
-
-
Bertsekas, D.1
-
37
-
-
0003794137
-
-
2nd edn. Upper Saddle River, NJ: Prentice Hall
-
D. Bertsekas and R. Gallager, Data Networks. 2nd edn. Upper Saddle River, NJ: Prentice Hall, 1992.
-
(1992)
Data Networks
-
-
Bertsekas, D.1
Gallager, R.2
-
39
-
-
77955874962
-
Optimal revocations in ephemeral networks: A game-theoretic framework
-
Avignon, France, May
-
I. Bilogrevic, M. H. Manshaei, M. Raya, and J.-P. Hubaux, "Optimal revocations in ephemeral networks: A game-theoretic framework," in Proc. of 8th Intl. Symp. on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Avignon, France, May 2010.
-
(2010)
Proc. Of 8th Intl. Symp. On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
-
-
Bilogrevic, I.1
Manshaei, M.H.2
Raya, M.3
Hubaux, J.-P.4
-
41
-
-
39649111300
-
Intrusion response as a resource allocation problem
-
San Diego, CA, Dec
-
M. Bloem, T. Alpcan, and T. Başar, "Intrusion response as a resource allocation problem," in Proc. 45th IEEE Conf. on Decision and Control (CDC), San Diego, CA, Dec. 2006, pp. 6283-6288.
-
(2006)
Proc. 45th IEEE Conf. On Decision and Control (CDC)
, pp. 6283-6288
-
-
Bloem, M.1
Alpcan, T.2
Başar, T.3
-
42
-
-
62749102764
-
Optimal and robust epidemic response for multiple networks
-
New Orleans, LA, Dec
-
M. Bloem, T. Alpcan, and T. Başar, "Optimal and robust epidemic response for multiple networks," in Proc. 46th IEEE Conf. on Decision and Control (CDC), New Orleans, LA, Dec. 2007.
-
(2007)
Proc. 46th IEEE Conf. On Decision and Control (CDC)
-
-
Bloem, M.1
Alpcan, T.2
Başar, T.3
-
43
-
-
62749086310
-
An optimal control approach to malware filtering
-
New Orleans, LA, Dec
-
M. Bloem, T. Alpcan, and T. Başar, "An optimal control approach to malware filtering," in Proc. 46th IEEE Conf. on Decision and Control (CDC), New Orleans, LA, Dec. 2007.
-
(2007)
Proc. 46th IEEE Conf. On Decision and Control (CDC)
-
-
Bloem, M.1
Alpcan, T.2
Başar, T.3
-
45
-
-
43049167460
-
Malware filtering for network security using weighted optimality measures
-
Singapore, Oct
-
M. Bloem, T. Alpcan, S. Schmidt, and T. Başar, "Malware filtering for network security using weighted optimality measures," in Proc. IEEE Conf. on Control Applications (CCA), Singapore, Oct. 2007.
-
(2007)
Proc. IEEE Conf. On Control Applications (CCA)
-
-
Bloem, M.1
Alpcan, T.2
Schmidt, S.3
Başar, T.4
-
46
-
-
64549134237
-
Security games for vehicular networks
-
Urbana-Champaign, IL, USA, Sept
-
S. Buchegger and T. Alpcan, "Security games for vehicular networks," in Proc. Allerton Conf. on Communication, Control, and Computing, Urbana-Champaign, IL, USA, Sept. 2008.
-
(2008)
Proc. Allerton Conf. On Communication, Control, and Computing
-
-
Buchegger, S.1
Alpcan, T.2
-
47
-
-
24744432675
-
Self-policing mobile ad hoc networks by reputation systems
-
July
-
S. Buchegger and J.-Y. Le Boudee, "Self-policing mobile ad hoc networks by reputation systems," IEEE Commun. Mag., 43(7), 101-107, July 2005.
-
(2005)
IEEE Commun. Mag
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Le Boudee, J.-Y.2
-
51
-
-
84923280232
-
Application-level simulation for network security
-
Marseille, France: ICST, March
-
R. Bye, S. Schmidt, K. Luther, and S. Albayrak, "Application-level simulation for network security," in Proc. 1st Intl Conf. on Simulation Tools and Techniques (Simutools). Marseille, France: ICST, March 2008, pp. 1-10.
-
(2008)
Proc. 1st Intl Conf. On Simulation Tools and Techniques (Simutools)
, pp. 1-10
-
-
Bye, R.1
Schmidt, S.2
Luther, K.3
Albayrak, S.4
-
52
-
-
77953861458
-
Reformulating the monitor placement problem: Optimal network-wide sampling
-
Lisbon, Portugal, Dec
-
G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran, "Reformulating the monitor placement problem: Optimal network-wide sampling," in Proc. 2nd Conf. on Future Networking Technologies (CoNeXT), Lisbon, Portugal, Dec. 2006.
-
(2006)
Proc. 2nd Conf. On Future Networking Technologies (CoNeXT)
-
-
Cantieni, G.R.1
Iannaccone, G.2
Barakat, C.3
Diot, C.4
Thiran, P.5
-
53
-
-
4344595999
-
Asymptotic results for decentralized detection in power constrained wireless sensor networks
-
Aug
-
J.-F. Chamberland and V. V. Veeravalli, "Asymptotic results for decentralized detection in power constrained wireless sensor networks," IEEE J. Sel. Areas in Commun., 22(6), 1007-1015, Aug. 2004.
-
(2004)
IEEE J. Sel. Areas in Commun
, vol.22
, Issue.6
, pp. 1007-1015
-
-
Chamberland, J.-F.1
Veeravalli, V.V.2
-
54
-
-
33750590109
-
How dense should a sensor network be for detection with correlated observations?
-
J.-F. Chamberland and V. V. Veeravalli, "How dense should a sensor network be for detection with correlated observations?" IEEE Trans. Inf. Theor., 52(11), 5099-5106, 2006.
-
(2006)
IEEE Trans. Inf. Theor
, vol.52
, Issue.11
, pp. 5099-5106
-
-
Chamberland, J.-F.1
Veeravalli, V.V.2
-
55
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Trans. Dependable Secure Comput., 2(3), 233-247, 2005.
-
(2005)
IEEE Trans. Dependable Secure Comput
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
57
-
-
39549096209
-
Effectiveness of quarantine in worm epidemics
-
Istanbul, Turkey, June
-
T. M. Chen and N. Jamil, "Effectiveness of quarantine in worm epidemics," in Proc. IEEE Conf. on Communication (ICC), Istanbul, Turkey, June 2006, pp. 2142-2147.
-
(2006)
Proc. Ieee Conf. On Communication (ICC)
, pp. 2142-2147
-
-
Chen, T.M.1
Jamil, N.2
-
59
-
-
62949229420
-
A stackelberg game for pricing uplink power in wide-band cognitive radio networks
-
Cancun, Mexico, Dec
-
A. A. Daoud, T. Alpcan, S. Agarwal, and M. Alanyali, "A stackelberg game for pricing uplink power in wide-band cognitive radio networks," in Proc. 47th IEEE Conf. on Decision and Control (CDC), Cancun, Mexico, Dec. 2008.
-
(2008)
Proc. 47th IEEE Conf. On Decision and Control (CDC)
-
-
Daoud, A.A.1
Alpcan, T.2
Agarwal, S.3
Alanyali, M.4
-
60
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
N. Eagle and A. S. Pentland, "Reality mining: Sensing complex social systems," Personal Ubiquitous Comput., 10(4), 255-268, 2006.
-
(2006)
Personal Ubiquitous Comput
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.S.2
-
61
-
-
0003449736
-
-
Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, Tech. Rep., Nov
-
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff, and N. Mead, "Survivable Network Systems: An Emerging Discipline," Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, USA, Tech. Rep., Nov. 1997.
-
(1997)
Survivable Network Systems: An Emerging Discipline
-
-
Ellison, R.1
Fisher, D.2
Linger, R.3
Lipson, H.4
Longstaff, T.5
Mead, N.6
-
62
-
-
1542312555
-
Foundations for survivable systems engineering
-
July
-
R. Ellison, R. Linger, H. Lipson, N. Mead, and A. Moore, "Foundations for survivable systems engineering," J. Defense Software Eng. pp. 10-15, July 2002.
-
(2002)
J. Defense Software Eng
, pp. 10-15
-
-
Ellison, R.1
Linger, R.2
Lipson, H.3
Mead, N.4
Moore, A.5
-
64
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Trans. Mob. Comput, 5(5), 463-476, 2006.
-
(2006)
IEEE Trans. Mob. Comput
, vol.5
, Issue.5
, pp. 463-476
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
65
-
-
77953316394
-
On the age of pseudonyms in mobile ad hoc networks
-
San Diego, CA, USA, March
-
J. Freudiger, M. H. Manshaei, J. L. Boudec, and J. P. Hubaux, "On the age of pseudonyms in mobile ad hoc networks," in Proc. 29th IEEE Conf. on Computer Communications (Infocom), San Diego, CA, USA, March 2010.
-
(2010)
Proc. 29th IEEE Conf. On Computer Communications (Infocom)
-
-
Freudiger, J.1
Manshaei, M.H.2
Boudec, J.L.3
Hubaux, J.P.4
-
66
-
-
74049097109
-
On noncooperative location privacy: A game-theoretic analysis
-
New York, NY, USA: ACM
-
J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. C. Parkes, "On noncooperative location privacy: A game-theoretic analysis," in Proc. 16th ACM Conf. on Computer and Communications Security (CCS). New York, NY, USA: ACM, 2009, pp. 324-337.
-
(2009)
Proc. 16th ACM Conf. On Computer and Communications Security (CCS)
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.H.2
Hubaux, J.-P.3
Parkes, D.C.4
-
69
-
-
33747031937
-
The IT security model
-
Oct./Nov
-
P. D. Groom, "The IT security model," IEEE Potentials, 22(4), 6-8, Oct./Nov. 2003.
-
(2003)
IEEE Potentials
, vol.22
, Issue.4
, pp. 6-8
-
-
Groom, P.D.1
-
71
-
-
57349198694
-
Secure or insure?: A game-theoretic analysis of information security games
-
New York, NY, USA: ACM
-
J. Grossklags, N. Christin, and J. Chuang, "Secure or insure?: A game-theoretic analysis of information security games," in Proc. 17th Intl Conf. on World Wide Web (WWW). New York, NY, USA: ACM, 2008, pp. 209-218.
-
(2008)
Proc. 17th Intl Conf. On World Wide Web (WWW)
, pp. 209-218
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
-
72
-
-
78349302904
-
Iterated regret minimization: A more realistic solution concept
-
Pasadena, CA, USA, July
-
J. Y. Halpern and R. Pass, "Iterated regret minimization: A more realistic solution concept," in Proc. 21st Intl Joint Conf. on Artificial Intelligence (IJCAI), Pasadena, CA, USA, July 2009.
-
(2009)
Proc. 21st Intl Joint Conf. On Artificial Intelligence (IJCAI)
-
-
Halpern, J.Y.1
Pass, R.2
-
73
-
-
70349991516
-
Physical layer security game: How to date a girl with her boyfriend on the same table
-
May
-
Z. Han, N. Marina, M. Debbah, and A. Hjørungnes, "Physical layer security game: How to date a girl with her boyfriend on the same table," in Proc. Intl Conf. on Game Theory for Networks (GameNets), May 2009, pp. 287-294.
-
(2009)
Proc. Intl Conf. On Game Theory for Networks (GameNets)
, pp. 287-294
-
-
Han, Z.1
Marina, N.2
Debbah, M.3
Hjørungnes, A.4
-
74
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
New York, NY, USA: ACM
-
C. Herley, "So long, and no thanks for the externalities: The rational rejection of security advice by users," in Proc. 2009 Workshop on New Security Paradigms (NSPW). New York, NY, USA: ACM, 2009, pp. 133-144.
-
(2009)
Proc. 2009 Workshop on New Security Paradigms (NSPW)
, pp. 133-144
-
-
Herley, C.1
-
75
-
-
0034486891
-
The mathematics of infectious diseases
-
H. W. Hethcote, "The mathematics of infectious diseases," SIAM Rev., 42(4), 599-653, 2000.
-
(2000)
SIAM Rev
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
76
-
-
84898823335
-
Building projectable classifiers of arbitrary complexity
-
Washington, DC, USA: IEEE Computer Society
-
T. K. Ho and E. M. Kleinberg, "Building projectable classifiers of arbitrary complexity," in Proc. 13th Intl Conf. on Pattern Recognition (ICPR). Washington, DC, USA: IEEE Computer Society, 1996, p. 880.
-
(1996)
Proc. 13th Intl Conf. On Pattern Recognition (ICPR)
, pp. 880
-
-
Ho, T.K.1
Kleinberg, E.M.2
-
77
-
-
0024736656
-
Distributed Bayesian signal detection
-
Sept
-
I. Y. Hoballah and P. K. Varshney, "Distributed Bayesian signal detection," IEEE Trans. Inf. Theor., 35(5), 995-1000, Sept. 1989.
-
(1989)
IEEE Trans. Inf. Theor
, vol.35
, Issue.5
, pp. 995-1000
-
-
Hoballah, I.Y.1
Varshney, P.K.2
-
78
-
-
0004151494
-
-
New York, NY: Cambridge University Press
-
R. Horn and C. Johnson, Matrix Analysis. New York, NY: Cambridge University Press, 1985.
-
(1985)
Matrix Analysis
-
-
Horn, R.1
Johnson, C.2
-
79
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
New Orleans, LA, USA, March
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing wireless location privacy using silent period," in Proc. IEEE Wireless Communications and Networking Conf. (WCNC), New Orleans, LA, USA, March 2005, vol. 2, pp. 1187-1192.
-
(2005)
Proc. IEEE Wireless Communications and Networking Conf. (Wcnc)
, vol.2
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamane, H.3
Sezaki, K.4
-
80
-
-
0000375621
-
A robust version of the probability ratio test
-
P. J. Huber, "A robust version of the probability ratio test," Ann. Math. Statist., 36, 1753-1758, 1965.
-
(1965)
Ann. Math. Statist
, vol.36
, pp. 1753-1758
-
-
Huber, P.J.1
-
82
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systs, 43(2), 618-644, 2007.
-
(2007)
Decision Support Systs
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
83
-
-
0003792312
-
-
Upper Saddle River, NJ, USA: Prentice Hall
-
T. Kailath, Linear Systems. Upper Saddle River, NJ, USA: Prentice Hall, 1980.
-
(1980)
Linear Systems
-
-
Kailath, T.1
-
84
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
November
-
F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, T. Ta-Vinh, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux, "Secure vehicular communication systems: implementation, performance, and research challenges," IEEE Commun. Mag., 46(11), 110-118, November 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.11
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Muter, M.4
Schoch, E.5
Wiedersheim, B.6
Ta-Vinh, T.7
Calandriello, G.8
Held, A.9
Kung, A.10
Hubaux, J.-P.11
-
85
-
-
33750317385
-
Kernels for graphs
-
B. Schölkopf, K. Tsuda, and J.-P. Vert, eds. Cambridge, MA, USA: MIT Press
-
H. Kashima, K. Tsuda, and A. Inokuchi, "Kernels for graphs," in Kernel Methods in Computational Biology, B. Schölkopf, K. Tsuda, and J.-P. Vert, eds. Cambridge, MA, USA: MIT Press, 2004, pp. 155-170.
-
(2004)
Kernel Methods in Computational Biology
, pp. 155-170
-
-
Kashima, H.1
Tsuda, K.2
Inokuchi, A.3
-
86
-
-
4544354908
-
Correlated jamming on MIMO Gaussian fading channels
-
Sept
-
A. Kashyap, T. Başar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inf. Theory, 50(9), 2119-2123, Sept. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.9
, pp. 2119-2123
-
-
Kashyap, A.1
Başar, T.2
Srikant, R.3
-
87
-
-
84924746260
-
Asymptotically optimal quantization for detection in power constrained decentralized networks
-
Minneapolis, MN, USA, June
-
A. Kashyap, T. Başar, and R. Srikant, "Asymptotically optimal quantization for detection in power constrained decentralized networks," in Proc. 2006 American Control Conf. (ACC), Minneapolis, MN, USA, June 2006, pp. 14-16.
-
(2006)
Proc. 2006 American Control Conf. (Acc)
, pp. 14-16
-
-
Kashyap, A.1
Başar, T.2
Srikant, R.3
-
88
-
-
0042474230
-
Detecting network intrusions via sampling: A game theoretic approach
-
San Fransisco, CA, April
-
M. Kodialam and T. V. Lakshman, "Detecting network intrusions via sampling: A game theoretic approach," in Proc. 22nd IEEE Conf. on Computer Communications (Infocom), San Fransisco, CA, April 2003, vol. 3, pp. 1880-1889.
-
(2003)
Proc. 22nd IEEE Conf. On Computer Communications (Infocom)
, vol.3
, pp. 1880-1889
-
-
Kodialam, M.1
Lakshman, T.V.2
-
89
-
-
1942532330
-
Feedback control applied to survivability: A host-based autonomic defense system
-
March
-
O. Kreidl and T. Frazier, "Feedback control applied to survivability: A host-based autonomic defense system," IEEE Trans. Reliability, 53(1), 148-166, March 2004.
-
(2004)
IEEE Trans. Reliability
, vol.53
, Issue.1
, pp. 148-166
-
-
Kreidl, O.1
Frazier, T.2
-
92
-
-
0346405517
-
Sequential analysis: Some classical problems and new challenges
-
T. L. Lai, "Sequential analysis: some classical problems and new challenges," Statistica Sinica, 11, 303-408, 2001.
-
(2001)
Statistica Sinica
, vol.11
, pp. 303-408
-
-
Lai, T.L.1
-
93
-
-
17444429623
-
A survey of eigenvector methods for Web information retrieval
-
A. Langville and C. Meyer, "A survey of eigenvector methods for Web information retrieval," SIAM Rev., 47(1), 135-161, 2005.
-
(2005)
SIAM Rev
, vol.47
, Issue.1
, pp. 135-161
-
-
Langville, A.1
Meyer, C.2
-
94
-
-
77950823322
-
The return of the active set method
-
S. Leyffer, "The return of the active set method," Oberwolfach Reports, 2(1), 2005.
-
(2005)
Oberwolfach Reports
, vol.2
, Issue.1
-
-
Leyffer, S.1
-
96
-
-
34247381045
-
Swing & swap: User centric approaches towards maximizing location privacy
-
M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, "Swing & swap: User centric approaches towards maximizing location privacy," in Workshop on Privacy in the Electronic Society (WPES), 2006.
-
(2006)
Workshop on Privacy in the Electronic Society (WPES)
-
-
Li, M.1
Sampigethaya, K.2
Huang, L.3
Poovendran, R.4
-
97
-
-
0023382715
-
Distributed algorithms for the computation of noncooperative equilibria
-
S. Li and T. Başar, "Distributed algorithms for the computation of noncooperative equilibria," Automatica, 23(4), 523-533, 1987.
-
(1987)
Automatica
, vol.23
, Issue.4
, pp. 523-533
-
-
Li, S.1
Başar, T.2
-
98
-
-
85149834820
-
Markov games as a framework for multi-agent reinforcement learning
-
San Francisco, CA
-
M. L. Littman, "Markov games as a framework for multi-agent reinforcement learning," in Proc. 11th Intl Conf. on Machine Learning (ICML), San Francisco, CA, 1994, pp. 157-163.
-
(1994)
Proc. 11th Intl Conf. On Machine Learning (ICML)
, pp. 157-163
-
-
Littman, M.L.1
-
99
-
-
70349236493
-
A Bayesian game approach for intrusion detection in wireless ad hoc networks
-
New York, NY, USA: ACM, Oct
-
Y. Liu, C. Comaniciu, and H.Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks," in Proc. 2006 Workshop on Game Theory for Communications and Networks (Game Nets'06). New York, NY, USA: ACM, Oct. 2006, p. 4.
-
(2006)
Proc. 2006 Workshop on Game Theory for Communications and Networks (Game Nets'06)
, pp. 4
-
-
Liu, Y.1
Comaniciu, C.2
Man, H.3
-
101
-
-
0004098975
-
-
ser. Series in Decision and Control. New York, NY, USA: John Wiley & Sons, Inc
-
D. G. Luenberger, Optimization by Vector Space Methods, ser. Series in Decision and Control. New York, NY, USA: John Wiley & Sons, Inc., 1997.
-
(1997)
Optimization by Vector Space Methods
-
-
Luenberger, D.G.1
-
102
-
-
0034250315
-
Analysis of an on-off jamming situation as a dynamic game
-
Aug
-
R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an on-off jamming situation as a dynamic game," IEEE Trans. Commun., 48(8), 1360-1373, Aug. 2000.
-
(2000)
IEEE Trans. Commun
, vol.48
, Issue.8
, pp. 1360-1373
-
-
Mallik, R.1
Scholtz, R.2
Papavassilopoulos, G.3
-
103
-
-
33750721825
-
Machine Learning and Data Mining for Computer Security
-
ed., ser, London, UK: Springer London
-
M. A. Maloof, ed., Machine Learning and Data Mining for Computer Security, ser. Advanced Information and Knowledge Processing. London, UK: Springer London.
-
Advanced Information and Knowledge Processing
-
-
Maloof, M.A.1
-
104
-
-
50649118336
-
Game theory in communication systems
-
Sept
-
N. Mandayam, G. Editor, S. Wicker, J. Walrand, T. Başar, J. Huang, and D. Palomar, "Game theory in communication systems," IEEE J. Selected Areas in Commun. (JSAC), 26(7), 1042-1046, Sept. 2008.
-
(2008)
IEEE J. Selected Areas in Commun. (Jsac)
, vol.26
, Issue.7
, pp. 1042-1046
-
-
Mandayam, N.1
Editor, G.2
Wicker, S.3
Walrand, J.4
Başar, T.5
Huang, J.6
Palomar, D.7
-
105
-
-
33750582517
-
Comments on "correlated jamming on MIMO Gaussian fading channels"
-
Nov
-
W. Mao, X. Su, and X. Xu, "Comments on "correlated jamming on MIMO Gaussian fading channels"," IEEE Trans. Inf. Theor., 52(11), 5163-5165, Nov. 2006.
-
(2006)
IEEE Trans. Inf. Theor
, vol.52
, Issue.11
, pp. 5163-5165
-
-
Mao, W.1
Su, X.2
Xu, X.3
-
106
-
-
3543010849
-
A general pricing scheme for the simplex method
-
I. Maros, "A general pricing scheme for the simplex method," Ann. Oper. Res., 124(1-4), 193-203, 2004.
-
(2004)
Ann. Oper. Res
, vol.124
, Issue.1-4
, pp. 193-203
-
-
Maros, I.1
-
107
-
-
84924719643
-
-
PhD dissertation, Stanford University, Palo Alto, CA, USA, July
-
L. Mastroleon, "Scalable resource control in large-scale computing/networking infrastructures," PhD dissertation, Stanford University, Palo Alto, CA, USA, July 2009.
-
(2009)
Scalable resource control in large-scale computing/networking infrastructures
-
-
Mastroleon, L.1
-
108
-
-
81855194700
-
A graph-theoretic network security game
-
M. Mavronicolas, V. G. Papadopoulou, A. Philippou, and P. G. Spirakis, "A graph-theoretic network security game," Intl J. Auton. Adapt. Commun. Syst., 1(4), 390-410, 2008.
-
(2008)
Intl J. Auton. Adapt. Commun. Syst
, vol.1
, Issue.4
, pp. 390-410
-
-
Mavronicolas, M.1
Papadopoulou, V.G.2
Philippou, A.3
Spirakis, P.G.4
-
109
-
-
71549172083
-
On the windfall of friendship: Inoculation strategies on social networks
-
New York, NY, USA: ACM
-
D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer, "On the windfall of friendship: Inoculation strategies on social networks," in Proc. 9th ACM Conf. on Electronic Commerce (EC). New York, NY, USA: ACM, 2008, pp. 294-301.
-
(2008)
Proc. 9th ACM Conf. On Electronic Commerce (EC)
, pp. 294-301
-
-
Meier, D.1
Oswald, Y.A.2
Schmid, S.3
Wattenhofer, R.4
-
110
-
-
35048836267
-
Handbook of Applied Cryptography
-
ser, Boca Raton, FL: CRC Press, [Online]
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, ser. Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press, 1996. [Online]. Available: http://www.cacr.math.uwaterloo.ca/hac
-
(1996)
Discrete Mathematics and Its Applications
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
112
-
-
38549087035
-
Securerank: A risk-based vulnerability management scheme for computing infrastructures
-
IEEE
-
R. A. Miura-Ko and N. Bambos, "Securerank: A risk-based vulnerability management scheme for computing infrastructures." in Proc. IEEE Conf. on Communication (ICC). IEEE, 2007, pp. 1455-1460.
-
(2007)
Proc. IEEE Conf. On Communication (ICC)
, pp. 1455-1460
-
-
Miura-Ko, R.A.1
Bambos, N.2
-
113
-
-
64549128286
-
Security investment games of interdependent organizations
-
Sept
-
R. A. Miura-Ko, B. Yolken, N. Bambos, and J. Mitchell, "Security investment games of interdependent organizations," in 46th Annual Allerton Conf., Sept. 2008.
-
(2008)
46th Annual Allerton Conf
-
-
Miura-Ko, R.A.1
Yolken, B.2
Bambos, N.3
Mitchell, J.4
-
114
-
-
51749097143
-
Security decision-making among interdependent organizations
-
June
-
R. A. Miura-Ko, B. Yolken, J. Mitchell, and N. Bambos, "Security decision-making among interdependent organizations," in Proc. 21st IEEE Computer Security Foundations Symp. (CSF), June 2008, pp. 66-80.
-
(2008)
Proc. 21st IEEE Computer Security Foundations Symp. (Csf)
, pp. 66-80
-
-
Miura-Ko, R.A.1
Yolken, B.2
Mitchell, J.3
Bambos, N.4
-
115
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Marseille, France
-
D. Moore, C. Shannon, and K. Claffy, "Code-Red: A case study on the spread and victims of an Internet worm," in Proc. ACM SIGCOMMWorkshop on Internet Measurement, Marseille, France, 2002, pp. 273-284.
-
(2002)
Proc. ACM SIGCOMMWorkshop on Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
116
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
April
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proc. 22nd IEEE Conf. on Computer Communications (Infocom), April 2003, vol. 3, pp. 1901-1910.
-
(2003)
Proc. 22nd IEEE Conf. On Computer Communications (Infocom)
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
117
-
-
38149015558
-
New strategies for revocation in ad-hoc networks
-
Cambridge, England, July
-
T. Moore, J. Clulow, S. Nagaraja, and R. Anderson, "New strategies for revocation in ad-hoc networks," in Proc. 4th Euro. Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS), Cambridge, England, July 2007, pp. 232-246.
-
(2007)
Proc. 4th Euro. Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS)
, pp. 232-246
-
-
Moore, T.1
Clulow, J.2
Nagaraja, S.3
Anderson, R.4
-
118
-
-
29244486576
-
A game-theoretic framework for analyzing trustinference protocols
-
Cambridge, MA, USA, June
-
R. Morselli, J. Katz, and B. Bhattacharjee, "A game-theoretic framework for analyzing trustinference protocols," in Proc. 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, MA, USA, June 2004.
-
(2004)
Proc. 2nd Workshop on the Economics of Peer-to-Peer Systems
-
-
Morselli, R.1
Katz, J.2
Bhattacharjee, B.3
-
119
-
-
33748677680
-
When selfish meets evil: Byzantine players in a virus inoculation game
-
New York, NY, USA: ACM, Aug
-
T. Moscibroda, S. Schmid, and R. Wattenhofer, "When selfish meets evil: Byzantine players in a virus inoculation game," in Proc. 25th ACM Symp. on Principles of Distributed Computing (PODC). New York, NY, USA: ACM, Aug. 2006, pp. 35-44.
-
(2006)
Proc. 25th ACM Symp. On Principles of Distributed Computing (PODC)
, pp. 35-44
-
-
Moscibroda, T.1
Schmid, S.2
Wattenhofer, R.3
-
121
-
-
77955362057
-
Dynamic control and mitigation of interdependent IT security risks
-
IEEE Communications Society, May
-
J. Mounzer, T. Alpcan, and N. Bambos, "Dynamic control and mitigation of interdependent IT security risks," in Proc. IEEE Conf. on Communication (ICC). IEEE Communications Society, May 2010.
-
(2010)
Proc. IEEE Conf. On Communication (ICC)
-
-
Mounzer, J.1
Alpcan, T.2
Bambos, N.3
-
122
-
-
2442593945
-
Active set support vector regression
-
March
-
D. R. Musicant and A. Feinberg, "Active set support vector regression," IEEE Trans. Neural Networks, 15(2), 268-275, March 2004.
-
(2004)
IEEE Trans. Neural Networks
, vol.15
, Issue.2
, pp. 268-275
-
-
Musicant, D.R.1
Feinberg, A.2
-
123
-
-
0003757637
-
-
Cambridge, MA, USA: Harvard University Press, Sept
-
R. B. Myerson, Game Theory, Analysis of Conflict. Cambridge, MA, USA: Harvard University Press, Sept. 1991.
-
(1991)
Game Theory, Analysis of Conflict
-
-
Myerson, R.B.1
-
124
-
-
0002021736
-
Equilibrium points in n-person games
-
Jan, [Online]
-
J. F. Nash, "Equilibrium points in n-person games," Proc. Nat. Acad. Sci. USA, 36(1), 48-49, Jan. 1950. [Online]. Available: http://www.jstor.org/stable/88031
-
(1950)
Proc. Nat. Acad. Sci. USA
, vol.36
, Issue.1
, pp. 48-49
-
-
Nash, J.F.1
-
125
-
-
0001730497
-
Noncooperative games
-
Sept, [Online]
-
J. F. Nash, "Noncooperative games," Ann. Math., 54(2), 286-295, Sept. 1951. [Online]. Available: http://www.jstor.org/stable/1969529
-
(1951)
Ann. Math
, vol.54
, Issue.2
, pp. 286-295
-
-
Nash, J.F.1
-
126
-
-
48249157296
-
A decentralized Bayesian attack detection algorithm for network security
-
Milan, Italy, Sept
-
K. C. Nguyen, T. Alpcan, and T. Başar, "A decentralized Bayesian attack detection algorithm for network security," in Proc. 23rd Intl Information Security Conf. (SEC 2008), Milan, Italy, Sept. 2008.
-
(2008)
Proc. 23rd Intl Information Security Conf. (Sec 2008)
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
-
127
-
-
62949244212
-
Distributed hypothesis testing with a fusion center: The conditionally dependent case
-
Cancun, Mexico, Dec
-
K. C. Nguyen, T. Alpcan, and T. Başar, "Distributed hypothesis testing with a fusion center: The conditionally dependent case," in Proc. 47th IEEE Conf. on Decision and Control (CDC), Cancun, Mexico, Dec. 2008.
-
(2008)
Proc. 47th IEEE Conf. On Decision and Control (CDC)
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
-
128
-
-
70449485072
-
Security games with incomplete information
-
Dresden, Germany, June
-
K. C. Nguyen, T. Alpcan, and T. Başar, "Security games with incomplete information," in Proc. IEEE Conf. Commun. (ICC), Dresden, Germany, June 2009.
-
(2009)
Proc. IEEE Conf. Commun. (ICC)
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
-
129
-
-
70350000208
-
Stochastic games for security in networks with interdependent nodes
-
Istanbul, Turkey, May
-
K. C. Nguyen, T. Alpcan, and T. Başar, "Stochastic games for security in networks with interdependent nodes," in Proc. Intl Conf. on Game Theory for Networks (GameNets), Istanbul, Turkey, May 2009.
-
(2009)
Proc. Intl Conf. On Game Theory for Networks (GameNets)
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
-
130
-
-
78649433065
-
Fictitious play with time-invariant frequency update for network security
-
Yokohama, Japan, September
-
K. C. Nguyen, T. Alpcan, and T. Başar, "Fictitious play with time-invariant frequency update for network security," in Proc. IEEE Multi-Conference on Systems and Control (MSC) and IEEE CCA, Yokohama, Japan, September 2010.
-
(2010)
Proc. IEEE Multi-Conference on Systems and Control (MSC) and IEEE CCA
-
-
Nguyen, K.C.1
Alpcan, T.2
Başar, T.3
-
131
-
-
0004257599
-
-
San Francisco, CA, USA: Morgan Kaufmann
-
J. Nielsen, Usability Engineering. San Francisco, CA, USA: Morgan Kaufmann, 1994.
-
(1994)
Usability Engineering
-
-
Nielsen, J.1
-
132
-
-
84926080684
-
-
New York, NY, USA: Cambridge University Press
-
N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic Game Theory. New York, NY, USA: Cambridge University Press, 2007.
-
(2007)
Algorithmic Game Theory
-
-
Nisan, N.1
Roughgarden, T.2
Tardos, E.3
Vazirani, V.V.4
-
133
-
-
33749040643
-
A Bayesian framework for online reputation systems
-
Washington, DC, USA: IEEE Computer Society
-
P. Nurmi, "A Bayesian framework for online reputation systems," in Proc. Advd Intl Conf. on Telecommunications and Intl Conf. on Internet and Web Applications and Services (AICT-ICIW). Washington, DC, USA: IEEE Computer Society, 2006, p. 121.
-
(2006)
Proc. Advd Intl Conf. On Telecommunications and Intl Conf. On Internet and Web Applications and Services (AICT-ICIW)
, pp. 121
-
-
Nurmi, P.1
-
134
-
-
0003564548
-
-
4th edn. Upper Saddle River, NJ: Prentice Hall
-
K. Ogata, Modern Control Engineering, 4th edn. Upper Saddle River, NJ: Prentice Hall, 2002.
-
(2002)
Modern Control Engineering
-
-
Ogata, K.1
-
135
-
-
0003427725
-
-
ser. MIT Press Books. Cambridge, MA, USA: MIT Press, Dec
-
M. J. Osborne and A. Rubinstein, A Course in Game Theory, ser. MIT Press Books. Cambridge, MA, USA: MIT Press, Dec. 1994, vol. 1, no. 0262650401.
-
(1994)
A Course in Game Theory
, vol.1
-
-
Osborne, M.J.1
Rubinstein, A.2
-
136
-
-
0004260006
-
-
3rd edn. New York, NY: Academic Press
-
G. Owen, Game Theory, 3rd edn. New York, NY: Academic Press, 2001.
-
(2001)
Game Theory
-
-
Owen, G.1
-
137
-
-
0003716450
-
-
New York, NY, USA: Interscience Publishers
-
L. Pontryagin, V. Boltyanskii, R. Gamkrelidze, and E. Mishchenko, The Mathematical Theory of Optimal Processes. New York, NY, USA: Interscience Publishers, 1962.
-
(1962)
The Mathematical Theory of Optimal Processes
-
-
Pontryagin, L.1
Boltyanskii, V.2
Gamkrelidze, R.3
Mishchenko, E.4
-
139
-
-
33749037166
-
A framework for MAC protocol misbehavior detection in wireless networks
-
New York, NY, USA: ACM, Nov
-
S. Radosavac, J. S. Baras, and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks," in Proc. 4th ACM Workshop on Wireless Security (WiSe '05). New York, NY, USA: ACM, Nov. 2005, pp. 33-42.
-
(2005)
Proc. 4th ACM Workshop on Wireless Security (WiSe '05)
, pp. 33-42
-
-
Radosavac, S.1
Baras, J.S.2
Koutsopoulos, I.3
-
141
-
-
70349267771
-
Revocation games in ephemeral networks
-
Alexandria, Virginia, USA, Oct
-
M. Raya, M. H. Manshaei, M. Felegyhazi, and J.-P. Hubaux, "Revocation games in ephemeral networks," in Proc. 15th ACM Conf. on Computer Security (CCS), Alexandria, Virginia, USA, Oct. 2008, pp. 199-210.
-
(2008)
Proc. 15th ACM Conf. On Computer Security (CCS)
, pp. 199-210
-
-
Raya, M.1
Manshaei, M.H.2
Felegyhazi, M.3
Hubaux, J.-P.4
-
143
-
-
34547637688
-
Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system
-
ser. Advances in Applied Microeconomics, M. R. Baye, ed. Amsterdam: Elsevier Science
-
P. Resnick and R. Zeckhauser, "Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system," in The Economics of the Internet and E-Commerce, ser. Advances in Applied Microeconomics, M. R. Baye, ed. Amsterdam: Elsevier Science, 2002, vol. 11, pp. 127-157.
-
(2002)
The Economics of the Internet and E-Commerce
, vol.11
, pp. 127-157
-
-
Resnick, P.1
Zeckhauser, R.2
-
144
-
-
77954463396
-
The value of reputation on eBay: A controlled experiment
-
P. Resnick, R. J. Zeckhauser, J. Swanson, and K. Lockwood, "The value of reputation on eBay: A controlled experiment," SSRN eLibrary, 2002.
-
(2002)
SSRN eLibrary
-
-
Resnick, P.1
Zeckhauser, R.J.2
Swanson, J.3
Lockwood, K.4
-
145
-
-
0001402950
-
The mathematical theory of optimal processes
-
September, [Online]
-
J. Robinson, "The mathematical theory of optimal processes," Ann Math., 54(2), 296-301, September 1951. [Online]. Available: http://www.jstor.org/stable/1969530
-
(1951)
Ann Math
, vol.54
, Issue.2
, pp. 296-301
-
-
Robinson, J.1
-
146
-
-
31844444645
-
The detection of RCS worm epidemics
-
Fairfax, VA
-
K. Rohloff and T. Başar, "The detection of RCS worm epidemics," in Proc. ACM Workshop on Rapid Malcode, Fairfax, VA, 2005, pp. 81-86.
-
(2005)
Proc. ACM Workshop on Rapid Malcode
, pp. 81-86
-
-
Rohloff, K.1
Başar, T.2
-
147
-
-
0000579136
-
Existence and uniqueness of equilibrium points for concave n-person games
-
July
-
J. B. Rosen, "Existence and uniqueness of equilibrium points for concave n-person games," Econometrica, 33(3), 520-534, July 1965.
-
(1965)
Econometrica
, vol.33
, Issue.3
, pp. 520-534
-
-
Rosen, J.B.1
-
150
-
-
77954531996
-
Coalitional game theory for security risk management
-
Barcelona, Spain, May
-
W. Saad, T. Alpcan, T. Başar, and A. Hjørungnes, "Coalitional game theory for security risk management," in Proc. 5th Intl Conf. on Internet Monitoring and Protection (ICIMP), Barcelona, Spain, May 2010.
-
(2010)
Proc. 5th Intl Conf. On Internet Monitoring and Protection (ICIMP)
-
-
Saad, W.1
Alpcan, T.2
Başar, T.3
Hjørungnes, A.4
-
151
-
-
85032772246
-
Coalitional game theory for communication networks: A tutorial
-
Sept
-
W. Saad, Z. Han, M. Debbah, A. Hjørungnes, and T. Başar, "Coalitional game theory for communication networks: A tutorial," IEEE Signal Process. Mag., Special issue on Game Theory in Signal Processing and Communications, 26(5), 77-97, Sept. 2009.
-
(2009)
IEEE Signal Process. Mag., Special issue on Game Theory in Signal Processing and Communications
, vol.26
, Issue.5
, pp. 77-97
-
-
Saad, W.1
Han, Z.2
Debbah, M.3
Hjørungnes, A.4
Başar, T.5
-
152
-
-
0022682990
-
Hypothesis testing in a distributed environment
-
March
-
F. A. Sadjadi, "Hypothesis testing in a distributed environment," IEEE Trans. Aerosp. Electron. Syst., AES-22(2), 134-137, March 1986.
-
(1986)
IEEE Trans. Aerosp. Electron. Syst
, vol.AES-22
, Issue.2
, pp. 134-137
-
-
Sadjadi, F.A.1
-
154
-
-
63749110244
-
A game-theoretic analysis of denial of service attacks in wireless random access
-
July
-
Y. E. Sagduyu and A. Ephremides, "A game-theoretic analysis of denial of service attacks in wireless random access," J. Wireless Networks, 15, 651-666, July 2009.
-
(2009)
J. Wireless Networks
, vol.15
, pp. 651-666
-
-
Sagduyu, Y.E.1
Ephremides, A.2
-
155
-
-
61849136266
-
-
PhD dissertation, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, Department of Telematics
-
K. Sallhammar, "Stochastic models for combined security and dependability evaluation," PhD dissertation, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, Department of Telematics, 2007.
-
(2007)
Stochastic models for combined security and dependability evaluation
-
-
Sallhammar, K.1
-
156
-
-
57049149967
-
CARAVAN: Providing location privacy for VANET
-
K. Sampigethaya, L. Huang, M. Li, R. Poovendran, K. Matsuura, and K. Sezaki, "CARAVAN: Providing location privacy for VANET," in Proc. Embedded Security in Cars Conf. (ESCAR), 2005.
-
(2005)
Proc. Embedded Security in Cars Conf. (ESCAR)
-
-
Sampigethaya, K.1
Huang, L.2
Li, M.3
Poovendran, R.4
Matsuura, K.5
Sezaki, K.6
-
157
-
-
0035482607
-
Pricing and power control in a multicell wireless data network
-
Oct
-
C. U. Saraydar, N. Mandayam, and D. Goodman, "Pricing and power control in a multicell wireless data network," IEEE J. Sel. Areas Commun., pp. 1883-1892, Oct. 2001.
-
(2001)
IEEE J. Sel. Areas Commun
, pp. 1883-1892
-
-
Saraydar, C.U.1
Mandayam, N.2
Goodman, D.3
-
158
-
-
33745798002
-
An efficient implementation of an active set method for SVMs
-
Dec
-
K. Scheinberg, "An efficient implementation of an active set method for SVMs," J. Mach. Learning Res., 7, 2237-2257, Dec. 2006.
-
(2006)
J. Mach. Learning Res
, vol.7
, pp. 2237-2257
-
-
Scheinberg, K.1
-
159
-
-
84971645552
-
A malware detector placement game for intrusion detection
-
Malaga, Spain, Oct
-
S. Schmidt, T. Alpcan, S. Albayrak, T. Başar, and A. Muller, "A malware detector placement game for intrusion detection," in Proc. 2nd Intl Workshop on Critical Information Infrastructures Security (CRITIS), Malaga, Spain, Oct. 2007.
-
(2007)
Proc. 2nd Intl Workshop on Critical Information Infrastructures Security (CRITIS)
-
-
Schmidt, S.1
Alpcan, T.2
Albayrak, S.3
Başar, T.4
Muller, A.5
-
161
-
-
29344447400
-
-
Indianapolis, IN, USA: Wiley Publishing
-
B. Schneier, Schneier on Security. Indianapolis, IN, USA: Wiley Publishing, 2008.
-
(2008)
Schneier on Security
-
-
Schneier, B.1
-
162
-
-
0003408420
-
-
Cambridge, MA, USA: MIT Press
-
B. Scholkopf and A. J. Smola, Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond. Cambridge, MA, USA: MIT Press, 2002.
-
(2002)
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
-
-
Scholkopf, B.1
Smola, A.J.2
-
163
-
-
3843059082
-
Unified convergence proofs of continuous-time fictitious play
-
July
-
J. S. Shamma and G. Arslan, "Unified convergence proofs of continuous-time fictitious play," IEEE Trans. Autom. Control, 49(7), 1137-1141, July 2004.
-
(2004)
IEEE Trans. Autom. Control
, vol.49
, Issue.7
, pp. 1137-1141
-
-
Shamma, J.S.1
Arslan, G.2
-
164
-
-
16244381482
-
Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
-
March
-
J. S. Shamma and G. Arslan, "Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria," IEEE Trans. Autom. Control, 50(3), 312-327, March 2005.
-
(2005)
IEEE Trans. Autom. Control
, vol.50
, Issue.3
, pp. 312-327
-
-
Shamma, J.S.1
Arslan, G.2
-
165
-
-
34548158488
-
An ontology for network security attacks
-
ser. Lecture Notes in Computer Science. Kathmandu, Nepal: Springer, Oct
-
A. Simmonds, P. Sandilands, and L. van Ekert, "An ontology for network security attacks," in Proc. 2nd Asian Applied Computing Conf. (AACC), ser. Lecture Notes in Computer Science. Kathmandu, Nepal: Springer, Oct. 2004, vol. 3285/2004, pp. 317-323.
-
(2004)
Proc. 2nd Asian Applied Computing Conf. (Aacc)
, vol.3285
, Issue.2004
, pp. 317-323
-
-
Simmonds, A.1
Sandilands, P.2
Van Ekert, L.3
-
168
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
May
-
M. Strasser, S. Capkun, C. Popper, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symp. on Security and Privacy (SP 2008), May 2008, pp. 64-78.
-
(2008)
Proc. Ieee Symp. On Security and Privacy (SP 2008)
, pp. 64-78
-
-
Strasser, M.1
Capkun, S.2
Popper, C.3
Cagalj, M.4
-
169
-
-
25844461901
-
Locating network monitors: Complexity, heuristics, and coverage
-
Miami, FL, March
-
K. Suh, Y. Guo, J. Kurose, and D. Towsley, "Locating network monitors: Complexity, heuristics, and coverage," in Proc. 24th IEEE Conf. on Computer Communications (Infocom), Miami, FL, March 2005, vol. 1, pp. 351-361.
-
(2005)
Proc. 24th IEEE Conf. On Computer Communications (Infocom)
, vol.1
, pp. 351-361
-
-
Suh, K.1
Guo, Y.2
Kurose, J.3
Towsley, D.4
-
171
-
-
0004141908
-
-
2nd edn. Upper Saddle River, NJ, USA: Prentice-Hall, Inc
-
A. S. Tanenbaum, Computer Networks, 2nd edn. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1988.
-
(1988)
Computer Networks
-
-
Tanenbaum, A.S.1
-
175
-
-
0000526328
-
Decentralized detection
-
H. V. Poor and J. B. Thomas, eds. Grenuich CT: JAI Press
-
J. N. Tsitsiklis, "Decentralized detection," in Advances in Signal Processing, H. V. Poor and J. B. Thomas, eds. Grenuich CT: JAI Press, 1993, vol. 2, pp. 297-344.
-
(1993)
Advances in Signal Processing
, vol.2
, pp. 297-344
-
-
Tsitsiklis, J.N.1
-
176
-
-
0027580482
-
Extremal properties of likelihood-ratio quantizers
-
J. N. Tsitsiklis, "Extremal properties of likelihood-ratio quantizers," IEEE Trans. Commun., 41(4), 550-558, 1993.
-
(1993)
IEEE Trans. Commun
, vol.41
, Issue.4
, pp. 550-558
-
-
Tsitsiklis, J.N.1
-
177
-
-
0022062265
-
On the complexity of decentralized decision making and detection problems
-
[Online]
-
J. N. Tsitsiklis and M. Athans, "On the complexity of decentralized decision making and detection problems," IEEE Trans. Autom. Control, 30(5), 440-446, 1985. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1103988
-
(1985)
IEEE Trans. Autom. Control
, vol.30
, Issue.5
, pp. 440-446
-
-
Tsitsiklis, J.N.1
Athans, M.2
-
178
-
-
50249187796
-
Decentralized detection with correlated observations
-
Pacific Grove, CA, USA, Nov
-
J. Unnikrishnan and V. V. Veeravalli, "Decentralized detection with correlated observations," in Proc. Asilomar Conf. on Signals, Systems, and Computers, Pacific Grove, CA, USA, Nov. 2007.
-
(2007)
Proc. Asilomar Conf. On Signals, Systems, and Computers
-
-
Unnikrishnan, J.1
Veeravalli, V.V.2
-
179
-
-
21244466146
-
Zur Theorie der Gesellschaftsspiele
-
Dec
-
J. von Neumann, "Zur Theorie der Gesellschaftsspiele," Mathematische Annalen, 100(1), 295-320, Dec. 1928.
-
(1928)
Mathematische Annalen
, vol.100
, Issue.1
, pp. 295-320
-
-
von Neumann, J.1
-
181
-
-
0003462953
-
-
New York, NY, USA: John Wiley & Sons
-
H. L. Van Trees, Detection, Estimation and Modulation Theory. New York, NY, USA: John Wiley & Sons, 1968, vol. I.
-
(1968)
Detection, Estimation and Modulation Theory
, vol.1
-
-
Van Trees, H.L.1
-
183
-
-
0004044453
-
-
Chicago, IL, USA: University of Chicago Press
-
D. Vaughan, The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. Chicago, IL, USA: University of Chicago Press.
-
The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA
-
-
Vaughan, D.1
-
184
-
-
0027558370
-
Decentralized sequential detection with a fusion center performing the sequential test
-
V. V. Veeravalli, T. Başar, and H. V. Poor, "Decentralized sequential detection with a fusion center performing the sequential test," IEEE Trans. on Inf. Theor., 39(2), 433-442, 1993.
-
(1993)
IEEE Trans. On Inf. Theor
, vol.39
, Issue.2
, pp. 433-442
-
-
Veeravalli, V.V.1
Başar, T.2
Poor, H.V.3
-
185
-
-
33646949922
-
Decentralized sequential detection with sensors performing sequential tests
-
V. V. Veeravalli, T. Başar, and H. V. Poor, "Decentralized sequential detection with sensors performing sequential tests," Math. Signals, Systs, and Control, 7(4), 292-306, 1994.
-
(1994)
Math. Signals, Systs, and Control
, vol.7
, Issue.4
, pp. 292-306
-
-
Veeravalli, V.V.1
Başar, T.2
Poor, H.V.3
-
186
-
-
0028202724
-
Minimax robust decentralized detection
-
V. V. Veeravalli, T. Başar, and H. V. Poor, "Minimax robust decentralized detection," IEEE Trans. Inf. Theor., 40(1), 35-40, 1994.
-
(1994)
IEEE Trans. Inf. Theor
, vol.40
, Issue.1
, pp. 35-40
-
-
Veeravalli, V.V.1
Başar, T.2
Poor, H.V.3
-
187
-
-
77954629748
-
Active-set methods for support vector machines
-
L. Wang, ed. Berlin, Heidelberg: Springer-Verlag, Aug
-
M. Vogt and V. Kecman, "Active-set methods for support vector machines," in Support Vector Machines: Theory and Applications, L. Wang, ed. Berlin, Heidelberg: Springer-Verlag, Aug. 2005, pp. 133-158.
-
(2005)
Support Vector Machines: Theory and Applications
, pp. 133-158
-
-
Vogt, M.1
Kecman, V.2
-
189
-
-
0003503387
-
-
New York, NY, USA: Dover Phoenix Editions
-
A. Wald, Sequential Analysis. New York, NY, USA: Dover Phoenix Editions, 2004.
-
(2004)
Sequential Analysis
-
-
Wald, A.1
-
190
-
-
0034505212
-
The good, bad, and ugly: Distributed detection of a known signal in dependent gaussian noise
-
Dec
-
P. Willett, P. F. Swaszek, and R. S. Blum, "The good, bad, and ugly: Distributed detection of a known signal in dependent gaussian noise," IEEE Trans. Signal Process., 48, 3266-3279, Dec. 2000.
-
(2000)
IEEE Trans. Signal Process
, vol.48
, pp. 3266-3279
-
-
Willett, P.1
Swaszek, P.F.2
Blum, R.S.3
-
192
-
-
0025559201
-
Jamming games in slotted ALOHA packet radio networks
-
Morleley, CA, Sept. 30-Oct. 3
-
J. Zander, "Jamming games in slotted ALOHA packet radio networks," in IEEE Military Communications Conference (MILCOM), Morleley, CA, 1990, vol. 2, Sept. 30-Oct. 3, pp. 830-834.
-
(1990)
IEEE Military Communications Conference (MILCOM)
, vol.2
, pp. 830-834
-
-
Zander, J.1
-
193
-
-
84899013566
-
Ranking on data manifolds
-
D. Zhou, J. Weston, A. Gretton, O. Bousquet, and B. Schölkopf, "Ranking on data manifolds," in Proc. NIPS, 2004, pp. 169-176.
-
(2004)
Proc. NIPS
, pp. 169-176
-
-
Zhou, D.1
Weston, J.2
Gretton, A.3
Bousquet, O.4
Schölkopf, B.5
-
194
-
-
70349338950
-
Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments
-
Washington, DC, USA: IEEE Computer Society
-
F. Zhu and W. Zhu, "Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments," in Proc. IEEE Intl Conf. on Pervasive Computing and Communications (PERCOM). Washington, DC, USA: IEEE Computer Society, 2009, pp. 1-8.
-
(2009)
Proc. IEEE Intl Conf. On Pervasive Computing and Communications (PERCOM)
, pp. 1-8
-
-
Zhu, F.1
Zhu, W.2
-
195
-
-
57749114040
-
Cyclic equilibria in markov games
-
Vancouver, BC, Canada, December
-
M. Zinkevich, A. Greenwald, and M. L. Littman, "Cyclic equilibria in markov games," in Proc. Neural Information Processing Systems (NIPS), Vancouver, BC, Canada, December 2005.
-
(2005)
Proc. Neural Information Processing Systems (NIPS)
-
-
Zinkevich, M.1
Greenwald, A.2
Littman, M.L.3
-
196
-
-
14944368398
-
Worm propogation modeling and analysis under dynamic quarantine defense
-
Washington, DC
-
C. Zou, W. Gong, and D. Towsley, "Worm propogation modeling and analysis under dynamic quarantine defense," in Proc. ACM Workshop on Rapid Malcode, Washington, DC, 2003, pp. 51-60.
-
(2003)
Proc. ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
|