메뉴 건너뛰기




Volumn 9780521119320, Issue , 2010, Pages 1-314

Network security: A decision and Game-Theoretic approach

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX NETWORKS; DECISION MAKING; GAME THEORY; MACHINE DESIGN; MALWARE; REVIEWS; RISK MANAGEMENT; STUDENTS;

EID: 84924666047     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1017/CBO9780511760778     Document Type: Book
Times cited : (495)

References (196)
  • 1
    • 18844454790 scopus 로고    scopus 로고
    • Intrusion detection in sensor networks: A noncooperative game approach
    • Washington, DC, USA: IEEE Computer Society
    • A. Agah, S. K. Das, K. Basu, and M. Asadi, "Intrusion detection in sensor networks: A noncooperative game approach," in Proc. 3rd Intl Symp. on Network Computing and Applications (NCA). Washington, DC, USA: IEEE Computer Society, 2004, pp. 343-346.
    • (2004) Proc. 3Rd Intl Symp. On Network Computing and Applications (NCA) , pp. 343-346
    • Agah, A.1    Das, S.K.2    Basu, K.3    Asadi, M.4
  • 3
    • 0019529857 scopus 로고
    • Solution of nonsymmetric linear complementarity problems by iterative methods
    • B. H. Ahn, "Solution of nonsymmetric linear complementarity problems by iterative methods," J. Optimization Theor. Applic., 33, 185-197, 1981.
    • (1981) J. Optimization Theor. Applic , vol.33 , pp. 185-197
    • Ahn, B.H.1
  • 5
    • 1542288809 scopus 로고    scopus 로고
    • A game theoretic approach to decision and analysis in network intrusion detection
    • Maui, HI, Dec
    • T. Alpcan and T. Başar, "A game theoretic approach to decision and analysis in network intrusion detection," in Proc. 42nd IEEE Conf. on Decision and Control (CDC), Maui, HI, Dec. 2003, pp. 2595-2600.
    • (2003) Proc. 42Nd IEEE Conf. On Decision and Control (CDC) , pp. 2595-2600
    • Alpcan, T.1    Başar, T.2
  • 6
    • 14344257107 scopus 로고    scopus 로고
    • A game theoretic analysis of intrusion detection in access control systems
    • Paradise Island, Bahamas, Dec
    • T. Alpcan and T. Başar, "A game theoretic analysis of intrusion detection in access control systems," in Proc. 43rd IEEE Conf. on Decision and Control (CDC), Paradise Island, Bahamas, Dec. 2004, pp. 1568-1573.
    • (2004) Proc. 43rd IEEE Conf. On Decision and Control (CDC) , pp. 1568-1573
    • Alpcan, T.1    Başar, T.2
  • 8
  • 10
    • 0036847044 scopus 로고    scopus 로고
    • CDMA uplink power control as a noncooperative game
    • Nov
    • T. Alpcan, T. Başar, R. Srikant, and E. Altman, "CDMA uplink power control as a noncooperative game," Wireless Networks, 8(6), 659-670, Nov. 2002.
    • (2002) Wireless Networks , vol.8 , Issue.6 , pp. 659-670
    • Alpcan, T.1    Başar, T.2    Srikant, R.3    Altman, E.4
  • 15
    • 46749114372 scopus 로고    scopus 로고
    • Power control for multicell CDMA wireless networks: A team optimization approach
    • Oct
    • T. Alpcan, X. Fan, T. Başar, M. Arcak, and J. T. Wen, "Power control for multicell CDMA wireless networks: A team optimization approach," Wireless Networks, 14(5), 647-657, Oct. 2008.
    • (2008) Wireless Networks , vol.14 , Issue.5 , pp. 647-657
    • Alpcan, T.1    Fan, X.2    Başar, T.3    Arcak, M.4    Wen, J.T.5
  • 21
    • 0032115196 scopus 로고    scopus 로고
    • Multiuser rate-based flow control
    • July
    • E. Altman and T. Başar, "Multiuser rate-based flow control," IEEE Trans. Commun., 46(7), 940-949, July 1998.
    • (1998) IEEE Trans. Commun , vol.46 , Issue.7 , pp. 940-949
    • Altman, E.1    Başar, T.2
  • 24
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • Kent Ridge Digital Labs, Singapore
    • S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," in Proc. 6th ACM Conf. on Computer and Communications Security (CCS), Kent Ridge Digital Labs, Singapore, 1999, pp. 1-7.
    • (1999) Proc. 6th ACM Conf. On Computer and Communications Security (CCS) , pp. 1-7
    • Axelsson, S.1
  • 25
    • 0003907293 scopus 로고    scopus 로고
    • Indianapolis, IN, USA: Macmillan Technical Publishing
    • R. G. Bace, Intrusion Detection. Indianapolis, IN, USA: Macmillan Technical Publishing, 2000.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 27
    • 38249035395 scopus 로고
    • Relaxation techniques and asynchronous algorithms for on-line computation of noncooperative equilibria
    • Dec
    • T. Başar, "Relaxation techniques and asynchronous algorithms for on-line computation of noncooperative equilibria," J. Econ. Dyn. Control, 11(4), 531-549, Dec. 1987.
    • (1987) J. Econ. Dyn. Control , vol.11 , Issue.4 , pp. 531-549
    • Başar, T.1
  • 30
    • 0024662808 scopus 로고
    • Distributed computation of nash equilibria in linear-quadratic stochastic differential games
    • T. Başar and S. Li, "Distributed computation of nash equilibria in linear-quadratic stochastic differential games," SIAM J. Control Optim., 27(3), 563-578, 1989.
    • (1989) SIAM J. Control Optim , vol.27 , Issue.3 , pp. 563-578
    • Başar, T.1    Li, S.2
  • 32
    • 54249153458 scopus 로고    scopus 로고
    • Image tagging using pagerank over bipartite graphs
    • G. Rigoll, ed. Berlin /Heidelberg: Springer
    • C. Bauckhage, "Image tagging using pagerank over bipartite graphs," in LNCS: Pattern Recognition, G. Rigoll, ed. Berlin /Heidelberg: Springer, 2008, vol. 5096/2008.
    • (2008) LNCS: Pattern Recognition , vol.5096 , Issue.2008
    • Bauckhage, C.1
  • 34
    • 12444269117 scopus 로고    scopus 로고
    • Fictitious play in 2xn games
    • U. Berger, "Fictitious play in 2xn games," J. Econ. Theor., 120(2), 139-154, 2005.
    • (2005) J. Econ. Theor , vol.120 , Issue.2 , pp. 139-154
    • Berger, U.1
  • 35
    • 0003713964 scopus 로고    scopus 로고
    • 2nd edn. Belmont, MA: Athena Scientific
    • D. Bertsekas, Nonlinear Programming, 2nd edn. Belmont, MA: Athena Scientific, 1999.
    • (1999) Nonlinear Programming
    • Bertsekas, D.1
  • 37
    • 0003794137 scopus 로고
    • 2nd edn. Upper Saddle River, NJ: Prentice Hall
    • D. Bertsekas and R. Gallager, Data Networks. 2nd edn. Upper Saddle River, NJ: Prentice Hall, 1992.
    • (1992) Data Networks
    • Bertsekas, D.1    Gallager, R.2
  • 44
    • 85032400156 scopus 로고    scopus 로고
    • Optimal and robust epidemic response for multiple networks
    • (to appear)
    • M. Bloem, T. Alpcan, and T. Başar, "Optimal and robust epidemic response for multiple networks," IFAC Control Eng Practice (to appear).
    • IFAC Control Eng Practice
    • Bloem, M.1    Alpcan, T.2    Başar, T.3
  • 47
    • 24744432675 scopus 로고    scopus 로고
    • Self-policing mobile ad hoc networks by reputation systems
    • July
    • S. Buchegger and J.-Y. Le Boudee, "Self-policing mobile ad hoc networks by reputation systems," IEEE Commun. Mag., 43(7), 101-107, July 2005.
    • (2005) IEEE Commun. Mag , vol.43 , Issue.7 , pp. 101-107
    • Buchegger, S.1    Le Boudee, J.-Y.2
  • 53
    • 4344595999 scopus 로고    scopus 로고
    • Asymptotic results for decentralized detection in power constrained wireless sensor networks
    • Aug
    • J.-F. Chamberland and V. V. Veeravalli, "Asymptotic results for decentralized detection in power constrained wireless sensor networks," IEEE J. Sel. Areas in Commun., 22(6), 1007-1015, Aug. 2004.
    • (2004) IEEE J. Sel. Areas in Commun , vol.22 , Issue.6 , pp. 1007-1015
    • Chamberland, J.-F.1    Veeravalli, V.V.2
  • 54
    • 33750590109 scopus 로고    scopus 로고
    • How dense should a sensor network be for detection with correlated observations?
    • J.-F. Chamberland and V. V. Veeravalli, "How dense should a sensor network be for detection with correlated observations?" IEEE Trans. Inf. Theor., 52(11), 5099-5106, 2006.
    • (2006) IEEE Trans. Inf. Theor , vol.52 , Issue.11 , pp. 5099-5106
    • Chamberland, J.-F.1    Veeravalli, V.V.2
  • 57
    • 39549096209 scopus 로고    scopus 로고
    • Effectiveness of quarantine in worm epidemics
    • Istanbul, Turkey, June
    • T. M. Chen and N. Jamil, "Effectiveness of quarantine in worm epidemics," in Proc. IEEE Conf. on Communication (ICC), Istanbul, Turkey, June 2006, pp. 2142-2147.
    • (2006) Proc. Ieee Conf. On Communication (ICC) , pp. 2142-2147
    • Chen, T.M.1    Jamil, N.2
  • 60
    • 33645311516 scopus 로고    scopus 로고
    • Reality mining: Sensing complex social systems
    • N. Eagle and A. S. Pentland, "Reality mining: Sensing complex social systems," Personal Ubiquitous Comput., 10(4), 255-268, 2006.
    • (2006) Personal Ubiquitous Comput , vol.10 , Issue.4 , pp. 255-268
    • Eagle, N.1    Pentland, A.S.2
  • 64
    • 33645673382 scopus 로고    scopus 로고
    • Nash equilibria of packet forwarding strategies in wireless ad hoc networks
    • M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Trans. Mob. Comput, 5(5), 463-476, 2006.
    • (2006) IEEE Trans. Mob. Comput , vol.5 , Issue.5 , pp. 463-476
    • Felegyhazi, M.1    Hubaux, J.-P.2    Buttyan, L.3
  • 69
    • 33747031937 scopus 로고    scopus 로고
    • The IT security model
    • Oct./Nov
    • P. D. Groom, "The IT security model," IEEE Potentials, 22(4), 6-8, Oct./Nov. 2003.
    • (2003) IEEE Potentials , vol.22 , Issue.4 , pp. 6-8
    • Groom, P.D.1
  • 71
    • 57349198694 scopus 로고    scopus 로고
    • Secure or insure?: A game-theoretic analysis of information security games
    • New York, NY, USA: ACM
    • J. Grossklags, N. Christin, and J. Chuang, "Secure or insure?: A game-theoretic analysis of information security games," in Proc. 17th Intl Conf. on World Wide Web (WWW). New York, NY, USA: ACM, 2008, pp. 209-218.
    • (2008) Proc. 17th Intl Conf. On World Wide Web (WWW) , pp. 209-218
    • Grossklags, J.1    Christin, N.2    Chuang, J.3
  • 74
    • 77950877250 scopus 로고    scopus 로고
    • So long, and no thanks for the externalities: The rational rejection of security advice by users
    • New York, NY, USA: ACM
    • C. Herley, "So long, and no thanks for the externalities: The rational rejection of security advice by users," in Proc. 2009 Workshop on New Security Paradigms (NSPW). New York, NY, USA: ACM, 2009, pp. 133-144.
    • (2009) Proc. 2009 Workshop on New Security Paradigms (NSPW) , pp. 133-144
    • Herley, C.1
  • 75
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • H. W. Hethcote, "The mathematics of infectious diseases," SIAM Rev., 42(4), 599-653, 2000.
    • (2000) SIAM Rev , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 76
    • 84898823335 scopus 로고    scopus 로고
    • Building projectable classifiers of arbitrary complexity
    • Washington, DC, USA: IEEE Computer Society
    • T. K. Ho and E. M. Kleinberg, "Building projectable classifiers of arbitrary complexity," in Proc. 13th Intl Conf. on Pattern Recognition (ICPR). Washington, DC, USA: IEEE Computer Society, 1996, p. 880.
    • (1996) Proc. 13th Intl Conf. On Pattern Recognition (ICPR) , pp. 880
    • Ho, T.K.1    Kleinberg, E.M.2
  • 77
    • 0024736656 scopus 로고
    • Distributed Bayesian signal detection
    • Sept
    • I. Y. Hoballah and P. K. Varshney, "Distributed Bayesian signal detection," IEEE Trans. Inf. Theor., 35(5), 995-1000, Sept. 1989.
    • (1989) IEEE Trans. Inf. Theor , vol.35 , Issue.5 , pp. 995-1000
    • Hoballah, I.Y.1    Varshney, P.K.2
  • 78
    • 0004151494 scopus 로고
    • New York, NY: Cambridge University Press
    • R. Horn and C. Johnson, Matrix Analysis. New York, NY: Cambridge University Press, 1985.
    • (1985) Matrix Analysis
    • Horn, R.1    Johnson, C.2
  • 80
    • 0000375621 scopus 로고
    • A robust version of the probability ratio test
    • P. J. Huber, "A robust version of the probability ratio test," Ann. Math. Statist., 36, 1753-1758, 1965.
    • (1965) Ann. Math. Statist , vol.36 , pp. 1753-1758
    • Huber, P.J.1
  • 82
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systs, 43(2), 618-644, 2007.
    • (2007) Decision Support Systs , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 83
    • 0003792312 scopus 로고
    • Upper Saddle River, NJ, USA: Prentice Hall
    • T. Kailath, Linear Systems. Upper Saddle River, NJ, USA: Prentice Hall, 1980.
    • (1980) Linear Systems
    • Kailath, T.1
  • 85
    • 33750317385 scopus 로고    scopus 로고
    • Kernels for graphs
    • B. Schölkopf, K. Tsuda, and J.-P. Vert, eds. Cambridge, MA, USA: MIT Press
    • H. Kashima, K. Tsuda, and A. Inokuchi, "Kernels for graphs," in Kernel Methods in Computational Biology, B. Schölkopf, K. Tsuda, and J.-P. Vert, eds. Cambridge, MA, USA: MIT Press, 2004, pp. 155-170.
    • (2004) Kernel Methods in Computational Biology , pp. 155-170
    • Kashima, H.1    Tsuda, K.2    Inokuchi, A.3
  • 86
    • 4544354908 scopus 로고    scopus 로고
    • Correlated jamming on MIMO Gaussian fading channels
    • Sept
    • A. Kashyap, T. Başar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," IEEE Trans. Inf. Theory, 50(9), 2119-2123, Sept. 2004.
    • (2004) IEEE Trans. Inf. Theory , vol.50 , Issue.9 , pp. 2119-2123
    • Kashyap, A.1    Başar, T.2    Srikant, R.3
  • 87
    • 84924746260 scopus 로고    scopus 로고
    • Asymptotically optimal quantization for detection in power constrained decentralized networks
    • Minneapolis, MN, USA, June
    • A. Kashyap, T. Başar, and R. Srikant, "Asymptotically optimal quantization for detection in power constrained decentralized networks," in Proc. 2006 American Control Conf. (ACC), Minneapolis, MN, USA, June 2006, pp. 14-16.
    • (2006) Proc. 2006 American Control Conf. (Acc) , pp. 14-16
    • Kashyap, A.1    Başar, T.2    Srikant, R.3
  • 88
    • 0042474230 scopus 로고    scopus 로고
    • Detecting network intrusions via sampling: A game theoretic approach
    • San Fransisco, CA, April
    • M. Kodialam and T. V. Lakshman, "Detecting network intrusions via sampling: A game theoretic approach," in Proc. 22nd IEEE Conf. on Computer Communications (Infocom), San Fransisco, CA, April 2003, vol. 3, pp. 1880-1889.
    • (2003) Proc. 22nd IEEE Conf. On Computer Communications (Infocom) , vol.3 , pp. 1880-1889
    • Kodialam, M.1    Lakshman, T.V.2
  • 89
    • 1942532330 scopus 로고    scopus 로고
    • Feedback control applied to survivability: A host-based autonomic defense system
    • March
    • O. Kreidl and T. Frazier, "Feedback control applied to survivability: A host-based autonomic defense system," IEEE Trans. Reliability, 53(1), 148-166, March 2004.
    • (2004) IEEE Trans. Reliability , vol.53 , Issue.1 , pp. 148-166
    • Kreidl, O.1    Frazier, T.2
  • 92
    • 0346405517 scopus 로고    scopus 로고
    • Sequential analysis: Some classical problems and new challenges
    • T. L. Lai, "Sequential analysis: some classical problems and new challenges," Statistica Sinica, 11, 303-408, 2001.
    • (2001) Statistica Sinica , vol.11 , pp. 303-408
    • Lai, T.L.1
  • 93
    • 17444429623 scopus 로고    scopus 로고
    • A survey of eigenvector methods for Web information retrieval
    • A. Langville and C. Meyer, "A survey of eigenvector methods for Web information retrieval," SIAM Rev., 47(1), 135-161, 2005.
    • (2005) SIAM Rev , vol.47 , Issue.1 , pp. 135-161
    • Langville, A.1    Meyer, C.2
  • 94
    • 77950823322 scopus 로고    scopus 로고
    • The return of the active set method
    • S. Leyffer, "The return of the active set method," Oberwolfach Reports, 2(1), 2005.
    • (2005) Oberwolfach Reports , vol.2 , Issue.1
    • Leyffer, S.1
  • 97
    • 0023382715 scopus 로고
    • Distributed algorithms for the computation of noncooperative equilibria
    • S. Li and T. Başar, "Distributed algorithms for the computation of noncooperative equilibria," Automatica, 23(4), 523-533, 1987.
    • (1987) Automatica , vol.23 , Issue.4 , pp. 523-533
    • Li, S.1    Başar, T.2
  • 98
    • 85149834820 scopus 로고
    • Markov games as a framework for multi-agent reinforcement learning
    • San Francisco, CA
    • M. L. Littman, "Markov games as a framework for multi-agent reinforcement learning," in Proc. 11th Intl Conf. on Machine Learning (ICML), San Francisco, CA, 1994, pp. 157-163.
    • (1994) Proc. 11th Intl Conf. On Machine Learning (ICML) , pp. 157-163
    • Littman, M.L.1
  • 101
    • 0004098975 scopus 로고    scopus 로고
    • ser. Series in Decision and Control. New York, NY, USA: John Wiley & Sons, Inc
    • D. G. Luenberger, Optimization by Vector Space Methods, ser. Series in Decision and Control. New York, NY, USA: John Wiley & Sons, Inc., 1997.
    • (1997) Optimization by Vector Space Methods
    • Luenberger, D.G.1
  • 102
    • 0034250315 scopus 로고    scopus 로고
    • Analysis of an on-off jamming situation as a dynamic game
    • Aug
    • R. Mallik, R. Scholtz, and G. Papavassilopoulos, "Analysis of an on-off jamming situation as a dynamic game," IEEE Trans. Commun., 48(8), 1360-1373, Aug. 2000.
    • (2000) IEEE Trans. Commun , vol.48 , Issue.8 , pp. 1360-1373
    • Mallik, R.1    Scholtz, R.2    Papavassilopoulos, G.3
  • 103
    • 33750721825 scopus 로고    scopus 로고
    • Machine Learning and Data Mining for Computer Security
    • ed., ser, London, UK: Springer London
    • M. A. Maloof, ed., Machine Learning and Data Mining for Computer Security, ser. Advanced Information and Knowledge Processing. London, UK: Springer London.
    • Advanced Information and Knowledge Processing
    • Maloof, M.A.1
  • 105
    • 33750582517 scopus 로고    scopus 로고
    • Comments on "correlated jamming on MIMO Gaussian fading channels"
    • Nov
    • W. Mao, X. Su, and X. Xu, "Comments on "correlated jamming on MIMO Gaussian fading channels"," IEEE Trans. Inf. Theor., 52(11), 5163-5165, Nov. 2006.
    • (2006) IEEE Trans. Inf. Theor , vol.52 , Issue.11 , pp. 5163-5165
    • Mao, W.1    Su, X.2    Xu, X.3
  • 106
    • 3543010849 scopus 로고    scopus 로고
    • A general pricing scheme for the simplex method
    • I. Maros, "A general pricing scheme for the simplex method," Ann. Oper. Res., 124(1-4), 193-203, 2004.
    • (2004) Ann. Oper. Res , vol.124 , Issue.1-4 , pp. 193-203
    • Maros, I.1
  • 112
    • 38549087035 scopus 로고    scopus 로고
    • Securerank: A risk-based vulnerability management scheme for computing infrastructures
    • IEEE
    • R. A. Miura-Ko and N. Bambos, "Securerank: A risk-based vulnerability management scheme for computing infrastructures." in Proc. IEEE Conf. on Communication (ICC). IEEE, 2007, pp. 1455-1460.
    • (2007) Proc. IEEE Conf. On Communication (ICC) , pp. 1455-1460
    • Miura-Ko, R.A.1    Bambos, N.2
  • 115
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red: A case study on the spread and victims of an Internet worm
    • Marseille, France
    • D. Moore, C. Shannon, and K. Claffy, "Code-Red: A case study on the spread and victims of an Internet worm," in Proc. ACM SIGCOMMWorkshop on Internet Measurement, Marseille, France, 2002, pp. 273-284.
    • (2002) Proc. ACM SIGCOMMWorkshop on Internet Measurement , pp. 273-284
    • Moore, D.1    Shannon, C.2    Claffy, K.3
  • 121
    • 77955362057 scopus 로고    scopus 로고
    • Dynamic control and mitigation of interdependent IT security risks
    • IEEE Communications Society, May
    • J. Mounzer, T. Alpcan, and N. Bambos, "Dynamic control and mitigation of interdependent IT security risks," in Proc. IEEE Conf. on Communication (ICC). IEEE Communications Society, May 2010.
    • (2010) Proc. IEEE Conf. On Communication (ICC)
    • Mounzer, J.1    Alpcan, T.2    Bambos, N.3
  • 122
    • 2442593945 scopus 로고    scopus 로고
    • Active set support vector regression
    • March
    • D. R. Musicant and A. Feinberg, "Active set support vector regression," IEEE Trans. Neural Networks, 15(2), 268-275, March 2004.
    • (2004) IEEE Trans. Neural Networks , vol.15 , Issue.2 , pp. 268-275
    • Musicant, D.R.1    Feinberg, A.2
  • 124
    • 0002021736 scopus 로고
    • Equilibrium points in n-person games
    • Jan, [Online]
    • J. F. Nash, "Equilibrium points in n-person games," Proc. Nat. Acad. Sci. USA, 36(1), 48-49, Jan. 1950. [Online]. Available: http://www.jstor.org/stable/88031
    • (1950) Proc. Nat. Acad. Sci. USA , vol.36 , Issue.1 , pp. 48-49
    • Nash, J.F.1
  • 125
    • 0001730497 scopus 로고
    • Noncooperative games
    • Sept, [Online]
    • J. F. Nash, "Noncooperative games," Ann. Math., 54(2), 286-295, Sept. 1951. [Online]. Available: http://www.jstor.org/stable/1969529
    • (1951) Ann. Math , vol.54 , Issue.2 , pp. 286-295
    • Nash, J.F.1
  • 127
    • 62949244212 scopus 로고    scopus 로고
    • Distributed hypothesis testing with a fusion center: The conditionally dependent case
    • Cancun, Mexico, Dec
    • K. C. Nguyen, T. Alpcan, and T. Başar, "Distributed hypothesis testing with a fusion center: The conditionally dependent case," in Proc. 47th IEEE Conf. on Decision and Control (CDC), Cancun, Mexico, Dec. 2008.
    • (2008) Proc. 47th IEEE Conf. On Decision and Control (CDC)
    • Nguyen, K.C.1    Alpcan, T.2    Başar, T.3
  • 131
    • 0004257599 scopus 로고
    • San Francisco, CA, USA: Morgan Kaufmann
    • J. Nielsen, Usability Engineering. San Francisco, CA, USA: Morgan Kaufmann, 1994.
    • (1994) Usability Engineering
    • Nielsen, J.1
  • 134
    • 0003564548 scopus 로고    scopus 로고
    • 4th edn. Upper Saddle River, NJ: Prentice Hall
    • K. Ogata, Modern Control Engineering, 4th edn. Upper Saddle River, NJ: Prentice Hall, 2002.
    • (2002) Modern Control Engineering
    • Ogata, K.1
  • 135
    • 0003427725 scopus 로고
    • ser. MIT Press Books. Cambridge, MA, USA: MIT Press, Dec
    • M. J. Osborne and A. Rubinstein, A Course in Game Theory, ser. MIT Press Books. Cambridge, MA, USA: MIT Press, Dec. 1994, vol. 1, no. 0262650401.
    • (1994) A Course in Game Theory , vol.1
    • Osborne, M.J.1    Rubinstein, A.2
  • 136
    • 0004260006 scopus 로고    scopus 로고
    • 3rd edn. New York, NY: Academic Press
    • G. Owen, Game Theory, 3rd edn. New York, NY: Academic Press, 2001.
    • (2001) Game Theory
    • Owen, G.1
  • 143
    • 34547637688 scopus 로고    scopus 로고
    • Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system
    • ser. Advances in Applied Microeconomics, M. R. Baye, ed. Amsterdam: Elsevier Science
    • P. Resnick and R. Zeckhauser, "Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system," in The Economics of the Internet and E-Commerce, ser. Advances in Applied Microeconomics, M. R. Baye, ed. Amsterdam: Elsevier Science, 2002, vol. 11, pp. 127-157.
    • (2002) The Economics of the Internet and E-Commerce , vol.11 , pp. 127-157
    • Resnick, P.1    Zeckhauser, R.2
  • 145
    • 0001402950 scopus 로고
    • The mathematical theory of optimal processes
    • September, [Online]
    • J. Robinson, "The mathematical theory of optimal processes," Ann Math., 54(2), 296-301, September 1951. [Online]. Available: http://www.jstor.org/stable/1969530
    • (1951) Ann Math , vol.54 , Issue.2 , pp. 296-301
    • Robinson, J.1
  • 147
    • 0000579136 scopus 로고
    • Existence and uniqueness of equilibrium points for concave n-person games
    • July
    • J. B. Rosen, "Existence and uniqueness of equilibrium points for concave n-person games," Econometrica, 33(3), 520-534, July 1965.
    • (1965) Econometrica , vol.33 , Issue.3 , pp. 520-534
    • Rosen, J.B.1
  • 152
    • 0022682990 scopus 로고
    • Hypothesis testing in a distributed environment
    • March
    • F. A. Sadjadi, "Hypothesis testing in a distributed environment," IEEE Trans. Aerosp. Electron. Syst., AES-22(2), 134-137, March 1986.
    • (1986) IEEE Trans. Aerosp. Electron. Syst , vol.AES-22 , Issue.2 , pp. 134-137
    • Sadjadi, F.A.1
  • 154
    • 63749110244 scopus 로고    scopus 로고
    • A game-theoretic analysis of denial of service attacks in wireless random access
    • July
    • Y. E. Sagduyu and A. Ephremides, "A game-theoretic analysis of denial of service attacks in wireless random access," J. Wireless Networks, 15, 651-666, July 2009.
    • (2009) J. Wireless Networks , vol.15 , pp. 651-666
    • Sagduyu, Y.E.1    Ephremides, A.2
  • 155
    • 61849136266 scopus 로고    scopus 로고
    • PhD dissertation, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, Department of Telematics
    • K. Sallhammar, "Stochastic models for combined security and dependability evaluation," PhD dissertation, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, Department of Telematics, 2007.
    • (2007) Stochastic models for combined security and dependability evaluation
    • Sallhammar, K.1
  • 157
    • 0035482607 scopus 로고    scopus 로고
    • Pricing and power control in a multicell wireless data network
    • Oct
    • C. U. Saraydar, N. Mandayam, and D. Goodman, "Pricing and power control in a multicell wireless data network," IEEE J. Sel. Areas Commun., pp. 1883-1892, Oct. 2001.
    • (2001) IEEE J. Sel. Areas Commun , pp. 1883-1892
    • Saraydar, C.U.1    Mandayam, N.2    Goodman, D.3
  • 158
    • 33745798002 scopus 로고    scopus 로고
    • An efficient implementation of an active set method for SVMs
    • Dec
    • K. Scheinberg, "An efficient implementation of an active set method for SVMs," J. Mach. Learning Res., 7, 2237-2257, Dec. 2006.
    • (2006) J. Mach. Learning Res , vol.7 , pp. 2237-2257
    • Scheinberg, K.1
  • 161
    • 29344447400 scopus 로고    scopus 로고
    • Indianapolis, IN, USA: Wiley Publishing
    • B. Schneier, Schneier on Security. Indianapolis, IN, USA: Wiley Publishing, 2008.
    • (2008) Schneier on Security
    • Schneier, B.1
  • 163
    • 3843059082 scopus 로고    scopus 로고
    • Unified convergence proofs of continuous-time fictitious play
    • July
    • J. S. Shamma and G. Arslan, "Unified convergence proofs of continuous-time fictitious play," IEEE Trans. Autom. Control, 49(7), 1137-1141, July 2004.
    • (2004) IEEE Trans. Autom. Control , vol.49 , Issue.7 , pp. 1137-1141
    • Shamma, J.S.1    Arslan, G.2
  • 164
    • 16244381482 scopus 로고    scopus 로고
    • Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria
    • March
    • J. S. Shamma and G. Arslan, "Dynamic fictitious play, dynamic gradient play, and distributed convergence to nash equilibria," IEEE Trans. Autom. Control, 50(3), 312-327, March 2005.
    • (2005) IEEE Trans. Autom. Control , vol.50 , Issue.3 , pp. 312-327
    • Shamma, J.S.1    Arslan, G.2
  • 165
    • 34548158488 scopus 로고    scopus 로고
    • An ontology for network security attacks
    • ser. Lecture Notes in Computer Science. Kathmandu, Nepal: Springer, Oct
    • A. Simmonds, P. Sandilands, and L. van Ekert, "An ontology for network security attacks," in Proc. 2nd Asian Applied Computing Conf. (AACC), ser. Lecture Notes in Computer Science. Kathmandu, Nepal: Springer, Oct. 2004, vol. 3285/2004, pp. 317-323.
    • (2004) Proc. 2nd Asian Applied Computing Conf. (Aacc) , vol.3285 , Issue.2004 , pp. 317-323
    • Simmonds, A.1    Sandilands, P.2    Van Ekert, L.3
  • 171
    • 0004141908 scopus 로고
    • 2nd edn. Upper Saddle River, NJ, USA: Prentice-Hall, Inc
    • A. S. Tanenbaum, Computer Networks, 2nd edn. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1988.
    • (1988) Computer Networks
    • Tanenbaum, A.S.1
  • 175
    • 0000526328 scopus 로고
    • Decentralized detection
    • H. V. Poor and J. B. Thomas, eds. Grenuich CT: JAI Press
    • J. N. Tsitsiklis, "Decentralized detection," in Advances in Signal Processing, H. V. Poor and J. B. Thomas, eds. Grenuich CT: JAI Press, 1993, vol. 2, pp. 297-344.
    • (1993) Advances in Signal Processing , vol.2 , pp. 297-344
    • Tsitsiklis, J.N.1
  • 176
    • 0027580482 scopus 로고
    • Extremal properties of likelihood-ratio quantizers
    • J. N. Tsitsiklis, "Extremal properties of likelihood-ratio quantizers," IEEE Trans. Commun., 41(4), 550-558, 1993.
    • (1993) IEEE Trans. Commun , vol.41 , Issue.4 , pp. 550-558
    • Tsitsiklis, J.N.1
  • 177
    • 0022062265 scopus 로고
    • On the complexity of decentralized decision making and detection problems
    • [Online]
    • J. N. Tsitsiklis and M. Athans, "On the complexity of decentralized decision making and detection problems," IEEE Trans. Autom. Control, 30(5), 440-446, 1985. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1103988
    • (1985) IEEE Trans. Autom. Control , vol.30 , Issue.5 , pp. 440-446
    • Tsitsiklis, J.N.1    Athans, M.2
  • 179
    • 21244466146 scopus 로고
    • Zur Theorie der Gesellschaftsspiele
    • Dec
    • J. von Neumann, "Zur Theorie der Gesellschaftsspiele," Mathematische Annalen, 100(1), 295-320, Dec. 1928.
    • (1928) Mathematische Annalen , vol.100 , Issue.1 , pp. 295-320
    • von Neumann, J.1
  • 184
    • 0027558370 scopus 로고
    • Decentralized sequential detection with a fusion center performing the sequential test
    • V. V. Veeravalli, T. Başar, and H. V. Poor, "Decentralized sequential detection with a fusion center performing the sequential test," IEEE Trans. on Inf. Theor., 39(2), 433-442, 1993.
    • (1993) IEEE Trans. On Inf. Theor , vol.39 , Issue.2 , pp. 433-442
    • Veeravalli, V.V.1    Başar, T.2    Poor, H.V.3
  • 185
    • 33646949922 scopus 로고
    • Decentralized sequential detection with sensors performing sequential tests
    • V. V. Veeravalli, T. Başar, and H. V. Poor, "Decentralized sequential detection with sensors performing sequential tests," Math. Signals, Systs, and Control, 7(4), 292-306, 1994.
    • (1994) Math. Signals, Systs, and Control , vol.7 , Issue.4 , pp. 292-306
    • Veeravalli, V.V.1    Başar, T.2    Poor, H.V.3
  • 187
    • 77954629748 scopus 로고    scopus 로고
    • Active-set methods for support vector machines
    • L. Wang, ed. Berlin, Heidelberg: Springer-Verlag, Aug
    • M. Vogt and V. Kecman, "Active-set methods for support vector machines," in Support Vector Machines: Theory and Applications, L. Wang, ed. Berlin, Heidelberg: Springer-Verlag, Aug. 2005, pp. 133-158.
    • (2005) Support Vector Machines: Theory and Applications , pp. 133-158
    • Vogt, M.1    Kecman, V.2
  • 189
    • 0003503387 scopus 로고    scopus 로고
    • New York, NY, USA: Dover Phoenix Editions
    • A. Wald, Sequential Analysis. New York, NY, USA: Dover Phoenix Editions, 2004.
    • (2004) Sequential Analysis
    • Wald, A.1
  • 190
    • 0034505212 scopus 로고    scopus 로고
    • The good, bad, and ugly: Distributed detection of a known signal in dependent gaussian noise
    • Dec
    • P. Willett, P. F. Swaszek, and R. S. Blum, "The good, bad, and ugly: Distributed detection of a known signal in dependent gaussian noise," IEEE Trans. Signal Process., 48, 3266-3279, Dec. 2000.
    • (2000) IEEE Trans. Signal Process , vol.48 , pp. 3266-3279
    • Willett, P.1    Swaszek, P.F.2    Blum, R.S.3
  • 192
    • 0025559201 scopus 로고
    • Jamming games in slotted ALOHA packet radio networks
    • Morleley, CA, Sept. 30-Oct. 3
    • J. Zander, "Jamming games in slotted ALOHA packet radio networks," in IEEE Military Communications Conference (MILCOM), Morleley, CA, 1990, vol. 2, Sept. 30-Oct. 3, pp. 830-834.
    • (1990) IEEE Military Communications Conference (MILCOM) , vol.2 , pp. 830-834
    • Zander, J.1
  • 194
    • 70349338950 scopus 로고    scopus 로고
    • Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments
    • Washington, DC, USA: IEEE Computer Society
    • F. Zhu and W. Zhu, "Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments," in Proc. IEEE Intl Conf. on Pervasive Computing and Communications (PERCOM). Washington, DC, USA: IEEE Computer Society, 2009, pp. 1-8.
    • (2009) Proc. IEEE Intl Conf. On Pervasive Computing and Communications (PERCOM) , pp. 1-8
    • Zhu, F.1    Zhu, W.2
  • 196
    • 14944368398 scopus 로고    scopus 로고
    • Worm propogation modeling and analysis under dynamic quarantine defense
    • Washington, DC
    • C. Zou, W. Gong, and D. Towsley, "Worm propogation modeling and analysis under dynamic quarantine defense," in Proc. ACM Workshop on Rapid Malcode, Washington, DC, 2003, pp. 51-60.
    • (2003) Proc. ACM Workshop on Rapid Malcode , pp. 51-60
    • Zou, C.1    Gong, W.2    Towsley, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.