메뉴 건너뛰기




Volumn 455, Issue , 2015, Pages 601-615

Application of a game theoretic approach in smart sensor data trustworthiness problems

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET PROTOCOLS; INTRUSION DETECTION; MIDDLEWARE; NETWORK SECURITY; SENSOR NODES;

EID: 84942693590     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-319-18467-8_40     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 4
    • 84884404306 scopus 로고    scopus 로고
    • Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
    • In: Cavallaro, L., Gollmann, D. (eds.), LNCS, Springer, Heidelberg
    • Ilia, P., Oikonomou, G., Tryfonas, T.: Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. In: Cavallaro, L., Gollmann, D. (eds.) WISTP 2013. LNCS, vol. 7886, pp. 34–49. Springer, Heidelberg (2013)
    • (2013) WISTP 2013 , vol.7886 , pp. 34-49
    • Ilia, P.1    Oikonomou, G.2    Tryfonas, T.3
  • 5
    • 84874403749 scopus 로고    scopus 로고
    • Wireless sensor network security: A survey, in book chapter of security
    • In: Xiao, Y. (ed.), CRC Press
    • Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A survey, in book chapter of security. In: Xiao, Y. (ed.) Distributed, Grid, and Pervasive Computing, pp. 0–849. CRC Press (2007)
    • (2007) Distributed, Grid, and Pervasive Computing , pp. 849
    • Walters, J.P.1    Liang, Z.2    Shi, W.3    Chaudhary, V.4
  • 6
    • 67650416963 scopus 로고    scopus 로고
    • Protecting against network infections: A game theoretic perspective
    • IEEE
    • Omic, J., Orda, A., Van Mieghem, P.: Protecting against network infections: A game theoretic perspective. In: INFOCOM 2009, pp. 1485–1493. IEEE (2009)
    • (2009) INFOCOM 2009 , pp. 1485-1493
    • Omic, J.1    Orda, A.2    Van Mieghem, P.3
  • 7
    • 84920923270 scopus 로고    scopus 로고
    • Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
    • In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.), Springer, Heidelberg
    • Spyridopoulos, T., Oikonomou, G., Tryfonas, T., Ge, M.: Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IFIP AICT, vol. 405, pp. 28–41. Springer, Heidelberg (2013)
    • (2013) SEC 2013. IFIP AICT , vol.405 , pp. 28-41
    • Spyridopoulos, T.1    Oikonomou, G.2    Tryfonas, T.3    Ge, M.4
  • 12
    • 84875094020 scopus 로고    scopus 로고
    • A game-theoretic approach to security and power conservation in wireless sensor networks
    • Asadi, M., Zimmerman, C., Agah, A.: A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security 15(1), 50–58 (2013)
    • (2013) IJ Network Security , vol.15 , Issue.1 , pp. 50-58
    • Asadi, M.1    Zimmerman, C.2    Agah, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.