-
4
-
-
84884404306
-
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks
-
In: Cavallaro, L., Gollmann, D. (eds.), LNCS, Springer, Heidelberg
-
Ilia, P., Oikonomou, G., Tryfonas, T.: Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks. In: Cavallaro, L., Gollmann, D. (eds.) WISTP 2013. LNCS, vol. 7886, pp. 34–49. Springer, Heidelberg (2013)
-
(2013)
WISTP 2013
, vol.7886
, pp. 34-49
-
-
Ilia, P.1
Oikonomou, G.2
Tryfonas, T.3
-
5
-
-
84874403749
-
Wireless sensor network security: A survey, in book chapter of security
-
In: Xiao, Y. (ed.), CRC Press
-
Walters, J.P., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A survey, in book chapter of security. In: Xiao, Y. (ed.) Distributed, Grid, and Pervasive Computing, pp. 0–849. CRC Press (2007)
-
(2007)
Distributed, Grid, and Pervasive Computing
, pp. 849
-
-
Walters, J.P.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
6
-
-
67650416963
-
Protecting against network infections: A game theoretic perspective
-
IEEE
-
Omic, J., Orda, A., Van Mieghem, P.: Protecting against network infections: A game theoretic perspective. In: INFOCOM 2009, pp. 1485–1493. IEEE (2009)
-
(2009)
INFOCOM 2009
, pp. 1485-1493
-
-
Omic, J.1
Orda, A.2
Van Mieghem, P.3
-
7
-
-
84920923270
-
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
-
In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.), Springer, Heidelberg
-
Spyridopoulos, T., Oikonomou, G., Tryfonas, T., Ge, M.: Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. In: Janczewski, L.J., Wolfe, H.B., Shenoi, S. (eds.) SEC 2013. IFIP AICT, vol. 405, pp. 28–41. Springer, Heidelberg (2013)
-
(2013)
SEC 2013. IFIP AICT
, vol.405
, pp. 28-41
-
-
Spyridopoulos, T.1
Oikonomou, G.2
Tryfonas, T.3
Ge, M.4
-
9
-
-
77951729734
-
A survey of game theory as applied to network security
-
IEEE
-
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), pp. 1–10. IEEE (2010)
-
(2010)
2010 43Rd Hawaii International Conference on System Sciences (HICSS)
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
10
-
-
84885184956
-
A game theoretic defence framework against dos/ddos cyber attacks
-
Spyridopoulos, T., Karanikas, G., Tryfonas, T., Oikonomou, G.: A game theoretic defence framework against dos/ddos cyber attacks. Computers & Security 38, 39–50 (2013)
-
(2013)
Computers & Security
, vol.38
, pp. 39-50
-
-
Spyridopoulos, T.1
Karanikas, G.2
Tryfonas, T.3
Oikonomou, G.4
-
11
-
-
78650626363
-
On modeling and simulation of game theory-based defense mechanisms against dos and ddos attacks
-
Wu, Q., Shiva, S., Roy, S., Ellis, C., Datla, V.: On modeling and simulation of game theory-based defense mechanisms against dos and ddos attacks. In: Proceedings of the 2010 Spring Simulation Multiconference, Society for Computer Simulation International, 159 (2010)
-
(2010)
Proceedings of the 2010 Spring Simulation Multiconference, Society for Computer Simulation International
, vol.159
-
-
Wu, Q.1
Shiva, S.2
Roy, S.3
Ellis, C.4
Datla, V.5
-
12
-
-
84875094020
-
A game-theoretic approach to security and power conservation in wireless sensor networks
-
Asadi, M., Zimmerman, C., Agah, A.: A game-theoretic approach to security and power conservation in wireless sensor networks. IJ Network Security 15(1), 50–58 (2013)
-
(2013)
IJ Network Security
, vol.15
, Issue.1
, pp. 50-58
-
-
Asadi, M.1
Zimmerman, C.2
Agah, A.3
-
14
-
-
79961201214
-
Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows
-
IEEE
-
Bedi, H.S., Roy, S., Shiva, S.: Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows. In: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp. 129–136. IEEE (2011)
-
(2011)
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
, pp. 129-136
-
-
Bedi, H.S.1
Roy, S.2
Shiva, S.3
-
17
-
-
46449128945
-
Transmission of ipv6 packets over ieee 802.15. 4 networks
-
Montenegro, G., Kushalnagar, N., Hui, J., Culler, D.: Transmission of ipv6 packets over ieee 802.15. 4 networks. Internet proposed standard RFC 4944 (2007)
-
(2007)
Internet Proposed Standard RFC
, vol.4944
-
-
Montenegro, G.1
Kushalnagar, N.2
Hui, J.3
Culler, D.4
|