-
1
-
-
79957667257
-
Interference alignment for secrecy
-
Jun.
-
O. O. Koyluoglu, H. El Gamal, L. Lai, and H. V. Poor, "Interference alignment for secrecy," IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3323-3332, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.6
, pp. 3323-3332
-
-
Koyluoglu, O.O.1
El Gamal, H.2
Lai, L.3
Poor, H.V.4
-
2
-
-
45249119255
-
Secure communications over fading channels
-
Jun.
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communications over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
3
-
-
45249085230
-
Secure communication with a fading eavesdropper channel
-
Z. Li, R. Yates, and W. Trappe, "Secure communication with a fading eavesdropper channel," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), 2007, pp. 1296-1300.
-
(2007)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 1296-1300
-
-
Li, Z.1
Yates, R.2
Trappe, W.3
-
5
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. MobiHoc, 2005, pp. 46-57.
-
(2005)
Proc. MobiHoc
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
7
-
-
84924125001
-
Jamming attack defense
-
Tilborg H. C. A and S. Jajodia, Eds. New York, NY, USA: Springer
-
W. Xu, "Jamming attack defense," in Encyclopedia of Cryptography and Security, Tilborg H. C. A and S. Jajodia, Eds. New York, NY, USA: Springer, 2011, pp. 655-661.
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 655-661
-
-
Xu, W.1
-
8
-
-
84855466075
-
Anti-jamming games in multi-channel cognitive radio networks
-
Jan.
-
Y. Wu, B. Wang, K. J. R Liu, and T. C. Clancy, "Anti-jamming games in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 4-15, Jan. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.1
, pp. 4-15
-
-
Wu, Y.1
Wang, B.2
Liu, K.J.R.3
Clancy, T.C.4
-
9
-
-
77955691304
-
Jamming games for power controlled medium access with dynamic traffic
-
Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games for power controlled medium access with dynamic traffic," in Proc. IEEE Int. Symp. Inf. Theory (ISIT), 2010, pp. 1818-1822.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory (ISIT)
, pp. 1818-1822
-
-
Sagduyu, Y.E.1
Berry, R.A.2
Ephremides, A.3
-
10
-
-
77955406659
-
-
Ph.D. dissertation, Dept. Elect. Comput. Eng., Louisiana State University, Baton Rouge, LA, USA
-
G. T Amariucai, "Physical security in wireless networks: Intelligent jamming and eavesdropping," Ph.D. dissertation, Dept. Elect. Comput. Eng., Louisiana State University, Baton Rouge, LA, USA, 2009.
-
(2009)
Physical Security in Wireless Networks: Intelligent Jamming and Eavesdropping
-
-
Amariucai, G.T.1
-
11
-
-
79951614632
-
Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
-
A. Mukherjee and A. L. Swindlehurst, "Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels," in Proc. Mil. Commun. Conf. (MILCOM), 2010, pp. 1695-1700.
-
(2010)
Proc. Mil. Commun. Conf. (MILCOM)
, pp. 1695-1700
-
-
Mukherjee, A.1
Swindlehurst, A.L.2
-
12
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Basar, "Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach," in Proc. Mil. Commun. Conf. (MILCOM), 2011, pp. 119-124.
-
(2011)
Proc. Mil. Commun. Conf. (MILCOM)
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Basar, T.5
-
13
-
-
84891361828
-
The eavesdropping and jamming dilemma in multi-channel communications
-
A. Garnaev and W. Trappe, "The eavesdropping and jamming dilemma in multi-channel communications," in Proc. IEEE Int. Conf. Commun. (ICC), 2013, pp. 753-757.
-
(2013)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 753-757
-
-
Garnaev, A.1
Trappe, W.2
-
14
-
-
84943235784
-
To eavesdrop or jam, that is the question
-
M. H. Sherif, A. Mellouk, J. Li, and P. Bellavista, Eds. New York, NY, USA: Springer
-
A. Garnaev andW. Trappe, "To eavesdrop or jam, that is the question," in Ad Hoc Networks, M. H. Sherif, A. Mellouk, J. Li, and P. Bellavista, Eds. New York, NY, USA: Springer, 2014, pp. 146-161.
-
(2014)
Ad Hoc Networks
, pp. 146-161
-
-
Garnaev, A.1
Trappe, W.2
-
15
-
-
84927643338
-
Secret communication when the eavesdropper might be an active adversary
-
M. Jonsson, A. Vinel, B. Bellalta, and E. Belyaev, Eds. New York, NY, USA: Springer
-
A. Garnaev and W. Trappe, "Secret communication when the eavesdropper might be an active adversary," in Multiple Access Communications, M. Jonsson, A. Vinel, B. Bellalta, and E. Belyaev, Eds. New York, NY, USA: Springer, 2014, pp. 121-136.
-
(2014)
Multiple Access Communications
, pp. 121-136
-
-
Garnaev, A.1
Trappe, W.2
-
16
-
-
84874284297
-
Game theory meets network security and privacy
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux, "Game theory meets network security and privacy," ACM Comput. Survey, vol. 45, no. 3, pp. 1-45, 2013.
-
(2013)
ACM Comput. Survey
, vol.45
, Issue.3
, pp. 1-45
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.-P.5
-
17
-
-
50649125455
-
Game theoretic modeling of malicious users in collaborative networks
-
Sep.
-
G. Theodorakopoulos and J. S. Baras, "Game theoretic modeling of malicious users in collaborative networks," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1317-1327, Sep. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.7
, pp. 1317-1327
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
18
-
-
52449084729
-
Challenges to applying game theory to the domain of information warfare
-
S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, "Challenges to applying game theory to the domain of information warfare," in Proc. 4th Inf. Survivability Workshop (ISW'02), 2002, 4pp.
-
(2002)
Proc. 4th Inf. Survivability Workshop (ISW'02)
-
-
Hamilton, S.N.1
Miller, W.L.2
Ott, A.3
Saydjari, O.S.4
-
19
-
-
84904708169
-
Incorporating attacktype uncertainty into network protection
-
Aug.
-
A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, "Incorporating attacktype uncertainty into network protection," IEEE Trans. Inf. Forensics Security, vol. 9, no. 8, pp. 1278-1287, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.8
, pp. 1278-1287
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
20
-
-
84869597150
-
Jamming game in a dynamic slotted ALOHA network
-
R. Jain and R. Kannan, Eds. New York, NY, USA: Springer
-
A. Garnaev, Y. Hayel, E. Altman, and K. Avrachenkov, "Jamming game in a dynamic slotted ALOHA network," in Game Theory for Networks, R. Jain and R. Kannan, Eds. New York, NY, USA: Springer, 2012, pp. 429-443.
-
(2012)
Game Theory for Networks
, pp. 429-443
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
Avrachenkov, K.4
-
21
-
-
63749110244
-
A game-theoretic analysis of denial of service attacks in wireless random access
-
Y. E. Sagduyu and A. Ephremidess, "A game-theoretic analysis of denial of service attacks in wireless random access," J. Wireless Netw., vol. 15, pp. 651-666, 2009.
-
(2009)
J. Wireless Netw.
, vol.15
, pp. 651-666
-
-
Sagduyu, Y.E.1
Ephremidess, A.2
-
22
-
-
70350000208
-
Stochastic games for security in networks with interdependent nodes
-
K. C. Nguyen, T. Alpcan, and T. Basar, "Stochastic games for security in networks with interdependent nodes," in Proc. Int. Conf. Game Theory Netw. (GameNets), 2009, pp. 697-703.
-
(2009)
Proc. Int. Conf. Game Theory Netw. (GameNets)
, pp. 697-703
-
-
Nguyen, K.C.1
Alpcan, T.2
Basar, T.3
-
23
-
-
79953200186
-
An anti-jamming stochastic game for cognitive radio networks
-
Apr.
-
B. Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, "An anti-jamming stochastic game for cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 29, no. 4, pp. 877-889, Apr. 2011.
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.4
, pp. 877-889
-
-
Wang, B.1
Wu, Y.2
Liu, K.J.R.3
Clancy, T.C.4
-
24
-
-
84924182115
-
Anti-jamming strategies: A stochastic game approach
-
R. Aguero, T. Zinner, R. Goleva, A. Timm-Giel, and P. Tran-Gia, Eds. New York, NY, USA: Springer
-
A. Garnaev and W. Trappe, "Anti-jamming strategies: A stochastic game approach," in Mobile Networks and Management, R. Aguero, T. Zinner, R. Goleva, A. Timm-Giel, and P. Tran-Gia, Eds. New York, NY, USA: Springer, 2015, pp. 230-243.
-
(2015)
Mobile Networks and Management
, pp. 230-243
-
-
Garnaev, A.1
Trappe, W.2
-
25
-
-
84857196311
-
Stochastic strategic routing reduces attack effects
-
G. Calinescu, S. Kapoor, K. Qiao, and J. Shin, "Stochastic strategic routing reduces attack effects," in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2011, pp. 1-5.
-
(2011)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 1-5
-
-
Calinescu, G.1
Kapoor, S.2
Qiao, K.3
Shin, J.4
-
26
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct.
-
P. K. Gopala, L. Lai, and H. El Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
El Gamal, H.3
-
27
-
-
37149048467
-
Jamming game in wireless networks with transmission cost
-
T. Chahed and B. Tuffin, Eds. New York, NY, USA: Springer
-
E. Altman, K. Avrachenkov, and A. Garnaev, "Jamming game in wireless networks with transmission cost," in Network Control and Optimization, T. Chahed and B. Tuffin, Eds. New York, NY, USA: Springer, 2007, pp. 1-12.
-
(2007)
Network Control and Optimization
, pp. 1-12
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
28
-
-
63449130855
-
Transmission power control game with SINR as objective function
-
E. Altman and A. Chaintreau, Eds. New York, NY, USA: Springer
-
E. Altman, K. Avrachenkov, and A. Garnaev, "Transmission power control game with SINR as objective function," in Network Control and Optimization, E. Altman and A. Chaintreau, Eds. New York, NY, USA: Springer, 2009, pp. 112-120.
-
(2009)
Network Control and Optimization
, pp. 112-120
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
29
-
-
84866940712
-
A Bayesian jamming game in an OFDM wireless network
-
A. Garnaev, Y. Hayel, and E. Altman, "A Bayesian jamming game in an OFDM wireless network," in Proc. 10th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw. (WIOPT), 2012, pp. 41-48.
-
(2012)
Proc. 10th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw. (WIOPT)
, pp. 41-48
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
-
30
-
-
33751087288
-
-
New York, NY, USA: Springer
-
C. Comaniciu, N. B. Mandayam, and H. V. Poor, Wireless Networks: Multiuser Detection in Cross-Layer Design. New York, NY, USA: Springer, 2005.
-
(2005)
Wireless Networks: Multiuser Detection in Cross-Layer Design
-
-
Comaniciu, C.1
Mandayam, N.B.2
Poor, H.V.3
-
31
-
-
0003579258
-
-
Cambridge, U.K.: Cambridge Univ. Press
-
S. Verdú, Multiuser Detection. Cambridge, U.K.: Cambridge Univ. Press, 1998.
-
(1998)
Multiuser Detection
-
-
Verdú, S.1
-
33
-
-
51749122504
-
Energy detection of unknown deterministic signals
-
Apr.
-
H. Urkowitz, "Energy detection of unknown deterministic signals," Proc. IEEE, vol. 55, no. 4, pp. 523-531, Apr. 1967.
-
(1967)
Proc. IEEE
, vol.55
, Issue.4
, pp. 523-531
-
-
Urkowitz, H.1
-
34
-
-
0038648984
-
On the energy detection of unknown signals over fading channels
-
F. F. Digham, M. S. Alouini, and M. K. Simon, "On the energy detection of unknown signals over fading channels," in Proc. IEEE Int. Conf. Commun. (ICC), 2003, pp. 3575-3579.
-
(2003)
Proc. IEEE Int. Conf. Commun. (ICC)
, pp. 3575-3579
-
-
Digham, F.F.1
Alouini, M.S.2
Simon, M.K.3
-
35
-
-
84893122746
-
Stationary equilibrium strategies for bandwidth scanning
-
M. Jonsson, A. Vinel, B. Bellalta, N. Marina, D. Dimitrova, and D. Fiems, Eds. New York, NY, USA: Springer
-
A. Garnaev and W. Trappe, "Stationary equilibrium strategies for bandwidth scanning," in Multiple Access Communications, M. Jonsson, A. Vinel, B. Bellalta, N. Marina, D. Dimitrova, and D. Fiems, Eds. New York, NY, USA: Springer, 2013, pp. 168-183.
-
(2013)
Multiple Access Communications
, pp. 168-183
-
-
Garnaev, A.1
Trappe, W.2
-
36
-
-
84877655292
-
Dependence of optimal monitoring strategy on the application to be protected
-
A. Garnaev, W. Trappe, and C.-T. Kung, "Dependence of optimal monitoring strategy on the application to be protected," in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2012, pp. 1054-1059.
-
(2012)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 1054-1059
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
37
-
-
0004260006
-
-
New York, NY, USA: Academic
-
G. Owen, Game Theory. New York, NY, USA: Academic, 1982.
-
(1982)
Game Theory
-
-
Owen, G.1
-
38
-
-
33845546085
-
-
Los Angeles, CA, USA: UCLA
-
T. S. Ferguson, Game Theory. Los Angeles, CA, USA: UCLA, 2008.
-
(2008)
Game Theory
-
-
Ferguson, T.S.1
|