메뉴 건너뛰기




Volumn 2016-September, Issue , 2016, Pages 403-408

Mobile offloading game against smart attacks

Author keywords

big data; game theory; jamming; Mobile offloading; smart attacks; spoofing

Indexed keywords

BIG DATA; COMPUTATION THEORY; ENERGY UTILIZATION; GAME THEORY; JAMMING; MOBILE CLOUD COMPUTING; MOBILE DEVICES; SECURITY OF DATA; SOFTWARE RADIO;

EID: 84988836366     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2016.7562110     Document Type: Conference Paper
Times cited : (11)

References (19)
  • 1
    • 77951039985 scopus 로고    scopus 로고
    • Cloud computing for mobile users: Can offloading computation save energy
    • Apr.
    • K. Kumar and Y. Lu, "Cloud computing for mobile users: Can offloading computation save energy," IEEE Trans. Computers, vol. 43, pp. 51-56, Apr. 2010.
    • (2010) IEEE Trans. Computers , vol.43 , pp. 51-56
    • Kumar, K.1    Lu, Y.2
  • 2
    • 79951614632 scopus 로고    scopus 로고
    • Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels
    • Oct.
    • A. Mukherjee and A. L. Swindlehurst, "Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels," in Proc. IEEE Military Commun. Conf., pp. 1695-1700, Oct. 2010.
    • (2010) Proc. IEEE Military Commun. Conf. , pp. 1695-1700
    • Mukherjee, A.1    Swindlehurst, A.L.2
  • 4
    • 84947461262 scopus 로고    scopus 로고
    • Offloading in mobile cloudlet systems with intermittent connectivity
    • Dec.
    • Z. Yang, D. Niyato, and P. Wang, "Offloading in mobile cloudlet systems with intermittent connectivity," IEEE Trans. Mobile Computing, vol. 14, pp. 2516-2529, Dec. 2015.
    • (2015) IEEE Trans. Mobile Computing , vol.14 , pp. 2516-2529
    • Yang, Z.1    Niyato, D.2    Wang, P.3
  • 7
    • 84925130442 scopus 로고    scopus 로고
    • Decentralized computation offloading game for mobile cloud computing
    • Apr.
    • X. Chen, "Decentralized computation offloading game for mobile cloud computing," IEEE Trans. Parallel and Distributed Systems, vol. 26, pp. 974-983, Apr. 2015.
    • (2015) IEEE Trans. Parallel and Distributed Systems , vol.26 , pp. 974-983
    • Chen, X.1
  • 12
    • 84944733602 scopus 로고    scopus 로고
    • Security and performance tradeoff analysis of mobile offloading systems under timing attacks
    • Springer, Aug.
    • T. Meng, K. Wolter, and Q. Wang, "Security and performance tradeoff analysis of mobile offloading systems under timing attacks," in Computer Performance Engineering, vol. 9272, pp. 32-46, Springer, Aug. 2015.
    • (2015) Computer Performance Engineering , vol.9272 , pp. 32-46
    • Meng, T.1    Wolter, K.2    Wang, Q.3
  • 13
    • 81255210704 scopus 로고    scopus 로고
    • SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing
    • Springer, Nov.
    • J. Park, K. Yi, and J. Park, "SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing," in IT Convergence and Services, vol. 107, pp. 165-172, Springer, Nov. 2011.
    • (2011) IT Convergence and Services , vol.107 , pp. 165-172
    • Park, J.1    Yi, K.2    Park, J.3
  • 14
    • 84897584002 scopus 로고    scopus 로고
    • Jamming games in the MIMO wiretap channel with an active eavesdropper
    • Jan
    • A. Mukherjee and A. Swindlehurst, "Jamming games in the MIMO wiretap channel with an active eavesdropper," IEEE Trans. Signal Processing, vol. 61, pp. 82-91, Jan. 2013.
    • (2013) IEEE Trans. Signal Processing , vol.61 , pp. 82-91
    • Mukherjee, A.1    Swindlehurst, A.2
  • 15
    • 84943235784 scopus 로고    scopus 로고
    • To eavesdrop or jam, that is the question
    • Springer, Jan.
    • A. Garnaev and W. Trappe, "To eavesdrop or jam, that is the question," in Ad Hoc Networks, pp. 146-161, Springer, Jan. 2014.
    • (2014) Ad Hoc Networks , pp. 146-161
    • Garnaev, A.1    Trappe, W.2
  • 18
    • 73049092718 scopus 로고    scopus 로고
    • Channelbased spoofing detection in frequency-selective rayleigh channels
    • Dec.
    • L. Xiao, L. Greenstein, N. B. Mandayam, and W. Trappe, "Channelbased spoofing detection in frequency-selective rayleigh channels," IEEE Trans. Wireless Communications, vol. 8, pp. 5948-5956, Dec. 2009.
    • (2009) IEEE Trans. Wireless Communications , vol.8 , pp. 5948-5956
    • Xiao, L.1    Greenstein, L.2    Mandayam, N.B.3    Trappe, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.