-
2
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
Aug.
-
C. Tankard, "Advanced persistent threats and how to monitor and deter them, " Netw. Secur., vol. 2011, no. 8, pp. 16-19, Aug. 2011.
-
(2011)
Netw. Secur.
, vol.2011
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
3
-
-
84890434312
-
FlipIt: The game of 'stealthy takeover
-
Oct.
-
M. van Dijk, A. Juels, A. Oprea, R. L. Rivest, "FlipIt: The game of 'stealthy takeover, "' J. Cryptol., vol. 26, no. 4, pp. 655-713, Oct. 2013.
-
(2013)
J. Cryptol.
, vol.26
, Issue.4
, pp. 655-713
-
-
Van Dijk, M.1
Juels, A.2
Oprea, A.3
Rivest, R.L.4
-
4
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
D. Kahneman and A. Tversky, "Prospect theory: An analysis of decision under risk, " Econ., J. Econ. Soc., vol. 47, no. 2, pp. 263-291, 1979.
-
(1979)
Econ., J. Econ. Soc.
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
5
-
-
31744450082
-
Advances in prospect theory: Cumulative representation of uncertainty
-
A. Tversky and D. Kahneman, "Advances in prospect theory: Cumulative representation of uncertainty, " J. Risk Uncertainty, vol. 5, no. 4, pp. 297-323, 1992.
-
(1992)
J. Risk Uncertainty
, vol.5
, Issue.4
, pp. 297-323
-
-
Tversky, A.1
Kahneman, D.2
-
6
-
-
84979466856
-
Toward a consumer-centric grid: A behavioral perspective
-
Apr.
-
W. Saad, A. L. Glass, N. B. Mandayam, H. V. Poor, "Toward a consumer-centric grid: A behavioral perspective, " Proc. IEEE, vol. 104, no. 4, pp. 865-882, Apr. 2016.
-
(2016)
Proc. IEEE
, vol.104
, Issue.4
, pp. 865-882
-
-
Saad, W.1
Glass, A.L.2
Mandayam, N.B.3
Poor, H.V.4
-
7
-
-
77953364289
-
Adaptive route choices in risky traffic networks: A prospect theory approach
-
Oct.
-
S. Gao, E. Frejinger, M. Ben-Akiva, "Adaptive route choices in risky traffic networks: A prospect theory approach, " Transp. Res. C, Emerg. Technol., vol. 18, no. 5, pp. 727-740, Oct. 2010.
-
(2010)
Transp. Res. C, Emerg. Technol.
, vol.18
, Issue.5
, pp. 727-740
-
-
Gao, S.1
Frejinger, E.2
Ben-Akiva, M.3
-
8
-
-
67349117277
-
Expected utility theory and prospect theory: One wedding and a decent funeral
-
Jun.
-
G. W. Harrison and E. E. Rutström, "Expected utility theory and prospect theory: One wedding and a decent funeral, " Experim. Econ., vol. 12, no. 2, pp. 133-158, Jun. 2009.
-
(2009)
Experim. Econ.
, vol.12
, Issue.2
, pp. 133-158
-
-
Harrison, G.W.1
Rutström, E.E.2
-
10
-
-
84899975547
-
When users interfere with protocols: Prospect theory in wireless networks using random access and data pricing as an example
-
Apr.
-
T. Li and N. B. Mandayam, "When users interfere with protocols: Prospect theory in wireless networks using random access and data pricing as an example, " IEEE Trans. Wireless Commun., vol. 13, no. 4, pp. 1888-1907, Apr. 2014.
-
(2014)
IEEE Trans. Wireless Commun.
, vol.13
, Issue.4
, pp. 1888-1907
-
-
Li, T.1
Mandayam, N.B.2
-
11
-
-
84906996364
-
Spectrum investment with uncertainty based on prospect theory
-
Jun.
-
J. Yu, M. H. Cheung, J. Huang, "Spectrum investment with uncertainty based on prospect theory, " in Proc. IEEE Int. Conf. Commun., Sydney, NSW, Australia, Jun. 2014, pp. 1620-1625.
-
(2014)
Proc. IEEE Int. Conf. Commun., Sydney, NSW, Australia
, pp. 1620-1625
-
-
Yu, J.1
Cheung, M.H.2
Huang, J.3
-
12
-
-
84949923498
-
Prospect theoretic analysis of anti-jamming communications in cognitive radio networks
-
Dec.
-
L. Xiao, J. Liu, Y. Li, N. B. Mandayam, H. V. Poor, "Prospect theoretic analysis of anti-jamming communications in cognitive radio networks, " in Proc. IEEE Global Commun. Conf., Austin, TX, USA, Dec. 2014, pp. 746-751.
-
(2014)
Proc. IEEE Global Commun. Conf., Austin, TX, USA
, pp. 746-751
-
-
Xiao, L.1
Liu, J.2
Li, Y.3
Mandayam, N.B.4
Poor, H.V.5
-
13
-
-
84901458299
-
Impact of end-user decisions on pricing in wireless networks
-
Mar.
-
Y. Yang and N. B. Mandayam, "Impact of end-user decisions on pricing in wireless networks, " in Proc. IEEE 48th Annu. Conf. Inf. Sci. Syst. (CISS), Princeton, NJ, USA, Mar. 2014, pp. 1-6.
-
(2014)
Proc. IEEE 48th Annu. Conf. Inf. Sci. Syst. (CISS), Princeton, NJ, USA
, pp. 1-6
-
-
Yang, Y.1
Mandayam, N.B.2
-
14
-
-
84946689965
-
Impact of end-user decisions on pricing in wireless networks under a multiple-user-single-provider setting
-
Sep.
-
Y. Yang and N. B. Mandayam, "Impact of end-user decisions on pricing in wireless networks under a multiple-user-single-provider setting, " in Proc. 52nd Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, USA, Sep. 2014, pp. 206-212.
-
(2014)
Proc. 52nd Annu. Allerton Conf. Commun. Control Comput., Monticello, IL, USA
, pp. 206-212
-
-
Yang, Y.1
Mandayam, N.B.2
-
15
-
-
84999060416
-
Prospect pricing in cognitive radio networks
-
Mar.
-
Y. Yang, L. T. Park, N. B. Mandayam, I. Seskar, A. L. Glass, N. Sinha, "Prospect pricing in cognitive radio networks, " IEEE Trans. Cogn. Commun. Netw., vol. 1, no. 1, pp. 56-70, Mar. 2015.
-
(2015)
IEEE Trans. Cogn. Commun. Netw.
, vol.1
, Issue.1
, pp. 56-70
-
-
Yang, Y.1
Park, L.T.2
Mandayam, N.B.3
Seskar, I.4
Glass, A.L.5
Sinha, N.6
-
16
-
-
84919882605
-
Prospect theoretic analysis of energy exchange among microgrids
-
Jan.
-
L. Xiao, N. B. Mandayam, H. V. Poor, "Prospect theoretic analysis of energy exchange among microgrids, " IEEE Trans. Smart Grid, vol. 6, no. 1, pp. 63-72, Jan. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.1
, pp. 63-72
-
-
Xiao, L.1
Mandayam, N.B.2
Poor, H.V.3
-
17
-
-
84905281155
-
Integrating energy storage into the smart grid: A prospect theoretic approach
-
May
-
Y. Wang, W. Saad, N. B. Mandayam, H. V. Poor, "Integrating energy storage into the smart grid: A prospect theoretic approach, " in Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Florence, Italy, May 2014, pp. 7779-7783.
-
(2014)
Proc. IEEE Int. Conf. Acoust. Speech Signal Process., Florence, Italy
, pp. 7779-7783
-
-
Wang, Y.1
Saad, W.2
Mandayam, N.B.3
Poor, H.V.4
-
18
-
-
0001750296
-
The probability weighting function
-
May
-
D. Prelec, "The probability weighting function, " Econometrica, vol. 66, no. 3, pp. 497-527, May 1998.
-
(1998)
Econometrica
, vol.66
, Issue.3
, pp. 497-527
-
-
Prelec, D.1
-
19
-
-
84949926542
-
Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints
-
Dec.
-
M. Zhang, Z. Zheng, N. B. Shroff, "Stealthy attacks and observable defenses: A game theoretic model under strict resource constraints, " in Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP), Atlanta, GA, USA, Dec. 2014, pp. 813-817.
-
(2014)
Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP), Atlanta, GA, USA
, pp. 813-817
-
-
Zhang, M.1
Zheng, Z.2
Shroff, N.B.3
-
20
-
-
84953209535
-
Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats
-
Berlin, Germany: Springer, Nov.
-
J. Pawlick, S. Farhang, Q. Zhu, "Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats, " in Decision Game Theory for Security, vol. 9406. Berlin, Germany: Springer, Nov. 2015, pp. 289-308.
-
(2015)
Decision Game Theory for Security
, vol.9406
, pp. 289-308
-
-
Pawlick, J.1
Farhang, S.2
Zhu, Q.3
-
21
-
-
85027261691
-
A game theoretic model for defending against stealthy attacks with limited resources
-
Berlin, Germany: Springer, Nov.
-
M. Zhang, Z. Zheng, N. B. Shroff, "A game theoretic model for defending against stealthy attacks with limited resources, " in Decision Game Theory for Security, vol. 940. Berlin, Germany: Springer, Nov. 2015, pp. 93-112.
-
(2015)
Decision Game Theory for Security
, vol.940
, pp. 93-112
-
-
Zhang, M.1
Zheng, Z.2
Shroff, N.B.3
-
22
-
-
84954235490
-
Dynamic defense strategy against advanced persistent threat with insiders
-
Hong Kong, China, May
-
P. Hu, H. Li, H. Fu, D. Cansever, P. Mohapatra, "Dynamic defense strategy against advanced persistent threat with insiders, " in Proc. IEEE Conf. Comput. Commun. (INFOCOM), Hong Kong, China, May 2015, pp. 747-755.
-
(2015)
Proc. IEEE Conf. Comput. Commun. (INFOCOM)
, pp. 747-755
-
-
Hu, P.1
Li, H.2
Fu, H.3
Cansever, D.4
Mohapatra, P.5
-
23
-
-
84959202314
-
User-centric view of jamming games in cognitive radio networks
-
Dec.
-
L. Xiao, J. Liu, Q. Li, N. B. Mandayam, H. V. Poor, "User-centric view of jamming games in cognitive radio networks, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 12, pp. 2578-2590, Dec. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.12
, pp. 2578-2590
-
-
Xiao, L.1
Liu, J.2
Li, Q.3
Mandayam, N.B.4
Poor, H.V.5
-
24
-
-
84986182441
-
A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning
-
Mar.
-
Y. Han, T. Alpcan, J. Chan, C. Leckie, B. I. P. Rubinstein, "A game theoretical approach to defend against co-resident attacks in cloud computing: Preventing co-residence using semi-supervised learning, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 3, pp. 556-570, Mar. 2016.
-
(2016)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.3
, pp. 556-570
-
-
Han, Y.1
Alpcan, T.2
Chan, J.3
Leckie, C.4
Rubinstein, B.I.P.5
-
25
-
-
85015372718
-
Prospect theoretic study of cloud storage defense against advanced persistent threats
-
Washington, DC, USA, Dec.
-
D. Xu, Y. Li, L. Xiao, N. B. Mandayam, H. V. Poor, "Prospect theoretic study of cloud storage defense against advanced persistent threats, " in Proc. IEEE Global Commun. Conf., Washington, DC, USA, Dec. 2016, pp. 1-6.
-
(2016)
Proc. IEEE Global Commun. Conf.
, pp. 1-6
-
-
Xu, D.1
Li, Y.2
Xiao, L.3
Mandayam, N.B.4
Poor, H.V.5
|