-
1
-
-
84900840781
-
Peer-to-peer group k-nearest neighbours in mobile ad hoc networks
-
T. P. Nghiem, D. Green, and D. Taniar, "Peer-to-peer group k-nearest neighbours in mobile ad hoc networks," in Proc. 19th IEEE Int. Conf. Parallel Distrib. Syst., 2013, pp. 166-173.
-
(2013)
Proc. 19th IEEE Int. Conf. Parallel Distrib. Syst.
, pp. 166-173
-
-
Nghiem, T.P.1
Green, D.2
Taniar, D.3
-
2
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Feb.
-
H. Yang, H. Y. Luo, F. Ye, S. W. Lu, and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE Wireless Commun., vol. 11, no. 1, pp. 38-47, Feb. 2004.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.Y.2
Ye, F.3
Lu, S.W.4
Zhang, L.5
-
4
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc), 2005, pp. 46-57.
-
(2005)
Proc. 6th ACM Int. Symp. Mobile Ad Hoc Netw. Comput. (MobiHoc)
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
6
-
-
84924125001
-
Jamming attack defense
-
H. C. A. Tilborg and S. Jajodia, Eds., New York, NY, USA: Springer
-
W. Xu, "Jamming attack defense," in Encyclopedia of Cryptography and Security, H. C. A. Tilborg and S. Jajodia, Eds., New York, NY, USA: Springer, 2011, pp. 655-661.
-
(2011)
Encyclopedia of Cryptography and Security
, pp. 655-661
-
-
Xu, W.1
-
7
-
-
84855466075
-
Anti-jamming games in multi-channel cognitive radio networks
-
Jan.
-
Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, "Anti-jamming games in multi-channel cognitive radio networks," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 4-15, Jan. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.1
, pp. 4-15
-
-
Wu, Y.1
Wang, B.2
Liu, K.J.R.3
Clancy, T.C.4
-
8
-
-
77955691304
-
Jamming games for power controlled medium access with dynamic traffic
-
Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games for power controlled medium access with dynamic traffic," in Proc. IEEE Int. Symp. Inf. Theory Proc. (ISIT), 2010, pp. 1818-1822.
-
(2010)
Proc. IEEE Int. Symp. Inf. Theory Proc. (ISIT)
, pp. 1818-1822
-
-
Sagduyu, Y.E.1
Berry, R.A.2
Ephremides, A.3
-
10
-
-
84874284297
-
Game theory meets network security and privacy
-
M. H. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J.-P. Hubaux, "Game theory meets network security and privacy," ACM Comput. Surv., vol. 45, no. 3, pp. 1-45, 2013.
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.3
, pp. 1-45
-
-
Manshaei, M.H.1
Zhu, Q.2
Alpcan, T.3
Basar, T.4
Hubaux, J.-P.5
-
11
-
-
50649125455
-
Game theoretic modeling of malicious users in collaborative networks
-
Sep.
-
G. Theodorakopoulos and J. S. Baras, "Game theoretic modeling of malicious users in collaborative networks," IEEE J. Sel. Areas Commun., vol. 26, no. 7, pp. 1317-1327, Sep. 2008.
-
(2008)
IEEE J. Sel. Areas Commun.
, vol.26
, Issue.7
, pp. 1317-1327
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
12
-
-
52449084729
-
Challenges to applying game theory to the domain of information warfare
-
S. N. Hamilton, W. L. Miller, A. Ott, and O. S. Saydjari, "Challenges to applying game theory to the domain of information warfare," in Proc. 4th Inf. Surviv. Workshop (ISW), 2002, 4 pp.
-
(2002)
Proc. 4th Inf. Surviv. Workshop (ISW)
-
-
Hamilton, S.N.1
Miller, W.L.2
Ott, A.3
Saydjari, O.S.4
-
13
-
-
84904708169
-
Incorporating attacktype uncertainty into network protection
-
Aug.
-
A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, "Incorporating attacktype uncertainty into network protection," IEEE Trans. Inf. Forensics Secur., vol. 9, no. 8, pp. 1278-1287, Aug. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.9
, Issue.8
, pp. 1278-1287
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
15
-
-
63749110244
-
A game-theoretic analysis of denial of service attacks in wireless random access
-
Y. E. Sagduyu and A. Ephremidess, "A game-theoretic analysis of denial of service attacks in wireless random access," J. Wireless Netw., vol. 15, pp. 651-666, 2009.
-
(2009)
J. Wireless Netw.
, vol.15
, pp. 651-666
-
-
Sagduyu, Y.E.1
Ephremidess, A.2
-
16
-
-
84924182115
-
Anti-jamming strategies: A stochastic game approach
-
Game Theory for Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), R. Aguero, T. Zinner, R. Goleva, A. Timm-Giel, and P. Tran-Gia, Eds. New York, NY, USA: Springer
-
A. Garnaev and W. Trappe, "Anti-jamming strategies: A stochastic game approach," in Mobile Networks and Management, Game Theory for Networks (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), vol. 141, R. Aguero, T. Zinner, R. Goleva, A. Timm-Giel, and P. Tran-Gia, Eds. New York, NY, USA: Springer, 2015, pp. 230-243.
-
(2015)
Mobile Networks and Management
, vol.141
, pp. 230-243
-
-
Garnaev, A.1
Trappe, W.2
-
17
-
-
84942474598
-
Security games with unknown adversarial strategies
-
Sep., to be published
-
A. Garnaev, M. Baykal-Gursoy, and H. V. Poor, "Security games with unknown adversarial strategies," IEEE Trans. Cybern., Sep. 2015, doi: 10.1109/TCYB.2015.2475243, to be published.
-
(2015)
IEEE Trans. Cybern.
-
-
Garnaev, A.1
Baykal-Gursoy, M.2
Poor, H.V.3
-
18
-
-
84876130220
-
A jammer's dilemma: Where and how to jam
-
A. Garnaev, Y. Hayel, and E. Altman, "A jammer's dilemma: Where and how to jam," in Proc. 6th Int. Conf. Netw. Games Control Optim. (NetGCooP), 2012, pp. 69-73.
-
(2012)
Proc. 6th Int. Conf. Netw. Games Control Optim. (NetGCooP)
, pp. 69-73
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
-
19
-
-
79956100559
-
Jamming in wireless networks under uncertainty
-
E. Altman, K. Avrachenkov, and A. Garnaev, "Jamming in wireless networks under uncertainty," Mobile Netw. Appl., vol. 16, no. 2, pp. 246-254, 2011.
-
(2011)
Mobile Netw. Appl.
, vol.16
, Issue.2
, pp. 246-254
-
-
Altman, E.1
Avrachenkov, K.2
Garnaev, A.3
-
20
-
-
84866940712
-
A Bayesian jamming game in an OFDM wireless network
-
A. Garnaev, Y. Hayel, and E. Altman, "A Bayesian jamming game in an OFDM wireless network," in Proc. 10th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw. (WIOPT), 2012, pp. 41-48.
-
(2012)
Proc. 10th Int. Symp. Model. Optim. Mobile Ad Hoc Wireless Netw. (WIOPT)
, pp. 41-48
-
-
Garnaev, A.1
Hayel, Y.2
Altman, E.3
-
21
-
-
80051717392
-
Jamming games in wireless networks with incomplete information
-
Aug.
-
Y. E. Sagduyu, R. A. Berry, and A. Ephremides, "Jamming games in wireless networks with incomplete information," IEEE Commun. Mag., vol. 49, no. 8, pp. 112-118, Aug. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.8
, pp. 112-118
-
-
Sagduyu, Y.E.1
Berry, R.A.2
Ephremides, A.3
-
22
-
-
84901460474
-
Power control with jammer location uncertainty: A game theoretic perspective
-
R. El-Bardan, S. Brahma, and P. K. Varshney, "Power control with jammer location uncertainty: A game theoretic perspective," in Proc. 48th Annu. Conf. Inf. Sci. Syst. (CISS), 2014, pp. 1-6.
-
(2014)
Proc. 48th Annu. Conf. Inf. Sci. Syst. (CISS)
, pp. 1-6
-
-
El-Bardan, R.1
Brahma, S.2
Varshney, P.K.3
-
23
-
-
84949929109
-
On ARQ-based wireless communication systems in the presence of a strategic jammer
-
R. El-Bardan, V. S. S. S. Nadendla, S. Brahma, and P. K. Varshney, "On ARQ-based wireless communication systems in the presence of a strategic jammer," in Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP), 2014, pp. 273-277.
-
(2014)
Proc. IEEE Global Conf. Signal Inf. Process. (GlobalSIP)
, pp. 273-277
-
-
El-Bardan, R.1
Nadendla, V.S.S.S.2
Brahma, S.3
Varshney, P.K.4
-
24
-
-
84877655292
-
Dependence of optimal monitoring strategy on the application to be protected
-
A. Garnaev, W. Trappe, and C.-T. Kung, "Dependence of optimal monitoring strategy on the application to be protected," in Proc. IEEE Global Commun. Conf. (GLOBECOM), 2012, pp. 1054-1059.
-
(2012)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
, pp. 1054-1059
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
25
-
-
84890827106
-
Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments
-
A. Garnaev, W. Trappe, and C.-T. Kung, "Optimizing scanning strategies: Selecting scanning bandwidth in adversarial RF environments," in Proc. 8th Int. Conf. Cognit. Radio Oriented Wireless Netw. (CROWNCOM), 2013, pp. 148-153.
-
(2013)
Proc. 8th Int. Conf. Cognit. Radio Oriented Wireless Netw. (CROWNCOM)
, pp. 148-153
-
-
Garnaev, A.1
Trappe, W.2
Kung, C.-T.3
-
26
-
-
84921456908
-
Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence
-
A. Garnaev and W. Trappe, "Bandwidth scanning involving a Bayesian approach to adapting the belief of an adversary's presence," in Proc. IEEE Conf. Commun. Netw. Secur. (CNS), 2014, pp. 35-43.
-
(2014)
Proc. IEEE Conf. Commun. Netw. Secur. (CNS)
, pp. 35-43
-
-
Garnaev, A.1
Trappe, W.2
-
27
-
-
84927721028
-
One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious
-
May
-
A. Garnaev and W. Trappe, "One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious," IEEE Trans. Inf. Forensics Secur., vol. 10, no. 5, pp. 1064-1075, May 2015.
-
(2015)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.5
, pp. 1064-1075
-
-
Garnaev, A.1
Trappe, W.2
-
29
-
-
84872852108
-
Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures
-
J. Arnau, B. Devillers, C. Mosquera, and A. Perez-Neira, "Performance study of multiuser interference mitigation schemes for hybrid broadband multibeam satellite architectures," EURASIP J. Wireless Commun. Netw., vol. 2012, no. 1, pp. 1-19, 2012.
-
(2012)
EURASIP J. Wireless Commun. Netw.
, vol.2012
, Issue.1
, pp. 1-19
-
-
Arnau, J.1
Devillers, B.2
Mosquera, C.3
Perez-Neira, A.4
-
30
-
-
84877926659
-
Energy and spectral efficiency of very large multiuser MIMO systems
-
Apr.
-
H. Q. Ngo, E. G. Larsson, and T. L. Marzetta, "Energy and spectral efficiency of very large multiuser MIMO systems," IEEE Trans. Commun., vol. 61, no. 4, pp. 1436-1449, Apr. 2013.
-
(2013)
IEEE Trans. Commun.
, vol.61
, Issue.4
, pp. 1436-1449
-
-
Ngo, H.Q.1
Larsson, E.G.2
Marzetta, T.L.3
-
31
-
-
84938697369
-
An uplink interference analysis for massive MIMO systems with MRC and ZF receivers
-
N. Liang, W. Zhang, and C. Shen, "An uplink interference analysis for massive MIMO systems with MRC and ZF receivers," in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), 2015, pp. 310-315.
-
(2015)
Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)
, pp. 310-315
-
-
Liang, N.1
Zhang, W.2
Shen, C.3
-
32
-
-
29044433176
-
Space-time interference cancellation in MIMO-OFDM systems
-
Sep.
-
T. Tang and R. W. Heath Jr., "Space-time interference cancellation in MIMO-OFDM systems," IEEE Trans. Veh. Technol., vol. 54, no. 5, pp. 1802-1816, Sep. 2005.
-
(2005)
IEEE Trans. Veh. Technol.
, vol.54
, Issue.5
, pp. 1802-1816
-
-
Tang, T.1
Heath, R.W.2
-
33
-
-
0035391461
-
Intercarrier interference self-cancellation scheme for OFDM mobile communication systems
-
Jul.
-
Y. Zhao and S.-G. Häggman, "Intercarrier interference self-cancellation scheme for OFDM mobile communication systems," IEEE Trans. Commun., vol. 49, no. 7, pp. 1185-1191, Jul. 2001.
-
(2001)
IEEE Trans. Commun.
, vol.49
, Issue.7
, pp. 1185-1191
-
-
Zhao, Y.1
Häggman, S.-G.2
-
34
-
-
0032670527
-
Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM
-
Mar.
-
J. Armstrong, "Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM," IEEE Trans. Commun., vol. 47, no. 3, pp. 365-369, Mar. 1999.
-
(1999)
IEEE Trans. Commun.
, vol.47
, Issue.3
, pp. 365-369
-
-
Armstrong, J.1
-
35
-
-
33847741864
-
Cooperative distributed MIMO channels in wireless sensor networks
-
Feb.
-
A. D. Coso, U. Spagnolini, and C. Ibars, "Cooperative distributed MIMO channels in wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 25, no. 2, pp. 402-414, Feb. 2007.
-
(2007)
IEEE J. Sel. Areas Commun.
, vol.25
, Issue.2
, pp. 402-414
-
-
Coso, A.D.1
Spagnolini, U.2
Ibars, C.3
-
36
-
-
17144394404
-
New approaches for cooperative use of multiple antennas in ad hoc wireless networks
-
J. Luo, R. S. Blum, L. J. Greenstein, L. J. Cimini, and A. M. Haimovich, "New approaches for cooperative use of multiple antennas in ad hoc wireless networks," in Proc. IEEE 60th Veh. Technol. Conf. (VTC'04-Fall), 2004, vol. 4, pp. 2769-2773.
-
(2004)
Proc. IEEE 60th Veh. Technol. Conf. (VTC'04-Fall)
, vol.4
, pp. 2769-2773
-
-
Luo, J.1
Blum, R.S.2
Greenstein, L.J.3
Cimini, L.J.4
Haimovich, A.M.5
-
37
-
-
84856969548
-
Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach
-
Q. Zhu, W. Saad, Z. Han, H. V. Poor, and T. Basar, "Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach," in Proc. Mil. Commun. Conf. (MILCOM), 2011, pp. 119-124.
-
(2011)
Proc. Mil. Commun. Conf. (MILCOM)
, pp. 119-124
-
-
Zhu, Q.1
Saad, W.2
Han, Z.3
Poor, H.V.4
Basar, T.5
|