Intrusion detection in sensor networks: a non-cooperative game approach
暂无分享,去创建一个
Sajal K. Das | Kalyan Basu | Afrand Agah | Sajal K. Das | Mehran Asadi | Mehran Asadi | K. Basu | A. Agah
[1] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[2] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[3] Srdjan Capkun,et al. A formal analysis of Syverson's rational exchange protocol , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[4] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[5] K. Basu,et al. A non-cooperative game approach for intrusion detection in sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[6] Levente Buttyán,et al. Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case , 2003, PWC.
[7] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[9] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[10] Jean-Yves Le Boudec,et al. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Dynamic Ad-hoc NeTworks , 2002 .
[11] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[12] Robert A. Scholtz,et al. Performance Analysis of , 1998 .
[13] Adrian Perrig,et al. Secure Broadcast Communication , 2003, Springer US.
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[15] Sean R Eddy,et al. What is dynamic programming? , 2004, Nature Biotechnology.
[16] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[17] Deborah Estrin,et al. Scalable Coordination for Wireless Sensor Networks: Self-Configuring Localization Systems , 2001 .
[18] Sheldon M. Ross,et al. Introduction to probability models , 1975 .
[19] Nathan Ickes,et al. Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.
[20] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[21] Pietro Michiardi,et al. A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .
[22] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[23] Adrian Perrig,et al. Secure broadcast communication in wired and wireless networks , 2002 .