Protection Augmentation in Mobile Ad Hoc Networks Using Game Theory
暂无分享,去创建一个
[1] Hamidou Tembine,et al. Mean field stochastic games for SINR-based medium access control , 2011, VALUETOOLS.
[2] F. Richard Yu,et al. A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[3] Victor C. M. Leung,et al. Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.
[4] Xiaoyu Ni,et al. Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[5] Peter E. Caines,et al. The NCE (Mean Field) Principle With Locality Dependent Cost Interactions , 2010, IEEE Transactions on Automatic Control.
[6] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[7] Christos Politis,et al. A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[8] F. Richard Yu,et al. Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..
[9] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[10] Sankardas Roy,et al. Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[11] Samson Lasaulce,et al. Mean field energy games in wireless networks , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[12] Jie Wu,et al. Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[13] Tansu Alpcan,et al. Network Security , 2010 .
[14] Piet Van Mieghem,et al. Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.
[15] Minyi Huang,et al. Mean Field Stochastic Games with Discrete States and Mixed Players , 2012, GAMENETS.
[16] Jie Liu,et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[17] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[18] Sok Sien. Choy,et al. Security in mobile ad hoc networks , 2000 .
[19] Chao Liang,et al. Power Management in MIMO Ad Hoc Networks: A Game-Theoretic Approach , 2007, IEEE Transactions on Wireless Communications.
[20] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[21] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .