A Dilemma in the Communication of a UAV with its Controller
暂无分享,去创建一个
[1] Anil Yildizparlak,et al. An Application of Contest Success Functions for Draws on European Soccer , 2018 .
[2] Mohsen Guizani,et al. Communication Security of Unmanned Aerial Vehicles , 2017, IEEE Wireless Communications.
[3] Nirwan Ansari,et al. Intrusion Detection and Ejection Framework Against Lethal Attacks in UAV-Aided Networks: A Bayesian Game-Theoretic Methodology , 2017, IEEE Transactions on Intelligent Transportation Systems.
[4] Walid Saad,et al. Prospect theory for enhanced cyber-physical security of drone delivery systems: A network interdiction game , 2017, 2017 IEEE International Conference on Communications (ICC).
[5] H. Vincent Poor,et al. Security Games With Unknown Adversarial Strategies , 2016, IEEE Transactions on Cybernetics.
[6] Yonggang Zhu,et al. Bayesian Stackelberg Game for Antijamming Transmission With Incomplete Information , 2016, IEEE Communications Letters.
[7] Andrey Garnaev,et al. A Bandwidth Monitoring Strategy Under Uncertainty of the Adversary’s Activity , 2016, IEEE Transactions on Information Forensics and Security.
[8] Jie Chen,et al. Dynamic multi-team antagonistic games model with incomplete information and its application to multi-UAV , 2015, IEEE/CAA Journal of Automatica Sinica.
[9] Stergios Skaperdas,et al. Contest functions : theoretical foundations and issues in estimation , 2013 .
[10] Weiqing Sun,et al. Cyber security threat analysis and modeling of an unmanned aerial vehicle system , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[11] S Bhattacharya,et al. Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.
[12] Eitan Altman,et al. Jamming in Wireless Networks Under Uncertainty , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[13] Pooya Moradian Zadeh,et al. A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[14] Hao Jia,et al. A stochastic derivation of the ratio form of contest success functions , 2008 .
[15] K. Hausken. Information sharing among firms and cyber attacks , 2007 .
[16] Vicki M. Bier,et al. Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..
[17] S. Skaperdas. Contest success functions , 1996 .
[18] A. Tversky,et al. Prospect theory: analysis of decision under risk , 1979 .