Performance of Dynamic Secure Routing Game
暂无分享,去创建一个
[1] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[2] Husheng Li,et al. Cross-Layer Attack and Defense in Cognitive Radio Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] Quanyan Zhu,et al. Distributed strategic learning with application to network security , 2011, Proceedings of the 2011 American Control Conference.
[4] Marco Gruteser,et al. Protecting privacy, in continuous location-tracking applications , 2004, IEEE Security & Privacy Magazine.
[5] Yiwei Thomas Hou,et al. A Distributed Optimization Algorithm for Multi-Hop Cognitive Radio Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[6] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[7] Lei Ding,et al. ROSA: distributed joint routing and dynamic spectrum allocation in cognitive radio ad hoc networks , 2009, MSWiM '09.
[8] William A. Arbaugh,et al. Dynamic spectrum access in cognitive radio networks , 2006 .
[9] Quanyan Zhu,et al. Dynamic Secure Routing Game in Distributed Cognitive Radio Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[10] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[11] W. Chan,et al. Pollaczek-Khinchin formula for the M/G/1 queue in discrete time with vacations , 1997 .
[12] Mohsen Guizani,et al. Survey of Security Issues in Cognitive Radio Networks , 2011 .
[13] Quanyan Zhu,et al. Interference Aware Routing Game for Cognitive Radio Multi-Hop Networks , 2012, IEEE Journal on Selected Areas in Communications.
[14] Radha Poovendran,et al. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection , 2011, IEEE/ACM Transactions on Networking.
[15] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks: Introduction , 2009 .
[16] T. Charles Clancy,et al. Security in Cognitive Radio Networks: Threats and Mitigation , 2008, 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008).
[17] Guevara Noubir,et al. Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.
[18] Quanyan Zhu,et al. Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[19] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[20] Quanyan Zhu,et al. Dynamic Interference Minimization Routing Game for On-Demand Cognitive Pilot Channel , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[21] Quanyan Zhu,et al. Heterogeneous learning in zero-sum stochastic games with incomplete information , 2011, 49th IEEE Conference on Decision and Control (CDC).
[22] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[23] Zhu Han,et al. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks , 2010, EURASIP J. Adv. Signal Process..