Playing with Sybil
暂无分享,去创建一个
[1] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[2] Sophie Ahrens,et al. Recommender Systems , 2012 .
[3] Max Q.-H. Meng,et al. Conflict and coalition models in inhomogeneous power allocation for wireless sensor networks , 2009, 2008 IEEE International Conference on Robotics and Biomimetics.
[4] Sanghoon Lee,et al. A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[5] Marc Lelarge,et al. A local mean field analysis of security investments in networks , 2008, NetEcon '08.
[6] Sebastian Ueckert August. An Introduction to Evolutionary Game Theory , 2007 .
[7] Mustaque Ahamad,et al. Incentives in BitTorrent induce free riding , 2005, P2PECON '05.
[8] Jon M. Kleinberg,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..
[9] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[10] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[11] Brian Neil Levine,et al. Quantifying Resistance to the Sybil Attack , 2008, Financial Cryptography.
[12] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Libin Yang,et al. Preventing dropping packets attack in sensor networks: A game theory approach , 2008, Wuhan University Journal of Natural Sciences.
[14] Ilangko Balasingham,et al. Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory , 2010, FMOODS/FORTE.
[15] Shengyong Chen,et al. Game Theory for Wireless Sensor Networks: A Survey , 2012, Sensors.
[16] F. Maxwell Harper,et al. An Economic Model of User Rating in an Online Recommender System , 2005, User Modeling.
[17] Zhu Han,et al. Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.
[18] William H. Sandholm,et al. Deterministic Evolutionary Dynamics , 2005 .
[19] Anthony Ephremides,et al. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.
[20] K. J. Ray Liu,et al. Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.
[21] Murat Kantarcioglu,et al. When Do Firms Invest in Privacy-Preserving Technologies? , 2010, GameSec.
[22] Gang Wei,et al. A game theoretic approach for power allocation with QoS constraints in wireless multimedia sensor networks , 2009, Multimedia Tools and Applications.
[23] Sigmund,et al. Introduction to Evolutionary Game Theory , 2010 .
[24] Ayman I. Kayssi,et al. Solving sybil attacks using evolutionary game theory , 2016, SAC.
[25] Yue Zhao,et al. Spatial games and the maintenance of cooperation in an asymmetric Hawk-Dove game , 2013 .
[26] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[27] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[28] David Easley,et al. Networks, Crowds, and Markets: Modeling Network Traffic Using Game Theory , 2010 .