Game theoretic path selection to support security in device-to-device communications
暂无分享,去创建一个
Anastasios A. Economides | Tansu Alpcan | Emmanouil Panaousis | Eirini D. Karapistoli | M. H. R. Khouzani | Hadeer Elsemary | T. Alpcan | E. Karapistoli | A. Economides | E. Panaousis | M. Khouzani | H. Elsemary | Mhr Khuzani | Anastasios A.Economides
[1] K. J. Ray Liu,et al. Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis , 2007, IEEE Transactions on Information Forensics and Security.
[2] Halim Yanikomeroglu,et al. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.
[3] Stefan Parkvall,et al. Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.
[4] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[5] Christos Politis,et al. A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[6] Kemal Ertugrul Tepe,et al. Game theoretic approach in routing protocol for wireless ad hoc networks , 2009, Ad Hoc Networks.
[7] D. Jhonson. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .
[8] Milind Tambe,et al. "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.
[9] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[10] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[11] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[12] Christos Politis,et al. Standardisation advancements in the area of routing for mobile ad-hoc networks , 2011, The Journal of Supercomputing.
[13] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[14] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS.
[15] An Wang,et al. A Stackelberg security game with cooperative jamming over a multiuser OFDMA network , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[16] Carl Wijting,et al. Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.
[17] Yu Liu,et al. Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.
[18] Georgios Kambourakis,et al. The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.
[19] Wei Xu,et al. Device-to-device communications: The physical layer security advantage , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[20] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.
[21] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[22] Vincent Conitzer,et al. Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness , 2011, J. Artif. Intell. Res..
[23] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[24] Jin-Hee Cho,et al. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.
[25] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[26] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[27] Prabir Bhattacharya,et al. A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[28] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[29] A. Patcha,et al. A game theoretic approach to modeling intrusion detection in mobile ad hoc networks , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[30] Marco Ajmone Marsan,et al. Experimenting with floating content in an office setting , 2014, IEEE Communications Magazine.
[31] K. J. Ray Liu,et al. Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach , 2008, IEEE Transactions on Information Forensics and Security.
[32] Levente Buttyán,et al. Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[33] Li Wang,et al. Device-to-Device Communications in Cellular Networks , 2016, SpringerBriefs in Electrical and Computer Engineering.
[34] V. Vetriselvi,et al. Cluster Based Co-operative Game Theory Approach for Intrusion Detection in Mobile Ad-Hoc Grid , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[35] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[36] Mauro Conti,et al. An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments , 2014, IEEE Transactions on Services Computing.
[37] RYAN HEARTFIELD,et al. A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks , 2015, ACM Comput. Surv..
[38] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[39] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[40] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[41] T. Başar,et al. Dynamic Noncooperative Game Theory , 1982 .
[42] Mauro Conti,et al. Secure Message Delivery Games for Device-to-Device Communications , 2014, GameSec.
[43] N. Marchang,et al. A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks , 2007, 15th International Conference on Advanced Computing and Communications (ADCOM 2007).
[44] Manish Jain,et al. Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.
[45] Xin-Ping Guan,et al. Joint random access and power control game in ad hoc networks with noncooperative users , 2011, Ad Hoc Networks.
[46] Ossama Younis,et al. Throughput-oriented MAC for mobile ad hoc networks: A game-theoretic approach , 2009, Ad Hoc Networks.
[47] Eitan Altman,et al. Maximum Damage Malware Attack in Mobile Wireless Networks , 2012, IEEE/ACM Transactions on Networking.
[48] Qing Wang,et al. A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.
[49] Nei Kato,et al. Relay-by-smartphone: realizing multihop device-to-device communications , 2014, IEEE Communications Magazine.
[50] Zhu Han,et al. A Bayesian Overlapping Coalition Formation Game for Device-to-Device Spectrum Sharing in Cellular Networks , 2015, IEEE Transactions on Wireless Communications.
[51] K. J. Ray Liu,et al. Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.
[52] Geoffrey Ye Li,et al. Device-to-device communications in cellular networks , 2016, IEEE Communications Magazine.
[53] Tansu Alpcan,et al. Network Security , 2010 .