A game theoretic approach to cooperative intrusion detection
暂无分享,去创建一个
Han Zhang | Fenghua Li | Liang Fang | Lingcui Zhang | Yunchuan Guo | Han Zhang | Yunchuan Guo | Fenghua Li | Lingcui Zhang | Liang Fang
[1] Fan Wu,et al. Data Quality Guided Incentive Mechanism Design for Crowdsensing , 2018, IEEE Transactions on Mobile Computing.
[2] Jonathan Loo,et al. Mobile Ad Hoc Networks: Current Status and Future Trends , 2011 .
[3] Elisa Bertino,et al. Privacy-Preserving Detection of Sensitive Data Exposure , 2015, IEEE Transactions on Information Forensics and Security.
[4] Wee Keong Ng,et al. Privacy-preserving approach for sharing and processing intrusion alert data , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[5] Andreas Haeberlen,et al. Differential privacy for collaborative security , 2010, EUROSEC '10.
[6] Sajal K. Das,et al. Incentive Mechanisms for Participatory Sensing , 2015, ACM Trans. Sens. Networks.
[7] EMMANOUIL VASILOMANOLAKIS,et al. Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..
[8] Xi Fang,et al. Crowdsourcing to smartphones: incentive mechanism design for mobile phone sensing , 2012, Mobicom '12.
[9] Radu Stoleru,et al. Towards Optimal Monitoring in Cooperative IDS for Resource Constrained Wireless Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[10] Athanasios V. Vasilakos,et al. A game-theoretic approach to advertisement dissemination in ephemeral networks , 2018, World Wide Web.
[11] Babak Sadeghiyan,et al. Privacy issues in intrusion detection systems: A taxonomy, survey and future directions , 2017, Comput. Sci. Rev..
[12] Yunhao Liu,et al. PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing , 2017, IEEE Transactions on Mobile Computing.
[13] Sushanta Karmakar,et al. Enhancing effectiveness of intrusion detection systems: A hybrid approach , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[14] Anita Pal,et al. Quality adaptive online double auction in participatory sensing , 2016, ArXiv.
[15] Richeng Jin,et al. On the Tradeoff between Privacy and Utility in Collaborative Intrusion Detection Systems-A Game Theoretical Approach , 2017, HotSoS.
[16] Babak Sadeghiyan,et al. ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols , 2014, Comput. J..
[17] Shengli Xie,et al. MixGroup: Accumulative Pseudonym Exchanging for Location Privacy Enhancement in Vehicular Social Networks , 2016, IEEE Transactions on Dependable and Secure Computing.
[18] Shaojie Tang,et al. A Budget Feasible Incentive Mechanism for Weighted Coverage Maximization in Mobile Crowdsensing , 2017, IEEE Transactions on Mobile Computing.
[19] Antonio F. Gómez-Skarmeta,et al. Trustworthy placements: Improving quality and resilience in collaborative attack detection , 2014, Comput. Networks.
[20] Fang Binxing,et al. Utility-based cooperative decision in cooperative authentication , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[21] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[22] Michael P. Howarth,et al. An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.
[23] Han Zhang,et al. Incentive Mechanism for Cooperative Intrusion Detection: An Evolutionary Game Approach , 2018, ICCS.
[24] Fenghua Li,et al. Real-Time Data Incentives for IoT Searches , 2018, 2018 IEEE International Conference on Communications (ICC).