Strategic Surveillance Against Primary User Emulation Attacks in Cognitive Radio Networks
暂无分享,去创建一个
[1] Prasant Mohapatra,et al. Hearing Is Believing: Detecting Wireless Microphone Emulation Attacks in White Space , 2013, IEEE Transactions on Mobile Computing.
[2] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[3] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[4] John C. Harsanyi,et al. Общая теория выбора равновесия в играх / A General Theory of Equilibrium Selection in Games , 1989 .
[5] Sarit Kraus,et al. Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS.
[6] Wenliang Du,et al. Physical Layer Spectrum Usage Authentication in Cognitive Radio: Analysis and Implementation , 2015, IEEE Transactions on Information Forensics and Security.
[7] Jeffrey H. Reed,et al. Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.
[8] Zhu Han,et al. Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.
[9] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[10] Mohsen Guizani,et al. Securing cognitive radio networks against primary user emulation attacks , 2015, IEEE Network.
[11] Majid Khabbazian,et al. Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.
[12] Heinrich von Stackelberg. Market Structure and Equilibrium , 2010 .
[13] Kaigui Bian,et al. Security vulnerabilities in IEEE 802.22 , 2008, WICON.
[14] Santhanakrishnan Anand,et al. Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks , 2009, 2009 IEEE International Conference on Communications.
[15] Vincent Conitzer,et al. Commitment to Correlated Strategies , 2011, AAAI.
[16] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[17] Patrick Maillé,et al. Mitigating selfish primary user emulation attacks in multi-channel cognitive radio networks: A surveillance game , 2016, ArXiv.
[18] S. Anand,et al. An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.
[19] Ekram Hossain,et al. Dynamic Spectrum Access and Management in Cognitive Radio Networks , 2009 .
[20] Sarit Kraus,et al. Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games , 2008, AAMAS.
[21] B. Stengel,et al. Leadership with commitment to mixed strategies , 2004 .
[22] Kaigui Bian,et al. Security vulnerabilities in IEEE 802.22 , 2008, WICON 2008.
[23] Philippe Ciblat,et al. Mitigating Primary Emulation Attacks in Multi-Channel Cognitive Radio Networks: A Surveillance Game , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[24] Yiwei Thomas Hou,et al. Toward secure distributed spectrum sensing in cognitive radio networks , 2008, IEEE Communications Magazine.
[25] Amir Alipour-Fanid,et al. Online learning-based optimal primary user emulation attacks in cognitive radio networks , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[26] Shamik Sengupta,et al. Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach , 2012, IET Commun..
[27] Carlos A. Pomalaza-Raez,et al. Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.
[28] Mauro Barni,et al. A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines , 2015, IEEE Transactions on Information Forensics and Security.
[29] Philippe Ciblat,et al. Surveillance Strategies Against Primary User Emulation Attack in Cognitive Radio Networks , 2015, IEEE Transactions on Wireless Communications.
[30] Sarit Kraus,et al. The impact of adversarial knowledge on adversarial planning in perimeter patrol , 2008, AAMAS.