A game-theoretic analysis of denial of service attacks in wireless random access
暂无分享,去创建一个
[1] Anthony Ephremides,et al. On the stability of interacting queues in a multiple-access system , 1988, IEEE Trans. Inf. Theory.
[2] Jens Zander,et al. Jamming in Slotted ALOHA Multihop Packet , 1991 .
[3] Venkat Anantharam. The stability region of the finite-user slotted ALOHA protocol , 1991, IEEE Trans. Inf. Theory.
[4] Wei Luo,et al. Stability of N interacting queues in random-access systems , 1999, IEEE Trans. Inf. Theory.
[5] Stephen B. Wicker,et al. Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..
[6] Stephen B. Wicker,et al. Selfish users in Aloha: a game-theoretic approach , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[7] Rachid El Azouzi,et al. Slotted Aloha as a Stochastic Game with Partial Information , 2003 .
[8] George Kesidis,et al. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.
[9] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[10] Stephen B. Wicker,et al. Stability of multipacket slotted Aloha with selfish users and perfect information , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Anthony Ephremides,et al. Power control and rate adaptation as stochastic games for random access , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).
[12] Eitan Altman,et al. Slotted Aloha as a game with partial information , 2004, Comput. Networks.
[13] Peter Marbach,et al. Transmission costs, selfish nodes, and protocol design , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[14] Jeff S. Shamma,et al. Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria , 2005, IEEE Transactions on Automatic Control.
[15] Anthony Ephremides,et al. On the throughput, capacity, and stability regions of random multiple access , 2005, IEEE Transactions on Information Theory.
[16] H. Inaltekin,et al. A one-shot random access game for wireless networks , 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing.
[17] Lang Tong,et al. Stability and delay of finite-user slotted ALOHA with multipacket reception , 2005, IEEE Transactions on Information Theory.
[18] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[19] A. Ephremides,et al. A Game-Theoretic Look at Throughput and Stability in Random Access , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[20] Anthony Ephremides,et al. A game-theoretic look at simple relay channel , 2006, Wirel. Networks.
[21] A. Robert Calderbank,et al. Utility-Optimal Medium Access Control: Reverse and Forward Engineering , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[22] Cristina Comaniciu,et al. Cooperation and Fairness for Slotted Aloha , 2007, Wirel. Pers. Commun..
[23] John S. Baras,et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..
[24] Anthony Ephremides,et al. On Joint MAC and Network Coding in Wireless Ad Hoc Networks , 2007, IEEE Transactions on Information Theory.
[25] Peter Marbach,et al. Transmission costs, selfish nodes, and protocol design , 2008, Wirel. Networks.