Cyber Deception for Wireless Network Virtualization Using Stackelberg Game Theory
暂无分享,去创建一个
[1] Marko Höyhtyä,et al. Spectrum Occupancy Measurements: A Survey and Use of Interference Maps , 2016, IEEE Communications Surveys & Tutorials.
[2] Tongwen Chen,et al. Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).
[3] Insoo Koo,et al. Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning , 2018, IEEE Access.
[4] Weihua Zhuang,et al. Software Defined Networking Enabled Wireless Network Virtualization: Challenges and Solutions , 2017, IEEE Network.
[5] Karl Henrik Johansson,et al. Attack models and scenarios for networked control systems , 2012, HiCoNS '12.
[6] Danda B. Rawat,et al. Payoff Optimization Through Wireless Network Virtualization for IoT Applications: A Three Layer Game Approach , 2019, IEEE Internet of Things Journal.
[7] Danda B. Rawat,et al. Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).
[8] Danda B. Rawat,et al. A novel approach for shared resource allocation with wireless network virtualization , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).
[9] Li Xu,et al. Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..
[10] Haifeng Xu,et al. Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.
[11] Milind Tambe,et al. Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .
[12] Shridatt Sugrim,et al. On Defensive Cyber Deception: A Case Study Using SDN , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[13] Danda B. Rawat,et al. Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization , 2019, IEEE Communications Magazine.
[14] Tongwen Chen,et al. False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.