MAC games for distributed wireless network security with incomplete information of selfish and malicious user types
暂无分享,去创建一个
[1] Anthony Ephremides,et al. SINR-based MAC Games for Selfish and Malicious Users , 2006 .
[2] Jens Zander,et al. Jamming in slotted ALOHA multihop packet radio networks , 1991, IEEE Trans. Commun..
[3] JiHongbin,et al. Non-cooperative uplink power control in cellular radio systems , 1998 .
[4] John S. Baras,et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..
[5] Eitan Altman,et al. A Jamming Game in Wireless Networks with Transmission Cost , 2007, NET-COOP.
[6] Stephen B. Wicker,et al. Random Access Games: Selfish Nodes with Incomplete Information , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[7] R. Srikant,et al. Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[8] Stephen B. Wicker,et al. Game theory and the design of self-configuring, adaptive wireless networks , 2001, IEEE Commun. Mag..
[9] John S. Baras,et al. Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.
[10] Ching-Yao Huang,et al. Non-cooperative uplink power control in cellular radio systems , 1998, Wirel. Networks.
[11] A. Robert Calderbank,et al. Utility-optimal random-access control , 2007, IEEE Transactions on Wireless Communications.
[12] George Kesidis,et al. Equilibria of a noncooperative game for heterogeneous users of an ALOHA network , 2002, IEEE Communications Letters.
[13] Moshe Babaioff,et al. Congestion games with malicious players , 2007, EC '07.
[14] Cem U. Saraydar,et al. Efficient power control via pricing in wireless data networks , 2002, IEEE Trans. Commun..
[15] R. Srikant,et al. Correlated Jamming on MIMO Gaussian Fading Channels , 2004, IEEE Trans. Inf. Theory.
[16] Anthony Ephremides,et al. A game-theoretic analysis of denial of service attacks in wireless random access , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[17] Cristina Comaniciu,et al. A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.
[18] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[19] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[20] Anthony Ephremides,et al. A Game-Theoretic Analysis of Denial of Service Attacks in Wireless Random Access , 2007, WiOpt.
[21] Eitan Altman,et al. CDMA Uplink Power Control as a Noncooperative Game , 2002, Wirel. Networks.