A Game Theoretic Approach to Modelling Jamming Attacks in Delay Tolerant Networks
暂无分享,去创建一个
[1] Jie Wu,et al. Behavioral Malware Detection in Delay Tolerant Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Jeannette M. Wing,et al. Game strategies in network security , 2005, International Journal of Information Security.
[3] Jie Wu,et al. Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.
[4] Walid Saad,et al. Eavesdropping and jamming in next-generation wireless networks: A game-theoretic approach , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[5] Vinod Venkataraman vinodv. Delay Tolerant Networking-A Tutorial , 2009 .
[6] Zhu Han,et al. Performance analysis of delay-constrained wireless energy harvesting communication networks under jamming attacks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[7] Murat Kantarcioglu,et al. A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model , 2010, GameSec.
[8] Divya Kuriakose,et al. Effective defending against flood attack using stream-check method in tolerant network , 2014, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE).
[9] Rachid El Azouzi,et al. Evolutionary forwarding games in Delay Tolerant Networks , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.
[10] Emmanuel Chaput,et al. DTN for WSN: FREAK, implementations and study , 2015, 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC).
[11] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[12] Eitan Altman,et al. Adversarial Control in a Delay Tolerant Network , 2010, GameSec.
[13] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[14] Sujoy Saha,et al. SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN , 2012, ACITY.
[15] Marco Zennaro,et al. Delay tolerant network on smartphones: applications for communication challenged areas , 2011, ExtremeCom.
[16] Tansu Alpcan,et al. Network Security , 2010 .
[17] L. Jean Camp,et al. Game-theoretic modeling and analysis of insider threats , 2008, Int. J. Crit. Infrastructure Prot..
[18] Tansu Alpcan,et al. Security Games with Incomplete Information , 2009, 2009 IEEE International Conference on Communications.
[19] Chaodit Aswakul,et al. Game theoretic analysis of jamming attack in wireless mesh network with delay tolerance , 2013, 2013 International Computer Science and Engineering Conference (ICSEC).
[20] Theoretical research on structural equation model based on principle of entropy , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[21] Wei Sun,et al. On Delay-Tolerant Networking and Its Application , .