Solving sybil attacks using evolutionary game theory
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Brian Neil Levine,et al. Quantifying Resistance to the Sybil Attack , 2008, Financial Cryptography.
[3] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[4] Libin Yang,et al. Preventing dropping packets attack in sensor networks: A game theory approach , 2008, Wuhan University Journal of Natural Sciences.
[5] Murat Kantarcioglu,et al. When Do Firms Invest in Privacy-Preserving Technologies? , 2010, GameSec.
[6] Ilangko Balasingham,et al. Grouping Nodes in Wireless Sensor Networks Using Coalitional Game Theory , 2010, FMOODS/FORTE.
[7] Jon M. Kleinberg,et al. Networks, Crowds, and Markets: Reasoning about a Highly Connected World [Book Review] , 2013, IEEE Technol. Soc. Mag..
[8] Marc Lelarge,et al. A local mean field analysis of security investments in networks , 2008, NetEcon '08.
[9] Mustaque Ahamad,et al. Incentives in BitTorrent induce free riding , 2005, P2PECON '05.
[10] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[11] Shengyong Chen,et al. Game Theory for Wireless Sensor Networks: A Survey , 2012, Sensors.
[12] Gang Wei,et al. A game theoretic approach for power allocation with QoS constraints in wireless multimedia sensor networks , 2009, Multimedia Tools and Applications.
[13] Sigmund,et al. Introduction to Evolutionary Game Theory , 2010 .
[14] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[15] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[16] K. J. Ray Liu,et al. Game theory for cognitive radio networks: An overview , 2010, Comput. Networks.
[17] Zhu Han,et al. Physical layer security game: How to date a girl with her boyfriend on the same table , 2009, 2009 International Conference on Game Theory for Networks.
[18] F. Maxwell Harper,et al. An Economic Model of User Rating in an Online Recommender System , 2005, User Modeling.
[19] David Easley,et al. Networks, Crowds, and Markets: Modeling Network Traffic Using Game Theory , 2010 .
[20] William H. Sandholm,et al. Deterministic Evolutionary Dynamics , 2005 .
[21] Anthony Ephremides,et al. MAC games for distributed wireless network security with incomplete information of selfish and malicious user types , 2009, 2009 International Conference on Game Theory for Networks.
[22] Sophie Ahrens,et al. Recommender Systems , 2012 .
[23] Max Q.-H. Meng,et al. Conflict and coalition models in inhomogeneous power allocation for wireless sensor networks , 2009, 2008 IEEE International Conference on Robotics and Biomimetics.
[24] Sanghoon Lee,et al. A cross-layer optimization for energy-efficient MAC protocol with delay and rate constraints , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[25] Sebastian Ueckert August. An Introduction to Evolutionary Game Theory , 2007 .
[26] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.