Protection Augmentation in Mobile Ad Hoc Networks Using Game Theory
暂无分享,去创建一个
[1] Jie Wu,et al. Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[2] Martin L. Puterman,et al. Markov Decision Processes: Discrete Stochastic Dynamic Programming , 1994 .
[3] Sankardas Roy,et al. Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[4] Minyi Huang,et al. Mean Field Stochastic Games with Discrete States and Mixed Players , 2012, GAMENETS.
[5] Marco Carvalho. Security in Mobile Ad Hoc Networks , 2008, IEEE Security & Privacy.
[6] F. Richard Yu,et al. A game theoretic approach for security and Quality of Service (QoS) co-design in MANETs with cooperative communications , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[7] Yang Xiao,et al. Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.
[8] Peter Xiaoping Liu,et al. Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.
[9] Jie Liu,et al. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks , 2009, IEEE Transactions on Wireless Communications.
[10] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[11] Christos Politis,et al. A game theoretic approach for securing AODV in emergency Mobile Ad Hoc Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[12] F. Richard Yu,et al. Security and quality of service (QoS) co-design in cooperative mobile ad hoc networks , 2013, EURASIP J. Wirel. Commun. Netw..
[13] Jung-Min Park,et al. A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..
[14] Hamidou Tembine,et al. Mean field stochastic games for SINR-based medium access control , 2011, VALUETOOLS.
[15] Chao Liang,et al. Power Management in MIMO Ad Hoc Networks: A Game-Theoretic Approach , 2007, IEEE Transactions on Wireless Communications.
[16] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[17] Peter E. Caines,et al. The NCE (Mean Field) Principle With Locality Dependent Cost Interactions , 2010, IEEE Transactions on Automatic Control.
[18] Amitabh Mishra,et al. Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.
[19] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[20] Samson Lasaulce,et al. Mean field energy games in wireless networks , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).
[21] Xiaoyu Ni,et al. Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.
[22] Victor C. M. Leung,et al. Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.
[23] V. Vetriselvi,et al. Cluster Based Co-operative Game Theory Approach for Intrusion Detection in Mobile Ad-Hoc Grid , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[24] Piet Van Mieghem,et al. Protecting Against Network Infections: A Game Theoretic Perspective , 2009, IEEE INFOCOM 2009.
[25] Tansu Alpcan,et al. Network Security , 2010 .