Competition and cooperation in wireless access misbehavior
暂无分享,去创建一个
[1] John S. Baras,et al. Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers , 2007, J. Comput. Secur..
[2] Richard J. La,et al. DIMACS Series in Discrete Mathematics and Theoretical Computer Science A Game-theoretic Look at the Gaussian Multiaccess Channel , 2022 .
[3] Nitin H. Vaidya,et al. Selfish MAC layer misbehavior in wireless networks , 2005, IEEE Transactions on Mobile Computing.
[4] Jerzy Konorski. A game-theoretic study of CSMA/CA under a backoff attack , 2006, TNET.
[5] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[6] Jerzy Konorski,et al. A Game-Theoretic Study of CSMA/CA Under a Backoff Attack , 2006, IEEE/ACM Transactions on Networking.
[7] George Kesidis,et al. Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs , 2007, IEEE Journal on Selected Areas in Communications.
[8] John S. Baras,et al. Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.
[9] H. Poor. An Introduction to Signal Detection and Estimation-Second Edition Chapter III: Selected Solutions , 2005 .
[10] J. Andel. Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.
[11] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[12] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[13] Michalis Faloutsos,et al. Routing amid Colluding Attackers , 2007, 2007 IEEE International Conference on Network Protocols.
[14] Zhu Han,et al. Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.
[15] Xiaodong Wang,et al. Robust detection of selfish misbehavior in wireless networks , 2007, IEEE Journal on Selected Areas in Communications.
[16] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[17] Zhuo Lu,et al. On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[18] Maxim Raya,et al. DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots , 2006, IEEE Transactions on Mobile Computing.
[19] John S. Baras,et al. An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks , 2008, TSEC.