Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things
暂无分享,去创建一个
[1] Jin-cui Yang,et al. Security model and key technologies for the Internet of things , 2011 .
[2] E. Blum,et al. The Mathematical Theory of Optimal Processes. , 1963 .
[3] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[4] David W. K. Yeung,et al. Cooperative Stochastic Differential Games , 2005 .
[5] Robert Green,et al. Communication security in internet of thing: preventive measure and avoid DDoS attack over IoT network , 2015, SpringSim.
[6] Liu Ren-hui,et al. Model Identification of Risk Management System , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] Yong-Sik Choi,et al. A Study on Sensor Node Capture Defense Protocol for Ubiquitous Sensor Network , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[8] Li Miao,et al. A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing , 2018, Secur. Commun. Networks.
[9] Radha Poovendran,et al. Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[10] Lei Yang,et al. Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..
[11] Yuan Xue. Key management schemes for distributed sensor networks , 2008 .
[12] Srijith Krishnan Nair,et al. Self Managed Security Cell, a Security Model for the Internet of Things and Services , 2009, 2009 First International Conference on Advances in Future Internet.
[13] Quanyan Zhu,et al. Game-Theoretic Methods for Robustness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Cross-Layer Resilient Control Systems , 2015, IEEE Control Systems.
[14] Radha Poovendran,et al. Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.
[15] Ilsun You,et al. A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing , 2018, IEEE Access.
[16] Rathanakar Acharya,et al. Data integrity and intrusion detection in Wireless Sensor Networks , 2008, 2008 16th IEEE International Conference on Networks.
[17] Michael Bloem,et al. A stackelberg game for power control and channel allocation in cognitive radio networks , 2007, Valuetools 2007.
[18] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[19] Jun-won Ho. Distributed Detection of Node Capture Attacks in Wireless Sensor Networks , 2010 .
[20] Sachin Agarwal,et al. A stackelberg game for pricing uplink power in wide-band cognitive radio networks , 2008, 2008 47th IEEE Conference on Decision and Control.
[21] Imrich Chlamtac,et al. Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.
[22] Fuhong Lin,et al. Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system , 2018, EURASIP J. Wirel. Commun. Netw..
[23] Symeon Papavassiliou,et al. Utility-Based Uplink Power Control in CDMA Wireless Networks with Real-Time Services , 2008, ADHOC-NOW.
[24] Vladimir Oleshchuk,et al. Internet of things and privacy preserving technologies , 2009, 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology.
[25] Baoquan Zhang,et al. Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).
[26] Caiming Liu,et al. A Novel Approach to IoT Security Based on Immunology , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[27] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[28] John S. Baras,et al. On the Mitigation of Interference Imposed by Intruders in Passive RFID Networks , 2016, GameSec.
[29] Symeon Papavassiliou,et al. Joint utility-based uplink power and rate allocation in wireless networks: A non-cooperative game theoretic framework , 2013, Phys. Commun..
[30] Kim-Kwang Raymond Choo,et al. Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.
[31] Orestis Mavropoulos,et al. A conceptual model to support security analysis in the internet of things , 2017, Comput. Sci. Inf. Syst..
[32] Hannes Tschofenig,et al. Securing the Internet of Things: A Standardization Perspective , 2014, IEEE Internet of Things Journal.
[33] R. Srikant,et al. Revenue-maximizing pricing and capacity expansion in a many-users regime , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[34] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.