Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks
暂无分享,去创建一个
[1] Michael L. Littman,et al. Markov Games as a Framework for Multi-Agent Reinforcement Learning , 1994, ICML.
[2] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[3] Dimitri P. Bertsekas,et al. Dynamic Programming and Optimal Control, Two Volume Set , 1995 .
[4] Salil S. Kanhere,et al. NIS07-5: Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks , 2006, IEEE Globecom 2006.
[5] Ian F. Akyildiz,et al. NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.
[6] Radha Poovendran,et al. Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Wenyuan Xu,et al. On Adjusting Power to Defend Wireless Networks from Jamming , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).
[8] Gianmarco Baldini,et al. Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead , 2012, IEEE Communications Surveys & Tutorials.
[9] Loukas Lazos,et al. Vulnerabilities of cognitive radio MAC protocols and countermeasures , 2013, IEEE Network.
[10] Sisi Liu,et al. Thwarting Control-Channel Jamming Attacks from Inside Jammers , 2012, IEEE Transactions on Mobile Computing.
[11] Sisi Liu,et al. Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.
[12] Mina Guirguis,et al. Game theoretic defense approach to wireless networks against stealthy decoy attacks , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[13] Mina Guirguis,et al. Pinball attacks: Exploiting channel allocation in wireless networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[14] Patrick Tague,et al. How to jam without getting caught: Analysis and empirical study of stealthy periodic jamming , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[15] P. Steenkiste. Distributed Dynamic Channel Selection in Chaotic Wireless Networks , 2007 .
[16] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[17] Mina Guirguis,et al. Stealthy edge decoy attacks against dynamic channel assignment in wireless networks , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.
[18] Qijun Gu,et al. Lightweight Attacks against Channel Assignment Protocols in MIMC Wireless Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[19] K. J. Ray Liu,et al. Optimal power allocation strategy against jamming attacks using the Colonel Blotto game , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[20] Joseph Mitola,et al. Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..
[21] Tuomas Sandholm,et al. Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming , 2014, WiSec '14.
[22] David Walker,et al. Composing Software Defined Networks , 2013, NSDI.
[23] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[24] K. J. Ray Liu,et al. An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.