A Mobile Offloading Game Against Smart Attacks
暂无分享,去创建一个
[1] Xu Chen,et al. Decentralized Computation Offloading Game for Mobile Cloud Computing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[2] Larry J. Greenstein,et al. Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.
[3] Jong Hyuk Park,et al. SSP-MCloud: A Study on Security Service Protocol for Smartphone Centric Mobile Cloud Computing , 2011 .
[4] A. Lee Swindlehurst,et al. Jamming Games in the MIMO Wiretap Channel With an Active Eavesdropper , 2010, IEEE Transactions on Signal Processing.
[5] Dusit Niyato,et al. Offloading in Mobile Cloudlet Systems with Intermittent Connectivity , 2015, IEEE Transactions on Mobile Computing.
[6] Chun Chen,et al. Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions , 2012, IEEE Transactions on Wireless Communications.
[7] Liang Xiao,et al. Mobile crowdsensing game in vehicular networks , 2015, TENCON 2015 - 2015 IEEE Region 10 Conference.
[8] H. Vincent Poor,et al. A Game Theoretic Analysis of Secret and Reliable Communication With Active and Passive Adversarial Modes , 2016, IEEE Transactions on Wireless Communications.
[9] Zhu Han,et al. A distributed ADMM approach for mobile data offloading in software defined network , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[10] Katinka Wolter,et al. Analysis of the Energy-Response Time Tradeoff for Mobile Cloud Offloading Using Combined Metrics , 2015, 2015 27th International Teletraffic Congress.
[11] Cheng Wang,et al. Computation offloading to save energy on handheld devices: a partition scheme , 2001, CASES '01.
[12] Ashutosh Sabharwal,et al. Design of WARP: A wireless open-access research platform , 2006, 2006 14th European Signal Processing Conference.
[13] Yi Sun,et al. Analysis of the Energy-Response Time Tradeoff for Delayed Mobile Cloud Offloading , 2015, PERV.
[14] H. Vincent Poor,et al. User-Centric View of Jamming Games in Cognitive Radio Networks , 2015, IEEE Transactions on Information Forensics and Security.
[15] A. Lee Swindlehurst,et al. Optimal strategies for countering dual-threat jamming/eavesdropping-capable adversaries in MIMO channels , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[16] Katinka Wolter,et al. Security and Performance Tradeoff Analysis of Mobile Offloading Systems Under Timing Attacks , 2015, EPEW.
[17] Liang Xiao,et al. Mobile cloud offloading for malware detections with learning , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[18] H. Vincent Poor,et al. Mobile offloading game against smart attacks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[19] Massoud Pedram,et al. A Nested Two Stage Game-Based Optimization Framework in Mobile Cloud Computing System , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[20] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[21] Bart De Schutter,et al. A Comprehensive Survey of Multiagent Reinforcement Learning , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[22] Hung-Min Sun,et al. Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[23] H. Vincent Poor,et al. Incorporating Attack-Type Uncertainty Into Network Protection , 2014, IEEE Transactions on Information Forensics and Security.
[24] Prasant Mohapatra,et al. Dynamic defense strategy against advanced persistent threat with insiders , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[25] Massoud Pedram,et al. A semi-Markovian decision process based control method for offloading tasks from mobile devices to the cloud , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).