暂无分享,去创建一个
[1] Andrzej Jajszczyk,et al. QoX: What is it really? , 2011, IEEE Communications Magazine.
[2] Erman Ayday,et al. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.
[3] Andres Garcia-Saavedra,et al. A Game-Theoretic Approach to Distributed Opportunistic Scheduling , 2011, IEEE/ACM Transactions on Networking.
[4] Szymon Szott,et al. Impact of Misbehaviour on QoS in Wireless Mesh Networks , 2009, Networking.
[5] Santiago Zazo,et al. Wireless Networks under a Backoff Attack: A Game Theoretical Perspective , 2018, Sensors.
[6] Guofei Gu,et al. PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks , 2016, Comput. Secur..
[7] Szymon Szott,et al. Impact of Contention Window Cheating on Single-Hop IEEE 802.11e MANETs , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[8] Winston Khoon Guan Seah,et al. Cooperation stimulation mechanisms for wireless multihop networks: A survey , 2015, J. Netw. Comput. Appl..
[9] Szymon Szott. Selfish insider attacks in IEEE 802.11s wireless mesh networks , 2014, IEEE Communications Magazine.
[10] Szymon Szott,et al. Traffic Remapping Attacks in Ad Hoc Networks , 2018, IEEE Communications Magazine.
[11] E. Kalai,et al. Rational Learning Leads to Nash Equilibrium , 1993 .
[12] Szymon Szott,et al. Modeling a Traffic Remapping Attack Game in a Multi-Hop Ad Hoc Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[13] R. Srikant,et al. A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks , 2010, Ad Hoc Networks.
[14] Yu Zhang,et al. AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks , 2016, IEEE Transactions on Mobile Computing.
[15] Szymon Szott,et al. Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks , 2014, IEEE Transactions on Wireless Communications.
[16] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[17] Teck-Hua Ho,et al. Finite automata play repeated prisoner's dilemma with information processing costs , 1996 .
[18] Szymon Szott,et al. Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach , 2013, Secur. Commun. Networks.
[19] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[20] K. Ashok Babu,et al. Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks , 2017 .
[21] Guy Pujolle,et al. Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.