4.7 Article

Game Theory for Network Security

Related references

Note: Only part of the references are listed.
Review Computer Science, Information Systems

A survey of cyber crimes

Yanping Zhang et al.

SECURITY AND COMMUNICATION NETWORKS (2012)

Article Engineering, Electrical & Electronic

Jamming Games in Wireless Networks with Incomplete Information

Yalin Evren Sagduyu et al.

IEEE COMMUNICATIONS MAGAZINE (2011)

Article Computer Science, Hardware & Architecture

How Bad Are Selfish Investments in Network Security?

Libin Jiang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2011)

Article Computer Science, Hardware & Architecture

A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory

Mehran S. Fallah

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2010)

Article Automation & Control Systems

Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory

Xiannuan Liang et al.

IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS (2010)

Article Computer Science, Theory & Methods

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks

Lin Chen et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)

Article Computer Science, Hardware & Architecture

Cybersecurity strategies: The QuERIES methodology

Lawrence Carin et al.

COMPUTER (2008)

Article Computer Science, Information Systems

Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks

Fei Hu et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2008)

Article Engineering, Electrical & Electronic

Detection of fraudulent usage in wireless networks

Bo Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)

Article Computer Science, Hardware & Architecture

Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks

Bo Sun et al.

IEEE WIRELESS COMMUNICATIONS (2007)

Article Engineering, Electrical & Electronic

Integration of mobility and intrusion detection for wireless ad hoc networks

Bo Sun et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2007)

Article Engineering, Electrical & Electronic

Enhancing security using mobility-based anomaly detection in cellular mobile networks

Bo Sun et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2006)

Article Automation & Control Systems

Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria

JS Shamma et al.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2005)