Related references
Note: Only part of the references are listed.A survey of cyber crimes
Yanping Zhang et al.
SECURITY AND COMMUNICATION NETWORKS (2012)
Jamming Games in Wireless Networks with Incomplete Information
Yalin Evren Sagduyu et al.
IEEE COMMUNICATIONS MAGAZINE (2011)
How Bad Are Selfish Investments in Network Security?
Libin Jiang et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2011)
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory
Mehran S. Fallah
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2010)
Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory
Xiannuan Liang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS (2010)
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks
Lin Chen et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2009)
Cybersecurity strategies: The QuERIES methodology
Lawrence Carin et al.
COMPUTER (2008)
Vertical and horizontal synchronization services with outlier detection in underwater acoustic networks
Fei Hu et al.
WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2008)
Detection of fraudulent usage in wireless networks
Bo Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)
Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
Bo Sun et al.
IEEE WIRELESS COMMUNICATIONS (2007)
Integration of mobility and intrusion detection for wireless ad hoc networks
Bo Sun et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2007)
Enhancing security using mobility-based anomaly detection in cellular mobile networks
Bo Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2006)
Dynamic fictitious play, dynamic gradient play, and distributed convergence to Nash equilibria
JS Shamma et al.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL (2005)