A Survey on Game-Theoretic Approaches for Intrusion Detection and Response Optimization. | 4 | 0.48 | 2019 |
Authenticated and Privacy-Preserving Consent Management in the Internet of Things | 0 | 0.34 | 2019 |
Questioning the security and efficiency of the ESIoT approach. | 0 | 0.34 | 2018 |
Position paper: Towards End-to-end Privacy for Publish/Subscribe Architectures in the Internet of Things. | 0 | 0.34 | 2018 |
Optimal Deployment of Security Policies: Application to Industrial Control Systems | 0 | 0.34 | 2018 |
A Game Theoretical Model for Optimal Distribution of Network Security Resources. | 1 | 0.35 | 2017 |
Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis. | 6 | 0.49 | 2016 |
A Methodology to Apply a Game Theoretic Model of Security Risks Interdependencies Between ICT and Electric Infrastructures. | 1 | 0.39 | 2016 |
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures | 4 | 0.51 | 2015 |
A secure and effective device pairing protocol | 0 | 0.34 | 2015 |
Data Integrity And Availability Verification Game In Untrusted Cloud Storage | 4 | 0.42 | 2014 |
Formal Analysis of Secure Device Pairing Protocols | 3 | 0.41 | 2014 |
A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI | 5 | 0.41 | 2014 |
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols. | 0 | 0.34 | 2012 |
Conflicts and Incentives in Wireless Cooperative Relaying: A Distributed Market Pricing Framework | 17 | 0.66 | 2011 |
Fight jamming with jamming - A game theoretic analysis of jamming attack in wireless networks and defense strategy | 6 | 0.49 | 2011 |
A Policy Management Framework for Self-Protection of Pervasive Systems | 11 | 0.53 | 2010 |
Virtual Security Kernel: A Component-Based OS Architecture for Self-Protection | 5 | 0.39 | 2010 |
A DSL for specifying autonomic security management strategies | 3 | 0.37 | 2010 |
On multipath routing in multihop wireless networks: security, performance, and their tradeoff | 12 | 0.66 | 2009 |
Efficient Medium Access Control Design For Autonomous Wireless Networks - A Game Theoretic Approach | 1 | 0.34 | 2009 |
A game theoretical framework on intrusion detection in heterogeneous networks | 52 | 2.50 | 2009 |
Brief Announcement: An OS Architecture for Device Self-protection | 1 | 0.37 | 2009 |
ASRBAC: a security administration model for mobile autonomic networks (MAutoNets) | 0 | 0.34 | 2009 |
Toward secure and scalable time synchronization in ad hoc networks | 4 | 0.46 | 2007 |
Selfishness, Not Always A Nightmare: Modeling Selfish MAC Behaviors in Wireless Mobile Ad Hoc Networks | 19 | 1.00 | 2007 |
Towards an Autonomic Security System for Mobile Ad Hoc Networks | 4 | 0.40 | 2007 |
On the Power and Rate Control in IEEE 802.11 WLANs - A Game Theoretical Approach | 4 | 0.58 | 2007 |
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs | 26 | 1.25 | 2007 |
A security policy system for mobile autonomic networks | 1 | 0.35 | 2007 |
Autonomic security for home networks | 4 | 0.43 | 2006 |
A Secure and Efficient Link State Routing Protocol for Ad Hoc Networks | 1 | 0.36 | 2006 |
A Secure and Scalable Time Synchronization Protocol in IEEE 802.11 Ad Hoc Networks | 3 | 0.42 | 2006 |
A Trust-Based Routing Protocol for Ad Hoc Networks | 1 | 0.37 | 2004 |