Sciweavers

60 search results - page 2 / 12
» Game Theoretic Modeling of Malicious Users in Collaborative ...
Sort
View
INFOCOM
2008
IEEE
13 years 11 months ago
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach
—We consider a scenario in which users share an access point and are mainly interested in VoIP applications. Each user is allowed to adapt to varying network conditions by choosi...
Edson H. Watanabe, Daniel S. Menasché, Edmu...
COMCOM
2008
120views more  COMCOM 2008»
13 years 4 months ago
Game theoretic models for detecting network intrusions
In this paper, we study using game theory the problem of detecting intrusions in wired infrastructure networks. Detection is accomplished by sampling a subset of the transmitted p...
Hadi Otrok, Mona Mehrandish, Chadi Assi, Mourad De...
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 4 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
CORR
2010
Springer
183views Education» more  CORR 2010»
13 years 4 months ago
A Game Theoretical Approach to Modeling Information Dissemination in Social Networks
One major function of social networks (e.g., massive online social networks) is the dissemination of information such as scientific knowledge, news, and rumors. Information can be...
Dmitry Zinoviev, Vy Duong, Honggang Zhang
GLOBECOM
2009
IEEE
13 years 11 months ago
Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
Abstract—Cognitive radio technologies have become a promising approach to increase the efficiency of spectrum utilization. Although cognitive radio has been intensively studied ...
Yongle Wu, Beibei Wang, K. J. Ray Liu