Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Game theory for wireless sensor networks: a survey

HY Shi, WL Wang, NM Kwok, SY Chen - Sensors, 2012 - mdpi.com
Game theory (GT) is a mathematical method that describes the phenomenon of conflict and
cooperation between intelligent rational decision-makers. In particular, the theory has been …

A blockchain based truthful incentive mechanism for distributed P2P applications

Y He, H Li, X Cheng, Y Liu, C Yang, L Sun - IEEE access, 2018 - ieeexplore.ieee.org
In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to
effectively complete certain tasks such as forwarding files, delivering messages, or …

[图书][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

Vehicular networks and the future of the mobile internet

M Gerla, L Kleinrock - Computer Networks, 2011 - Elsevier
The first DARPA experiment with wireless mobile Internet–the Packet Radio Network or
PRNET–was completely independent of the infrastructure. This model was consistent with …

[PDF][PDF] Using game theory to analyze wireless ad hoc networks.

V Srivastava, JO Neel, AB MacKenzie… - IEEE Commun. Surv …, 2005 - researchgate.net
The application of mathematical analysis to the study of wireless ad hoc networks has met
with limited success due to the complexity of mobility and traffic models, the dynamic …

Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks

H Zhu, X Lin, R Lu, Y Fan… - IEEE transactions on …, 2009 - ieeexplore.ieee.org
Delay-tolerant networks (DTNs) provide a promising solution to support wide-ranging
applications in the regions where end-to-end network connectivity is not available. In DTNs …

Fusion of vision and gyro tracking for robust augmented reality registration

S You, U Neumann - Proceedings IEEE Virtual Reality 2001, 2001 - ieeexplore.ieee.org
A novel framework enables accurate augmented reality (AR) registration with integrated
inertial gyroscope and vision tracking technologies. The framework includes a two-channel …

Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks

Z Li, H Shen - IEEE Transactions on mobile computing, 2011 - ieeexplore.ieee.org
In mobile ad hoc networks (MANETs), tasks are conducted based on the cooperation of
nodes in the networks. However, since the nodes are usually constrained by limited …

Non-cooperative resource competition game by virtual referee in multi-cell OFDMA networks

Z Han, Z Ji, KJR Liu - IEEE Journal on Selected Areas in …, 2007 - ieeexplore.ieee.org
In this paper, a distributive non-cooperative game is proposed to perform sub-channel
assignment, adaptive modulation, and power control for multi-cell multi-user orthogonal …