Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Trust computations and trust dynamics in mobile adhoc networks: A survey

K Govindan, P Mohapatra - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
Trust is an important aspect of mobile adhoc networks (MANETs). It enables entities to cope
with uncertainty and uncontrollability caused by the free will of others. Trust computations …

A survey of social-based routing in delay tolerant networks: Positive and negative social effects

Y Zhu, B Xu, X Shi, Y Wang - IEEE Communications Surveys & …, 2012 - ieeexplore.ieee.org
Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs
is thus challenging since it must handle network partitioning, long delays, and dynamic …

Disruption-tolerant networking: A comprehensive survey on recent developments and persisting challenges

MJ Khabbaz, CM Assi, WF Fawaz - … Communications Surveys & …, 2011 - ieeexplore.ieee.org
Nowadays, wireless networks are witnessing several deployments in various extreme
environments where they suffer from different levels of link disruptions depending on the …

An acknowledgment-based approach for the detection of routing misbehavior in MANETs

K Liu, J Deng, PK Varshney… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general,
routing protocols for MANETs are designed based on the assumption that all participating …

[PDF][PDF] Using game theory to analyze wireless ad hoc networks.

V Srivastava, JO Neel, AB MacKenzie… - IEEE Commun. Surv …, 2005 - researchgate.net
The application of mathematical analysis to the study of wireless ad hoc networks has met
with limited success due to the complexity of mobility and traffic models, the dynamic …

BAR fault tolerance for cooperative services

AS Aiyer, L Alvisi, A Clement, M Dahlin… - Proceedings of the …, 2005 - dl.acm.org
This paper describes a general approach to constructing cooperative services that span
multiple administrative domains. In such environments, protocols must tolerate both …

A survey of trust and reputation management systems in wireless communications

H Yu, Z Shen, C Miao, C Leung… - Proceedings of the …, 2010 - ieeexplore.ieee.org
Trust is an important concept in human interactions which facilitates the formation and
continued existence of functional human societies. In the first decade of the 21st century …

[图书][B] Cyber-physical systems: from theory to practice

DB Rawat, JJPC Rodrigues, I Stojmenovic - 2015 - books.google.com
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must
for researchers, practitioners, system designers, policy makers, system managers, and …

[图书][B] Ad hoc and sensor networks: theory and applications

CDM Cordeiro, DP Agrawal - 2011 - books.google.com
This book provides a comprehensive yet easy coverage of ad hoc and sensor networks and
fills the gap of existing literature in this growing field. It emphasizes that there is a major …