Game theory for wireless sensor networks: a survey

HY Shi, WL Wang, NM Kwok, SY Chen - Sensors, 2012 - mdpi.com
Game theory (GT) is a mathematical method that describes the phenomenon of conflict and
cooperation between intelligent rational decision-makers. In particular, the theory has been …

Game theory meets wireless sensor networks security requirements and threats mitigation: A survey

MS Abdalzaher, K Seddik, M Elsabrouty, O Muta… - Sensors, 2016 - mdpi.com
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …

A survey on networking games in telecommunications

E Altman, T Boulogne, R El-Azouzi, T Jiménez… - Computers & Operations …, 2006 - Elsevier
In this survey, we summarize different modeling and solution concepts of networking games,
as well as a number of different applications in telecommunications that make use of or can …

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems

SJ Stolfo, AD Keromytis, V Misra, ME Locasto… - US Patent …, 2014 - Google Patents
Systems and methods provide an alert correlator and an alert distributor that enable early
signs of an attack to be detected and rapidly disseminated to collaborating systems. The …

Palette: Distributing tables in software-defined networks

Y Kanizo, D Hay, I Keslassy - 2013 Proceedings IEEE …, 2013 - ieeexplore.ieee.org
In software-defined networks (SDNs), the network controller first formulates abstract network-
wide policies, and then implements them in the forwarding tables of network switches …

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems

SJ Stolfo, T Malkin, AD Keromytis, V Misra… - US Patent …, 2010 - Google Patents
Systems and methods for correlating and distributing intru sion alert information among
collaborating computer sys tems are provided. These systems and methods provide an alert …

Systems and methods for correlating and distributing intrusion alert information among collaborating computer systems

SJ Stolfo, AD Keromytis, V Misra, ME Locasto… - US Patent …, 2010 - Google Patents
Systems and methods for correlating and distributing intru sion alert information among
collaborating computer sys tems are provided. These systems and methods provide an alert …

Optimal positioning of active and passive monitoring devices

C Chaudet, E Fleury, IG Lassous, H Rivano… - Proceedings of the 2005 …, 2005 - dl.acm.org
Network measurement is essential for assessing performance issues, identifying and
locating problems. Two common strategies are the passive approach that attaches specific …

A Bayesian game approach for intrusion detection in wireless ad hoc networks

Y Liu, C Comaniciu, H Man - Proceeding from the 2006 workshop on …, 2006 - dl.acm.org
In wireless ad hoc networks, although defense strategies such as intrusion detection
systems (IDSs) can be deployed at each mobile node, significant constraints are imposed in …

Intrusion detection in sensor networks: A non-cooperative game approach

A Agah, SK Das, K Basu, M Asadi - Third IEEE International …, 2004 - ieeexplore.ieee.org
Insufficiency of memory and battery power of sensors makes the security of sensor networks
a hard task to do. This insufficiency also makes applying the existing methods of securing …