Ensuring the Information Security of Wireless Dynamic Networks Based on the Game-Theoretic Approach

被引:0
作者
D. S. Lavrova
R. S. Solovei
机构
[1] Peter the Great St. Petersburg Polytechnic University,
来源
Automatic Control and Computer Sciences | 2020年 / 54卷
关键词
information security; wireless dynamic networks; game theory; network games; network reconfiguration;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:937 / 943
页数:6
相关论文
共 50 条
[41]   Interference Alignment for Cooperative Femtocell Networks: A Game-Theoretic Approach [J].
Pantisano, Francesco ;
Bennis, Mehdi ;
Saad, Walid ;
Debbah, Merouane ;
Latva-aho, Matti .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2013, 12 (11) :2233-2246
[42]   Security attacks on smart grid scheduling and their defences: a game-theoretic approach [J].
M. Pilz ;
F. Baghaei Naeini ;
K. Grammont ;
C. Smagghe ;
M. Davis ;
J.-C. Nebel ;
L. Al-Fagih ;
E. Pfluegel .
International Journal of Information Security, 2020, 19 :427-443
[43]   Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach [J].
Jin, Richeng ;
He, Xiaofan ;
Dai, Huaiyu ;
Dutta, Rudra ;
Ning, Peng .
2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, :72-83
[44]   A Game-Theoretic Approach with Decoy Qubits for Quantum Superdense Coding Security [J].
Sayari, Amal ;
Rekhisl, Slim ;
Mabrouk, Ali .
2024 INTERNATIONAL CONFERENCE ON UBIQUITOUS NETWORKING, UNET 2024, 2024, :135-142
[45]   Distributed Power Control For Wireless Ad Hoc Networks: A Game-Theoretic Approach Based On Best-Response Functions [J].
Kucera, Stepan ;
Yamamoto, Koji ;
Yoshida, Susumu .
2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, :1172-1176
[46]   A Game-Theoretic Approach for Enhancing Security and Data Trustworthiness in IoT Applications [J].
Abdalzaher, Mohamed S. ;
Muta, Osamu .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (11) :11250-11261
[47]   Security attacks on smart grid scheduling and their defences: a game-theoretic approach [J].
Pilz, M. ;
Naeini, F. Baghaei ;
Grammont, K. ;
Smagghe, C. ;
Davis, M. ;
Nebel, J. -C. ;
Al-Fagih, L. ;
Pfluegel, E. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (04) :427-443
[48]   An Imperfect Monitoring Game-Theoretic Approach for Crowdsourcing Reliable Wireless Data [J].
Javed, Zunera ;
Khan, Zaheer ;
Lehtomaki, Janne J. ;
Ahmadi, Hamed ;
Sone, Su P. .
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 :3170-3184
[49]   Decision-theoretic and game-theoretic approaches to IT security investment [J].
Cavusoglu, Huseyin ;
Raghunathan, Srinivasan ;
Yue, Wei T. .
JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) :281-304
[50]   Automated Game-Theoretic Verification of Security Systems [J].
Mu, Chunyan .
QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019), 2019, 11785 :239-256