[1]
|
Analysis and Development of Game-Theoretic Models for Combating Threats to Information Security in Critical Information Infrastructure
2023 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO,
2023
DOI:10.1109/SYNCHROINFO57872.2023.10178500
|
|
|
[2]
|
Whole-Region Hybrid Search Algorithm for DSSS Signal Acquisition
Wireless Personal Communications,
2017
DOI:10.1007/s11277-016-3828-1
|
|
|
[3]
|
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Security and Communication Networks,
2016
DOI:10.1002/sec.1484
|
|
|
[4]
|
“See Something, Say Something” Crowdsourced Enforcement of Spectrum Policies
IEEE Transactions on Wireless Communications,
2016
DOI:10.1109/TWC.2015.2466550
|
|
|
[5]
|
Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges
Security and Communication Networks,
2016
DOI:10.1002/sec.1484
|
|
|
[6]
|
Security Games With Unknown Adversarial Strategies
IEEE Transactions on Cybernetics,
2016
DOI:10.1109/TCYB.2015.2475243
|
|
|
[7]
|
Game Theoretic Framework for Reputation-Based Distributed Intrusion Detection
2013 International Conference on Social Computing,
2013
DOI:10.1109/SocialCom.2013.84
|
|
|
[8]
|
A cooperative intrusion detection scheme for clustered mobile ad hoc networks
2011 7th International Conference on Information Assurance and Security (IAS),
2011
DOI:10.1109/ISIAS.2011.6122816
|
|
|