1 |
A. Roles and H. ElAarag, "Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach," Journal of Algorithms & Computational Technology, Vol. 11(4) 353-365, 2017. DOI: https://doi.org/10.1177/1748301817725305.
DOI
|
2 |
W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, "A game theoretic approach to detect and co-exist with malicious nodes in wireless networks," Computer Networks, 71 (2014) 63-83. DOI: http://dx.doi.org/10.1016/j.comnet.2014.06.008.
DOI
|
3 |
F. Li, Y. Yang, and Jie Wu, "Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs," IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS-PART B: CYBERNETICS, VOL. 40, NO. 3, JUNE 2010. DOI: https://doi.org/10.1109/TSMCB.2009.2035929.
DOI
|
4 |
J. Ho, M. Wright, and S.K. Das, "Distributed detection of mobile malicious node attacks in wireless sensor networks," Ad Hoc Networks 10(3): 512-523 (2012). DOI: https://doi.org/10.1016/j.adhoc.2011.09.006.
DOI
|
5 |
A. Wald, Sequential Analysis, Dover Publications, 2004.
|
6 |
Martin J. Osborne, An Introduction to Game Theory, Oxford University Press, 2004.
|