A game theoretic approach to decision and analysis in network intrusion detection, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475), pp.2595-2600, 2003. ,
DOI : 10.1109/CDC.2003.1273013
A game theoretic analysis of intrusion detection in access control systems, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), pp.1568-1573, 2004. ,
DOI : 10.1109/CDC.2004.1430267
A power control game based on outage probabilities for multicell wireless data networks, IEEE Transactions on Wireless Communications, vol.5, issue.4, pp.890-899, 2006. ,
DOI : 10.1109/TWC.2006.1618938
Contraction of best response functions and uniqueness of nash-cournot equilibrium ,
Intrusion detection in sensor networks: a non-cooperative game approach, Proc. 3rd IEEE International Symposium on Network Computing and Applications, pp.343-346, 2004. ,
Slotted aloha as a stochastic game with partial information, Proc. 1st International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 03), 2003. ,
URL : https://hal.archives-ouvertes.fr/inria-00466286
Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications, vol.8, issue.5, pp.579-592, 2003. ,
DOI : 10.1023/A:1025146013151
Security and Cooperation in Wireless Networks, 2007. ,
DOI : 10.1017/CBO9780511815102
Optimal physical diversity algorithms and survivable networks, Proc. 2nd IEEE Symposium on Computers and Communications, pp.433-441, 1997. ,
Enhancing security via stochastic routing, Proc. 11th International Conference on Computer Communications and Networks (ICCCN 02), pp.58-62, 2002. ,
Performance analysis of the ieee 802 ,
Minimax Models for Diverse Routing, INFORMS Journal on Computing, vol.14, issue.1, pp.81-95, 2002. ,
DOI : 10.1287/ijoc.14.1.81.7707
Parallel and Distributed Compuation: Numerical Methods, Athena Scientific, 1997. ,
Wormhole-Based Antijamming Techniques in Sensor Networks, IEEE Transactions on Mobile Computing, vol.6, issue.1, pp.100-114, 2007. ,
DOI : 10.1109/TMC.2007.250674
On selfish behavior in CSMA/CA networks, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.2513-2524, 2005. ,
DOI : 10.1109/INFCOM.2005.1498536
A game theoretic framework of distributed power and rate control in ieee 802.11 wlans, Proc. 15th IEEE International Conference on Network Protocols (ICNP 07), pp.338-339, 2007. ,
On the power and rate control in ieee 802.11 wlans -a game theoretical approach, Proc. 16th International Conference on Computer Communications and Networks (ICCCN 07), pp.450-456, 2007. ,
Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks, Proc. ICDCS 2007, pp.16-23, 2007. ,
Toward secure and scalable time synchronization in ad hoc networks, Computer Communication, vol.30, pp.11-122453, 2007. ,
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs, IEEE Journal on Selected Areas in Communications, vol.26, issue.7, pp.1128-1137, 2008. ,
DOI : 10.1109/JSAC.2008.080910
Cooperative and non-cooperative control in ieee 802.11 wlans, Proc. 19th International Teletraffic Congress (ITC-19), 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00077211
Fine-grained network time synchronization using reference broadcasts, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.147-163, 2002. ,
DOI : 10.1145/844128.844143
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.7382
Game theory in wireless networks: A tutorial, 2006. ,
Nash equilibria of packet forwarding strategies in wireless ad hoc networks, IEEE Transactions on Mobile Computing, vol.5, issue.5, pp.463-476, 2006. ,
DOI : 10.1109/TMC.2006.68
Timing-sync protocol for sensor networks, Proceedings of the first international conference on Embedded networked sensor systems , SenSys '03, pp.138-149, 2003. ,
DOI : 10.1145/958491.958508
Secure time synchronization service for sensor networks, Proc. 4th ACM workshop on Wireless security (Wise 05), pp.97-106, 2005. ,
Distributed Joint Rate and Power Control Game-Theoretic Algorithms for Wireless Data, IEEE Communications Letters, vol.8, issue.8, pp.511-513, 2004. ,
DOI : 10.1109/LCOMM.2004.833817
Preliminary results in routing games, Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148), pp.1904-1909, 2001. ,
DOI : 10.1109/ACC.2001.946017
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.111
Cross-feature analysis for detecting ad-hoc routing anomalies, Proc. IEEE ICDCS 2003, pp.478-487, 2003. ,
Diversity through coded cooperation, IEEE Transactions on Wireless Communications, vol.5, issue.2, pp.283-289, 2006. ,
DOI : 10.1109/TWC.2006.1611050
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.419.2315
Ariadne:, Proceedings of the 8th annual international conference on Mobile computing and networking , MobiCom '02, pp.12-23, 2002. ,
DOI : 10.1145/570645.570648
Idle sense, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.121-132, 2005. ,
DOI : 10.1145/1090191.1080107
URL : https://hal.archives-ouvertes.fr/hal-01199108
A rate-adaptive MAC protocol for multi-Hop wireless networks, Proceedings of the 7th annual international conference on Mobile computing and networking , MobiCom '01, pp.236-251, 2001. ,
DOI : 10.1145/381677.381700
Fractal hash sequence representation and traversal, Proc. IEEE International Symposium on Information Theory, 2002. ,
Coded Cooperation in Wireless Communications: Space-Time Transmission and Iterative Decoding, IEEE Transactions on Signal Processing, vol.52, issue.2, pp.362-371, 2004. ,
DOI : 10.1109/TSP.2003.821100
Equilibria of a noncooperative game for heterogeneous users of an aloha network, IEEE Communications Letters, vol.6, issue.7, pp.282-284, 2002. ,
DARWIN, Proceedings of the 13th annual ACM international conference on Mobile computing and networking , MobiCom '07, 2007. ,
DOI : 10.1145/1287853.1287865
New insights from a fixed point analysis of single cell ieee 802.11 wlans, Proc. IEEE INFOCOM 2005, pp.1550-1561, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00070776
Detecting network intrusions via sampling: a game theoretic approach, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1880-1889, 2003. ,
DOI : 10.1109/INFCOM.2003.1209210
Synchronization attacks against 802.11, Workshop of the 12th Networks and Distributed Systems Symposium (NDSS 05), 2005. ,
Rate control for communication networks: shadow prices, proportional fairness and stability, Journal of the Operational Research Society, vol.49, issue.3, pp.237-252, 1998. ,
DOI : 10.1057/palgrave.jors.2600523
Misbehavior resilient multi-path data transmission in mobile ad-hoc networks, Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks , SASN '06, pp.91-100, 2006. ,
DOI : 10.1145/1180345.1180357
Detection and handling of MAC layer misbehavior in wireless networks, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., pp.173-182, 2003. ,
DOI : 10.1109/DSN.2003.1209928
Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection, International Journal of Security and Networks, vol.1, issue.3/4, 2006. ,
DOI : 10.1504/IJSN.2006.011784
Noncooperative Failure Recovery in Large-Scale Networks ,
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1307-1315, 2007. ,
DOI : 10.1109/INFCOM.2007.155
Spread: enhancing data confidentiality in mobile ad hoc networks, Proc. IEEE INFOCOM 2004, pp.2404-2413, 2004. ,
The three-node wireless network: Achievable rates and cooperation strategies, IEEE Transactions on Information Theory, vol.52, issue.3, pp.805-828, 2006. ,
Distributed algorithms for secure multipath routing, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1952-1963, 2005. ,
DOI : 10.1109/INFCOM.2005.1498473
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7869
On link layer denial of service in data wireless LANs, Wireless Communications and Mobile Computing, vol.47, issue.3, pp.273-284, 2005. ,
DOI : 10.1002/wcm.221
Adaptive intrusion detection: A data mining approach, Artificial Intelligence Review, vol.14, issue.6, pp.533-567, 2000. ,
DOI : 10.1023/A:1006624031083
Cooperative Diversity in Wireless Networks: Efficient Protocols and Outage Behavior, IEEE Transactions on Information Theory, vol.50, issue.12, pp.3062-3080, 2004. ,
DOI : 10.1109/TIT.2004.838089
Distributed space-time-coded protocols for exploiting cooperative diversity in wireless networks, IEEE Transactions on Information Theory, issue.10, pp.492415-2425, 2003. ,
Efficient,and scalable ieee 802.11 ad-hoc-mode timing synchronization function, Proc. 17th International Conference on Advanced Information Networking and Applications (AINA 03), pp.318-323, 2003. ,
Pricing the Internet Network intrusion and fault detection: a statistical anomaly approach, Public Access to the Internet, pp.4076-82, 1994. ,
Cooperation in wireless ad hoc networks: a market-based approach, IEEE/ACM Transactions on Networking, vol.13, issue.6, pp.1325-1338, 2005. ,
DOI : 10.1109/TNET.2005.860109
Analysis of an on-off jamming situation as a dynamic game, IEEE Transactions on Communications, vol.48, issue.8, pp.1360-1373, 2000. ,
DOI : 10.1109/26.864173
Fuzzy neural networks for classification and detection of anomalies, IEEE Transactions on Neural Networks, vol.9, issue.5, pp.848-861, 1998. ,
DOI : 10.1109/72.712157
Properties of Lossy Communication Nets, IEEE Transactions on Circuit Theory, vol.12, issue.3, pp.334-338, 1965. ,
DOI : 10.1109/TCT.1965.1082444
Stability of multipacket slotted Aloha with selfish users and perfect information, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1583-1590, 2003. ,
DOI : 10.1109/INFCOM.2003.1209181
Game Theory: Analysis of Conflict, 1991. ,
Cooperative communication in wireless networks, IEEE Communications Magazine, vol.42, issue.10, pp.74-80, 2004. ,
DOI : 10.1109/MCOM.2004.1341264
A Course in Game Theory, 1994. ,
Algorithms, games and the Internet, Proc. ACM Symposium on the Theory of Computing (STOC), 2001. ,
Secure data communication in mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.343-356, 2006. ,
DOI : 10.1109/JSAC.2005.861392
Path set selection in mobile ad hoc networks, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.1-11, 2002. ,
DOI : 10.1145/513800.513802
A game theoretic formulation for intrusion detection in mobile ad hoc networks, International Journal of Network Security, vol.2, issue.2, pp.146-152, 2006. ,
Spins: security protocols for sensor networks, Wireless Networks, vol.8, issue.5, pp.521-534, 2002. ,
MiSer, Proceedings of the 9th annual international conference on Mobile computing and networking , MobiCom '03, pp.161-175, 2003. ,
DOI : 10.1145/938985.939003
A Secure Architecture for Mobile Ad Hoc Networks ,
DOI : 10.1007/11943952_36
URL : https://hal.archives-ouvertes.fr/hal-00680891
Time Synchronization and Calibration in Wireless Sensor Networks, Handbook of Sensor Networks: Algorithms and Architectures, 2005. ,
DOI : 10.1002/047174414X.ch7
Network synchronization in wireless ad hoc networks, 2004. ,
Network Flows: Theory, Algorithms, and Applications, 1993. ,
Existence and uniqueness of equilibrium points for concave n-person games, Econometrica, vol.33, issue.3, pp.520-534, 1965. ,
Modeling Bounded Rationality, 1998. ,
The Resurrecting Duckling: security issues for ubiquitous computing, Computer, vol.35, issue.4, pp.22-26, 2002. ,
DOI : 10.1109/MC.2002.1012427
A clock synchronization algorithm for multi-hop wireless ad hoc networks, Proc. ICDCS 2004, pp.574-581, 2004. ,
A game-theoretic analysis of denial of service attacks in wireless random access, Proc. Wiopt, pp.1-10, 2007. ,
User cooperation diversity (parts I,II) ,
DOI : 10.1109/tcomm.2003.818096
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.7396
A survey of combinatorial maximum flow algorithms on a network with gains, Journal of the Operations Research Society of Japan, vol.47, issue.4, pp.244-264, 2004. ,
Efficient power control via pricing in wireless data networks, IEEE Transactions on Communications, vol.50, issue.2, pp.291-303, 2002. ,
Efficient power control via pricing in wireless data networks, IEEE Transactions on Communications, vol.50, issue.2, pp.291-303, 2002. ,
Cooperation in wireless ad hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.808-817 ,
DOI : 10.1109/INFCOM.2003.1208918
Secure and resilient clock synchronization in wireless sensor networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.395-408, 2006. ,
DOI : 10.1109/JSAC.2005.861396
A Statistical Framework for Intrusion Detection in Ad Hoc Networks, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, pp.1-13, 2006. ,
DOI : 10.1109/INFOCOM.2006.230
A distributed selfstabilizing time synchronization protocol for multi-hop wireless networks, 2004. ,
Attack-resilient time synchronization for wireless sensor networks, Proc. IEEE International Conference on Mobile Ad hoc and Sensor Systems Conference (MASS 2005), 2005. ,
DOI : 10.1016/j.adhoc.2006.05.016
The 802.11 MAC protocol leads to inefficient equilibria, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies. ,
DOI : 10.1109/INFCOM.2005.1497873
Equilibrium of Heterogeneous Congestion Control: Existence and Uniqueness, IEEE/ACM Transactions on Networking, vol.15, issue.4, pp.824-837, 2007. ,
DOI : 10.1109/TNET.2007.893885
Generalized Maximum Flow Algorithms ,
Can shortest-path routing and TCP maximize utility, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003. ,
DOI : 10.1109/INFCOM.2003.1209226
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.2005
A new scheme on link quality prediction and its applications to metric-based routing, Proceedings of the 3rd international conference on Embedded networked sensor systems , SenSys '05, pp.288-289, 2005. ,
DOI : 10.1145/1098918.1098958
JAM: a jammed-area mapping service for sensor networks, Proceedings. 2003 International Symposium on System-on-Chip (IEEE Cat. No.03EX748), pp.286-297, 2003. ,
DOI : 10.1109/REAL.2003.1253275
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.60-69 ,
DOI : 10.1109/SAHCN.2007.4292818
Two-Person Zero-Sum Games for Network Interdiction, Operations Research, vol.43, issue.2, pp.243-251, 1995. ,
DOI : 10.1287/opre.43.2.243
The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, pp.46-57, 2005. ,
DOI : 10.1145/1062689.1062697
Channel surfing and spatial retreats, Proceedings of the 2004 ACM workshop on Wireless security , WiSe '04, pp.80-89, 2004. ,
DOI : 10.1145/1023646.1023661
Pricing, Competition, and Routing for Selfish and Strategic Nodes in Multi-Hop Relay Networks, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.205
A framework for uplink power control in cellular radio systems, IEEE Journal on Selected Areas in Communications, vol.13, issue.7, pp.1341-1347, 1995. ,
Improving network security by multipath traffic dispersion, IEEE Military Communications Conference (MILCOM 01), pp.34-38, 2001. ,
Intrusion detection in wireless ad-hoc networks, Proceedings of the 6th annual international conference on Mobile computing and networking , MobiCom '00 ,
DOI : 10.1145/345910.345958
A compatible and scalable clock synchronization protocol in ieee 802.11 ad hoc networks, Proc. 34th International Conference on Parallel Processing (ICPP 05), pp.295-302, 2005. ,
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretic and cryptographic techniques, Wireless Networks, vol.13, issue.6, pp.799-816, 2007. ,
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretic and cryptographic techniques, Wireless Networks, vol.13, issue.6, pp.799-816, 2007. ,