[1]
|
R. Ramanathan and J. Redi, “A Brief Overview of Ad Hoc Networks: Challenges and directions,” IEEE Communications Magzine, Vol. 40, No. 5, 2002, pp. 20-22.
|
[2]
|
Y. G. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Net- working, Boston, 2000, pp. 275-283.
|
[3]
|
Y. B. Reddy, “A Game Theory Approach to Detection Mmalicious Nodes in Wireless Sensor Networks,” Proceedings of the 2009 Third International Conference on Sensor Technologies and Applications, June 18-23, 2009, pp. 462-468.
|
[4]
|
H. Otrok, N. Mohammed, L. Y. Wang, M. Debbabi and P. Bhattacharya, “A Game-Theoretical Intrusion Detection Model for Mobile Ad Hoc Networks,” Computer Communications, Vol. 31, No. 4, 2008, pp. 708-721.
|
[5]
|
Y. Liu, C. Comaniciu and H. Man, “A Bayesian Game Approach for Intrusion Detetion in Wireless Ad Hoc Networks,” Proceedings from the 2006 Workshop on Game Theory for Communications and Networks, Pisa, Italy, October 14, 2006, pp. 1-12.
|
[6]
|
Y. Liu, H. Man and C. Comaniciu, “A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection,” IEEE International Conference on Communications, Istanbul, 2006, pp. 2201-2206.
|
[7]
|
A. Agah, S. K. Das, K. Basu and M. Asadi, “Intrusion Detection in Sensor Networks: A Non-Cooperative Game Approach,” Proceedings of the Third IEEE International Symposium on Network Computing and Applications, Boston, August-September 2004, pp. 343-346.
|
[8]
|
T. Alpcan and T. Basar, “A Game Theoretic Approach to Decision and Analysis in Network Intrusion Detection,” Proceedings of the 42nd IEEE Conference on Decision and Control, Maui, Hawaii, December 2003, pp. 2595- 2600.
|
[9]
|
N. Marchang and R. Tripathi, “A Game Theoretical Approach for Efficient Deployment of Intrusion Detection System in Mobile Ad Hoc Networks,” Proceedings of the 15th International Conference on Advanced Computing and Communications, Guwahati, 2007, pp. 460-464.
|
[10]
|
T. Poongothai and K. Jayara, “A Noncooperative Game Approach for Intrusion Detection in Mobile Ad Hoc Networks,” Proceedings of the 2008 International Conference on Computing Communication and Networking, St. Thomas, VI, December 18-20, 2008, pp. 1-4.
|
[11]
|
A. Patcha and J.-M. Park, “A Game Theoretic Approach to Modeling Intrusion Detection in Mobile Ad Hoc Networks,” Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, June 10-11, 2004, pp. 30-34.
|
[12]
|
M. Willem, “Minimax Theorem,” Birkhauser, Boston, 1996.
|