Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game
DOI10.1051/RO/2015047zbMATH Open1338.90092OpenAlexW2305592548MaRDI QIDQ2805485FDOQ2805485
Authors: Karima Adel-Aissanou, Sara Berri, Myria Bouhaddi, Mohammed Said Radjef
Publication date: 11 May 2016
Published in: RAIRO. Operations Research (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1051/ro/2015047
Recommendations
- A security and energy saving routing protocol of ad hoc network design
- scientific article; zbMATH DE number 2088546
- A combinational perspective in stimulating cooperation in mobile ad hoc networks
- A game-theoretic approach to compute stable topologies in mobile ad hoc networks
- A survey of game-theoretic approaches in wireless sensor networks
Applications of game theory (91A80) Clustering in the social and behavioral sciences (91C20) Noncooperative games (91A10) Communication networks in operations research (90B18) Evolutionary games (91A22)
Cites Work
This page was built for publication: Security modeling of an \textit{Ad hoc} network under the constraint of energy by an approach in two steps: clustering-evolutionary game
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2805485)