Primary user emulation attack game in cognitive radio networks: queuing aware dogfight in spectrum
From MaRDI portal
Publication:2840934
Signal theory (characterization, reconstruction, filtering, etc.) (94A12) Queues and service in operations research (90B22) Applications of game theory (91A80) Performance evaluation, queueing, and scheduling in the context of computer systems (68M20) Communication networks in operations research (90B18) Stochastic games, stochastic differential games (91A15)
Recommendations
Cites work
- scientific article; zbMATH DE number 1134975 (Why is no real title available?)
- Algorithmic Game Theory
- Cognitive radio for flexible mobile multimedia communications
- Control of spatially structured random processes and random fields with applications.
- Distributed Fair Resource Allocation in Cellular Networks in the Presence of Heterogeneous Delays
- Learning Theory
- On the existence of equilibria in noncooperative optimal flow control
- Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks
- Stochastic Games
- Stochastic network optimization with application to communication and queueing systems
- S-modular games, with queueing applications
Cited in
(3)- A game-theory approach against Byzantine attack in cooperative spectrum sensing
- Cooperation schemes between the primary transmitter and untrusted secondary transmitters in cognitive radio networks using game theory
- On Identifying Primary User Emulation Attacks in Cognitive Radio Systems Using Nonparametric Bayesian Classification
This page was built for publication: Primary user emulation attack game in cognitive radio networks: queuing aware dogfight in spectrum
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2840934)