Deceptive routing in relay networks
From MaRDI portal
Publication:4909436
DOI10.1007/978-3-642-34266-0_10zbMATH Open1377.68018OpenAlexW28012414MaRDI QIDQ4909436FDOQ4909436
Authors:
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34266-0_10
Recommendations
- Defensive deception against reactive jamming attacks in remote state estimation
- Securing jammed network using reliability behavior value through neuro-fuzzy analysis
- scientific article; zbMATH DE number 5639847
- Competitive throughput in multi-hop wireless networks despite adaptive jamming
- A jamming-resistant MAC protocol for multi-hop wireless networks
Applications of game theory (91A80) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cited In (5)
- On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons
- Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals
- Dynamic games in cyber-physical security: an overview
- A game-theoretic analysis of deception over social networks using fake avatars
- Securing jammed network using reliability behavior value through neuro-fuzzy analysis
This page was built for publication: Deceptive routing in relay networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909436)