Deceptive routing in relay networks
From MaRDI portal
Publication:4909436
Recommendations
- Defensive deception against reactive jamming attacks in remote state estimation
- Securing jammed network using reliability behavior value through neuro-fuzzy analysis
- scientific article; zbMATH DE number 5639847
- Competitive throughput in multi-hop wireless networks despite adaptive jamming
- A jamming-resistant MAC protocol for multi-hop wireless networks
Cited in
(5)- Securing jammed network using reliability behavior value through neuro-fuzzy analysis
- On the Optimality of Linear Signaling to Deceive Kalman Filters over Finite/Infinite Horizons
- Deceptive Reinforcement Learning Under Adversarial Manipulations on Cost Signals
- Dynamic games in cyber-physical security: an overview
- A game-theoretic analysis of deception over social networks using fake avatars
This page was built for publication: Deceptive routing in relay networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909436)