Voir la notice de l'article provenant de la source Math-Net.Ru
@article{CGTM_2020_13_a23, author = {Xue Juan and Elena M. Parilina}, title = {Stochastic data transmission model with uncertainty on dropper's appearance}, journal = {Contributions to game theory and management}, pages = {427--440}, publisher = {mathdoc}, volume = {13}, year = {2020}, language = {en}, url = {http://geodesic.mathdoc.fr/item/CGTM_2020_13_a23/} }
TY - JOUR AU - Xue Juan AU - Elena M. Parilina TI - Stochastic data transmission model with uncertainty on dropper's appearance JO - Contributions to game theory and management PY - 2020 SP - 427 EP - 440 VL - 13 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/CGTM_2020_13_a23/ LA - en ID - CGTM_2020_13_a23 ER -
Xue Juan; Elena M. Parilina. Stochastic data transmission model with uncertainty on dropper's appearance. Contributions to game theory and management, Tome 13 (2020), pp. 427-440. http://geodesic.mathdoc.fr/item/CGTM_2020_13_a23/
[1] Altman E., Avrachenkov K., Garnaev A., “Fair resource allocation in wireless networks in the presence of a jammer”, Performance Evaluation, 67:4 (2010), 338–349 | DOI
[2] Altman E., Avrachenkov K., Garnaev A., “Jamming in wireless networks under uncertainty”, Mobile Networks and Applications, 16:2 (2011), 246–254 | DOI
[3] Charilas D. E., Panagopoulos A. D., “A survey on game theory applications in wireless networks”, Computer Networks, 54:18 (2010), 3421–3430 | DOI | Zbl
[4] Csiszar I., Korner J., “Broadcast channels with confidential messages”, IEEE Transactions on Information Theory, 24:3 (1978), 339–348 | DOI | MR | Zbl
[5] Garnaev A., Hayel Y., Altman E., Avrachenkov K., “Jamming game in a dynamic slotted ALOHA network”, Game Theory for Networks, 75, eds. Jain R., Kannan R., Springer, 2012, 429–443 | DOI
[6] Garnaev A., Trappe W., “Bargaining over the fair trade-off between secrecy and throughput in OFDM communications”, IEEE Transactions on Information Forensics and Security, 12:1 (2016), 242–251 | MR
[7] Garnaev A., Trappe W., Petropulu A., “Equilibrium strategies for an OFDM network that might be under a jamming attack”, 2017 51st Annual Conference on Information Sciences and Systems, CISS, IEEE, 2017, 1–6
[8] Mukherjee A., Fakoorian S. A. A., Huang J., “Principles of physical layer security in multiuser wireless networks: A survey”, IEEE Communications Surveys and Tutorials, 16:3 (2014), 1550–1573 | DOI | MR
[9] Parilina E. M., “Stable cooperation in stochastic games”, Automation and remote control, 76:6 (2015), 1111–1122 | DOI | MR
[10] Parilina E. M., Tampieri A., “Stability and cooperative solution in stochastic games”, Theory and Decision, 84:4 (2018), 601–625 | DOI | MR | Zbl
[11] Shannon C. E., “A mathematical theory of communication”, The Bell System Technical Journal, 27:3 (1948), 379–423 | DOI | MR | Zbl
[12] Slimeni F., Scheers B., Le Nir V., “Closed form expression of the saddle point in cognitive radio and jammer power allocation game”, International Conference on Cognitive Radio Oriented Wireless Networks, Springer, 2016, 29–40 | DOI
[13] Vadlamania S., Eksioglub B., Medala H., Nandia A., “Jamming attacks on wireless networks: A taxonomic survey”, International Journal of Production Economics, 172 (2016), 76–94 | DOI
[14] Wu Y., Wang B., Liu K. J. R., Clancy T. C., “Anti-jamming games in multi-channel cognitive radio networks”, IEEE Journal on Selected Areas in Communications, 30:1 (2012), 4–15 | DOI