2012 IEEE Global Communications Conference (GLOBECOM) 2012
DOI: 10.1109/glocom.2012.6503252
|View full text |Cite
|
Sign up to set email alerts
|

Dependence of optimal monitoring strategy on the application to be protected

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 37 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…In particular, we note that Bayesian methods have been widely employed in dealing with different problems in networks, for example, intrusion detection [17], [20], [15], scanning bandwidth [10] and in transmission under incomplete information [21], [22], [23], [24], [25]. In this subsection, we consider a Bayesian model for the transmission scenario, where the PU does not specifically know the SU's nature, but instead has a probabilistic description of the SU's nature (e.g.…”
Section: A Bayesian Model Of Transmissionmentioning
confidence: 99%
See 1 more Smart Citation
“…In particular, we note that Bayesian methods have been widely employed in dealing with different problems in networks, for example, intrusion detection [17], [20], [15], scanning bandwidth [10] and in transmission under incomplete information [21], [22], [23], [24], [25]. In this subsection, we consider a Bayesian model for the transmission scenario, where the PU does not specifically know the SU's nature, but instead has a probabilistic description of the SU's nature (e.g.…”
Section: A Bayesian Model Of Transmissionmentioning
confidence: 99%
“…As another example, in [5], the authors proposed a method to detect anomalous transmissions by making use of radio propagation characteristics. In [10], the authors investigated the impact on spectrum scanning when there is information about the over-arching application that a spectrum thief might try to run, while in [11] a stationary bandwidth scanning strategy in a discounted repeated game was explored.…”
mentioning
confidence: 99%
“…We here consider two sub-scenarios: (a) the Invader's type is known: namely, it is known how the reward for the Invader is related to the width of the frequency band he uses if he is undetected, (b) the Invader's type is unknown: instead, there is only a chance that the Invader reward is related to the width in use, else it is not related. Different type of rewards can be motivated by using different type of application (say, file-download or streaming video [10]). …”
Section: B Formulation Of the Problem In The Second Step Of The Gamementioning
confidence: 99%
“…As another example, in [14], the authors proposed a method to detect anomalous transmission by making use of radio propagation characteristics. In [10] authors investigated what impact on spectrum scanning can have information about the over-arching application that a spectrum thief might try to run.…”
Section: Introductionmentioning
confidence: 99%
“…A survey paper [6] on security games describes the research challenges for applying game theoretic methods in security systems. Among such research, for example, Sagduyu et al [7] suggested a jamming game for power-controlled medium access with dynamic traffic, a game-theoretic approach for eavesdropping and jamming in next-generation wireless networks was suggested in [8], malicious users in collaborative networks are modeled in [9], challenges in applying game theory to the domain of information warfare are discussed in [10], static and dynamic games for infrastructure security are suggested in [11], stochastic games for security in networks with interdependent nodes were investigated in [12], and bandwidth scanning strategies to detect illegal intrusion in a network are described in [13] and [14]. Also, game theory has been applied to fight jamming with jamming [15], for resource allocation in wireless networks between users [16] and channels [17] in the presence of a jammer, to ad hoc networks [18] and for node protection [19].…”
mentioning
confidence: 99%