Intrusion Detection Systems in Wireless Sensor Networks: A Review, International Journal of Distributed Sensor Networks, vol.4, issue.2, p.2013, 2013. ,
DOI : 10.1109/WCICA.2006.1712371
A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks, 2009 Third International Conference on Sensor Technologies and Applications, pp.462-468, 2009. ,
DOI : 10.1109/SENSORCOMM.2009.76
Sensomax: An agent-based middleware for decentralized dynamic data-gathering in wireless sensor networks, 2013 International Conference on Collaboration Technologies and Systems (CTS), pp.107-114, 2013. ,
DOI : 10.1109/CTS.2013.6567214
Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks, Lecture Notes in Computer Science, vol.7886, pp.34-49, 2013. ,
DOI : 10.1007/978-3-642-38530-8_3
URL : https://hal.archives-ouvertes.fr/hal-01485932
Wireless sensor network security: A survey, in book chapter of security, Distributed, Grid, and Pervasive Computing, pp.0-849, 2007. ,
Protecting Against Network Infections: A Game Theoretic Perspective, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.1485-1493, 2009. ,
DOI : 10.1109/INFCOM.2009.5062065
Game theoretic approach for costbenefit analysis of malware proliferation prevention, Security and Privacy Protection in Information Processing Systems, pp.28-41, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01463844
Game theory for security: A real-world challenge problem for multiagent systems and beyond, AAAI Spring Symposium: Game Theory for Security, Sustainability , and Health, 2012. ,
DOI : 10.1017/CBO9780511973031
A Survey of Game Theory as Applied to Network Security, 2010 43rd Hawaii International Conference on System Sciences, pp.1-10, 2010. ,
DOI : 10.1109/HICSS.2010.35
A game theoretic defence framework against DoS/DDoS cyber attacks, Computers & Security, vol.38, pp.39-50, 2013. ,
DOI : 10.1016/j.cose.2013.03.014
On modeling and simulation of game theorybased defense mechanisms against dos and ddos attacks, Proceedings of the 2010 spring simulation multiconference, p.159, 2010. ,
A game-theoretic approach to security and power conservation in wireless sensor networks, IJ Network Security, vol.15, issue.1, pp.50-58, 2013. ,
Survey of network traffic models. Waschington University in St, Louis CSE, vol.567, 2009. ,
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS), pp.129-136, 2011. ,
DOI : 10.1109/CICYBS.2011.5949407
An Agent-Based Multi-Model Tool for Simulating Multiple Concurrent Applications in WSNs, 5th International Conference on Communication Software and Networks. (2013) 16. ¨ Osterlind, F.: A sensor network simulator for the contiki os, 2006. ,
DOI : 10.7763/JACN.2013.V1.54
Transmission of ipv6 packets over ieee 802.15, 2007. ,
Rpl: Ipv6 routing protocol for low-power and lossy networks, 2012. ,
DOI : 10.17487/rfc6550