Designing virus-resistant networks: A game-formation approach, 2015 54th IEEE Conference on Decision and Control (CDC), pp.294-299, 2015. ,
DOI : 10.1109/CDC.2015.7402216
URL : https://hal.archives-ouvertes.fr/hal-01204628
A Network Formation Game Approach to Study BitTorrent Tit-for-Tat, NetgCoop, 2007. ,
DOI : 10.1007/978-3-540-72709-5_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4484
The price of selfish behavior in bilateral network formation, Proceedings of the twenty-fourth annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing , PODC '05, pp.99-107, 2005. ,
DOI : 10.1145/1073814.1073833
Characterizing selfishly constructed overlay routing networks, IEEE INFOCOM, pp.1329-1339, 2004. ,
Multihoming of Users to Access Points in WLANs: A Population Game Perspective, IEEE Journal on Selected Areas in Communications, vol.25, issue.6, pp.1207-1215, 2007. ,
DOI : 10.1109/JSAC.2007.070814
Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems, 2014 12th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), pp.247-254, 2014. ,
DOI : 10.1109/WIOPT.2014.6850306
Game Theory for Wireless Engineers, ser. Synth. lect. on communications, 2006. ,
Enabling crowdsourced mobile internet access, INFOCOM, pp.451-459, 2014. ,
DOI : 10.1109/infocom.2014.6847968
Modeling Resource Sharing Dynamics of VoIP Users over a WLAN Using a Game-Theoretic Approach, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, pp.1588-1596, 2008. ,
DOI : 10.1109/INFOCOM.2008.144
How to Optimally allocate your budget of attention in social networks, 2013 Proceedings IEEE INFOCOM, pp.2373-2381, 2013. ,
DOI : 10.1109/INFCOM.2013.6567042
URL : https://hal.archives-ouvertes.fr/hal-00839599
Who are your friends? -a simple mechanism that achieves perfect network formation, INFOCOM. IEEE, pp.566-570, 2011. ,
DOI : 10.1109/infcom.2011.5935227
On a network creation game, Proceedings of the twenty-second annual symposium on Principles of distributed computing , PODC '03, pp.347-351, 2003. ,
DOI : 10.1145/872035.872088
Endogenous Formation of Links Between Players and of Coalitions: an Application of the Shapley Value Virus spread in networks, IEEE/ACM Trans. on Netw, vol.17, issue.1, pp.1-14, 1988. ,
Epidemic thresholds in real networks, ACM Transactions on Information and System Security, vol.10, issue.4, pp.1-1, 2008. ,
DOI : 10.1145/1284680.1284681
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.6702
The effect of network topology on the spread of epidemics, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.1455-1466, 2005. ,
DOI : 10.1109/INFCOM.2005.1498374
The N-intertwined SIS epidemic network model, Computing, vol.283, issue.4, pp.147-169, 2011. ,
DOI : 10.1016/j.jtbi.2011.05.029
Accuracy criterion for the mean-field approximation in susceptible-infected-susceptible epidemics on networks, Physical Review E, vol.91, issue.3, p.32812, 2015. ,
DOI : 10.1016/j.jocs.2011.03.001
On nash equilibria for a network creation game, SODA, pp.89-98, 2006. ,
DOI : 10.1145/2560767
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.3136
Graph Spectra of Complex Networks, 2011. ,
DOI : 10.1017/CBO9780511921681
On the eigenvalues of trees, Periodica Mathematica Hungarica, vol.175, issue.1-2, pp.175-182, 1973. ,
DOI : 10.1111/j.1749-6632.1970.tb56460.x
Diameter increase caused by edge deletion, Journal of Graph Theory, vol.11, issue.3, pp.409-427, 1987. ,
DOI : 10.1090/psapm/034/846852
Epidemic processes in complex networks, Reviews of Modern Physics, vol.5550, issue.3, pp.925-979, 2015. ,
DOI : 10.1016/j.physleta.2007.01.094
URL : http://arxiv.org/abs/1408.2701
On the topologies formed by selfish peers, Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing , PODC '06, pp.133-142, 2006. ,
DOI : 10.1145/1146381.1146403
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.2094
Algorithmic Game Theory, 2007. ,
DOI : 10.1017/CBO9780511800481
Topology Design and Control: A Game-Theoretic Perspective, IEEE INFOCOM 2009, The 28th Conference on Computer Communications, pp.1620-1628, 2009. ,
DOI : 10.1109/INFCOM.2009.5062080
Network formation games with heterogeneous players and the internet structure, Proceedings of the fifteenth ACM conference on Economics and computation, EC '14, pp.735-752, 2014. ,
DOI : 10.1145/2600057.2602862
URL : http://arxiv.org/abs/1307.4102
A Nash Bargaining Solution for Cooperative Network Formation Games, IFIP Networking, ser, pp.307-318, 2011. ,
DOI : 10.1007/978-3-642-20757-0_24
URL : https://hal.archives-ouvertes.fr/inria-00544527
Coalitional Games for Transmitter Cooperation in MIMO Multiple Access Channels, IEEE Transactions on Signal Processing, vol.62, issue.4, pp.757-771, 2014. ,
DOI : 10.1109/TSP.2013.2290496
URL : http://arxiv.org/abs/1206.3350
Worst-case equilibria, Computer Science Review, vol.3, issue.2, pp.65-69, 2009. ,
DOI : 10.1016/j.cosrev.2009.04.003
Protecting against network infections: A game theoretic perspective, IEEE INFOCOM, pp.1485-1493, 2009. ,
Inoculation strategies for victims of viruses and the sum-of-squares partition problem, Journal of Computer and System Sciences, vol.72, issue.6, pp.1077-1093, 2006. ,
DOI : 10.1016/j.jcss.2006.02.003
Network security and contagion, MIT/LIDS intern report, 2013. ,
Network externalities and the deployment of security features and protocols in the internet, SIGMETRICS. ACM, pp.37-48, 2008. ,
Decentralized Protection Strategies Against SIS Epidemics in Networks, IEEE Transactions on Control of Network Systems, vol.2, issue.4, pp.406-419, 2015. ,
DOI : 10.1109/TCNS.2015.2426755
URL : https://hal.archives-ouvertes.fr/hal-01152459
Complete game-theoretic characterization of SIS epidemics protection strategies, 53rd IEEE Conference on Decision and Control, pp.1179-1184, 2014. ,
DOI : 10.1109/CDC.2014.7039541
URL : https://hal.archives-ouvertes.fr/hal-01054710