V. Gupta, S. V. Krishnamurthy, and M. Faloutsos, Denial of service attacks at the MAC layer in wireless ad hoc networks, MILCOM 2002. Proceedings, 2002.
DOI : 10.1109/MILCOM.2002.1179634

P. Kyasanur and N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., 2003.
DOI : 10.1109/DSN.2003.1209928

E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman et al., On the Performance of IEEE 802.11 under Jamming, Proc. IEEE INFOCOM, 2008.

M. Li, I. Koutsopoulos, and R. Poovendran, Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, 2007.
DOI : 10.1109/INFCOM.2007.155

X. Xu, W. Trappe, Y. Zhang, and T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, 2005.
DOI : 10.1145/1062689.1062697

J. Zander, Jamming in slotted ALOHA multihop packet radio networks, IEEE Transactions on Communications, vol.39, issue.10, pp.1525-1531, 1991.
DOI : 10.1109/26.103048

G. Theodorakopoulos and J. S. Baras, Game Theoretic Modeling of Malicious Users in Collaborative Networks, IEEE Journal on Selected Areas in Communications, vol.26, issue.7, pp.1317-1327, 2008.
DOI : 10.1109/JSAC.2008.080928

L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks, 2007.
DOI : 10.1017/CBO9780511815102

A. Kashyap, T. Basar, and R. Srikant, Correlated Jamming on MIMO Gaussian Fading Channels, IEEE Transactions on Information Theory, vol.50, issue.9, pp.2119-2123, 2004.
DOI : 10.1109/TIT.2004.833358

E. Altman, K. Avratchenkov, and A. Garnaev, A Jamming Game in Wireless Networks with Transmission Cost, Lecture Notes in Computer Science, vol.4465, pp.1-12, 2007.
DOI : 10.1007/978-3-540-72709-5_1

Y. E. Sagduyu and A. Ephremides, A game-theoretic analysis of denial of service attacks in wireless random access, Wireless Networks, vol.53, issue.10, pp.651-666, 2009.
DOI : 10.1007/s11276-007-0088-8

R. K. Mallik, R. A. Scholtz, and G. P. Papavassilopoulos, Analysis of an on-off jamming situation as a dynamic game, IEEE Transactions on Communications, vol.48, issue.8, pp.1360-1373, 2000.
DOI : 10.1109/26.864173

B. Awerbuch, A. W. Richa, and C. Scheideler, A jamming-resistant MAC protocol for single-hop wireless networks, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, 2008.
DOI : 10.1145/1400751.1400759

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.6406

M. Medard, Capacity of Correlated Jamming Channels, Proc. Allerton Conference on Communication, Control and Computing, 1997.

S. Shafiee and S. Ulukus, Capacity of Multiple Access Channels with Correlated Jamming, MILCOM 2005, 2005 IEEE Military Communications Conference, pp.4598-4607, 2009.
DOI : 10.1109/MILCOM.2005.1605689

Y. E. Sagduyu and A. Ephremides, SINR-based MAC Games for Selfish and Malicious Users, Proc. Information Theory and Applications Workshop, 2007.

E. Altman, K. Avratchenkov, and A. Garnaev, Jamming in Wireless Networks under Uncertainty, Proc. International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), 2009.

K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, Gamming the Jammer: Is Frequency Hopping Effective, Proc. Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), 2009.

T. Alpcan and T. Basar, A game theoretic analysis of intrusion detection in access control systems, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), 2004.
DOI : 10.1109/CDC.2004.1430267

M. Zorzi and R. Rao, Capture and retransmission control in mobile radio, IEEE Journal on Selected Areas in Communications, vol.12, issue.8, pp.1289-1298, 1994.
DOI : 10.1109/49.329345

G. Nguyen, A. Ephremides, and J. Wieselthier, On Capture in Random-Access Systems, 2006 IEEE International Symposium on Information Theory, 2006.
DOI : 10.1109/ISIT.2006.261915

Y. E. Sagduyu, R. Berry, and A. Ephremides, Jamming games for power controlled medium access with dynamic traffic, 2010 IEEE International Symposium on Information Theory, 2010.
DOI : 10.1109/ISIT.2010.5513413