Denial of service attacks at the MAC layer in wireless ad hoc networks, MILCOM 2002. Proceedings, 2002. ,
DOI : 10.1109/MILCOM.2002.1179634
Detection and handling of MAC layer misbehavior in wireless networks, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings., 2003. ,
DOI : 10.1109/DSN.2003.1209928
On the Performance of IEEE 802.11 under Jamming, Proc. IEEE INFOCOM, 2008. ,
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, 2007. ,
DOI : 10.1109/INFCOM.2007.155
The feasibility of launching and detecting jamming attacks in wireless networks, Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing , MobiHoc '05, 2005. ,
DOI : 10.1145/1062689.1062697
Jamming in slotted ALOHA multihop packet radio networks, IEEE Transactions on Communications, vol.39, issue.10, pp.1525-1531, 1991. ,
DOI : 10.1109/26.103048
Game Theoretic Modeling of Malicious Users in Collaborative Networks, IEEE Journal on Selected Areas in Communications, vol.26, issue.7, pp.1317-1327, 2008. ,
DOI : 10.1109/JSAC.2008.080928
Security and Cooperation in Wireless Networks, 2007. ,
DOI : 10.1017/CBO9780511815102
Correlated Jamming on MIMO Gaussian Fading Channels, IEEE Transactions on Information Theory, vol.50, issue.9, pp.2119-2123, 2004. ,
DOI : 10.1109/TIT.2004.833358
A Jamming Game in Wireless Networks with Transmission Cost, Lecture Notes in Computer Science, vol.4465, pp.1-12, 2007. ,
DOI : 10.1007/978-3-540-72709-5_1
A game-theoretic analysis of denial of service attacks in wireless random access, Wireless Networks, vol.53, issue.10, pp.651-666, 2009. ,
DOI : 10.1007/s11276-007-0088-8
Analysis of an on-off jamming situation as a dynamic game, IEEE Transactions on Communications, vol.48, issue.8, pp.1360-1373, 2000. ,
DOI : 10.1109/26.864173
A jamming-resistant MAC protocol for single-hop wireless networks, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing, PODC '08, 2008. ,
DOI : 10.1145/1400751.1400759
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.6406
Capacity of Correlated Jamming Channels, Proc. Allerton Conference on Communication, Control and Computing, 1997. ,
Capacity of Multiple Access Channels with Correlated Jamming, MILCOM 2005, 2005 IEEE Military Communications Conference, pp.4598-4607, 2009. ,
DOI : 10.1109/MILCOM.2005.1605689
SINR-based MAC Games for Selfish and Malicious Users, Proc. Information Theory and Applications Workshop, 2007. ,
Jamming in Wireless Networks under Uncertainty, Proc. International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), 2009. ,
Gamming the Jammer: Is Frequency Hopping Effective, Proc. Intl. Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WIOPT), 2009. ,
A game theoretic analysis of intrusion detection in access control systems, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601), 2004. ,
DOI : 10.1109/CDC.2004.1430267
Capture and retransmission control in mobile radio, IEEE Journal on Selected Areas in Communications, vol.12, issue.8, pp.1289-1298, 1994. ,
DOI : 10.1109/49.329345
On Capture in Random-Access Systems, 2006 IEEE International Symposium on Information Theory, 2006. ,
DOI : 10.1109/ISIT.2006.261915
Jamming games for power controlled medium access with dynamic traffic, 2010 IEEE International Symposium on Information Theory, 2010. ,
DOI : 10.1109/ISIT.2010.5513413