These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
222 related articles for article (PubMed ID: 20031501)
1. Attack and flee: game-theory-based analysis on interactions among nodes in MANETs. Li F; Yang Y; Wu J IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):612-22. PubMed ID: 20031501 [TBL] [Abstract][Full Text] [Related]
2. Game-theoretic approach for improving cooperation in wireless multihop networks. Ng SK; Seah WK IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):559-74. PubMed ID: 20211801 [TBL] [Abstract][Full Text] [Related]
3. Evolutionary games in wireless networks. Tembine H; Altman E; El-Azouzi R; Hayel Y IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):634-46. PubMed ID: 19963703 [TBL] [Abstract][Full Text] [Related]
4. Cooperation stimulation strategies for peer-to-peer wireless live video-sharing social networks. Lin WS; Zhao HV; Liu KJ IEEE Trans Image Process; 2010 Jul; 19(7):1768-84. PubMed ID: 20227979 [TBL] [Abstract][Full Text] [Related]
5. Game-theoretic approach to joint transmitter adaptation and power control in wireless systems. Popescu DC; Rawat DB; Popescu O; Saquib M IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):675-82. PubMed ID: 19906589 [TBL] [Abstract][Full Text] [Related]
6. TCP throughput adaptation in WiMax networks using replicator dynamics. Anastasopoulos MP; Petraki DK; Kannan R; Vasilakos AV IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):647-55. PubMed ID: 20083460 [TBL] [Abstract][Full Text] [Related]
7. Characterizing contract-based multiagent resource allocation in networks. An B; Lesser V IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):575-86. PubMed ID: 19955040 [TBL] [Abstract][Full Text] [Related]
8. Enhancing network robustness against malicious attacks. Zeng A; Liu W Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Jun; 85(6 Pt 2):066130. PubMed ID: 23005185 [TBL] [Abstract][Full Text] [Related]
9. A game-theoretic response strategy for coordinator attack in wireless sensor networks. Liu J; Yue G; Shen S; Shang H; Li H ScientificWorldJournal; 2014; 2014():950618. PubMed ID: 25105171 [TBL] [Abstract][Full Text] [Related]
10. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network. Zhang G; Chen Z; Tian L; Zhang D PLoS One; 2015; 10(9):e0139326. PubMed ID: 26421843 [TBL] [Abstract][Full Text] [Related]
11. The environment value of an opponent model. Borghetti BJ IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):623-33. PubMed ID: 19887320 [TBL] [Abstract][Full Text] [Related]
12. Studying bio-inspired coalition formation of robots for detecting intrusions using game theory. Liang X; Xiao Y IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):683-93. PubMed ID: 19933008 [TBL] [Abstract][Full Text] [Related]
14. On cooperative and efficient overlay network evolution based on a group selection pattern. Wang Y; Nakao A IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):656-67. PubMed ID: 20199937 [TBL] [Abstract][Full Text] [Related]
15. Towards a snowdrift game optimization to vertex cover of networks. Yang Y; Li X IEEE Trans Cybern; 2013 Jun; 43(3):948-56. PubMed ID: 23096076 [TBL] [Abstract][Full Text] [Related]
16. CENTERA: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks. Tajeddine A; Kayssi A; Chehab A; Elhajj I; Itani W Sensors (Basel); 2015 Feb; 15(2):3299-333. PubMed ID: 25648712 [TBL] [Abstract][Full Text] [Related]
17. Maintaining defender's reputation in anomaly detection against insider attacks. Zhang N; Yu W; Fu X; Das SK IEEE Trans Syst Man Cybern B Cybern; 2010 Jun; 40(3):597-611. PubMed ID: 19933017 [TBL] [Abstract][Full Text] [Related]
18. On service differentiation in mobile Ad Hoc networks. Zhang SL; Ye CQ J Zhejiang Univ Sci; 2004 Sep; 5(9):1087-94. PubMed ID: 15323003 [TBL] [Abstract][Full Text] [Related]
19. Using Link Disconnection Entropy Disorder to Detect Fast Moving Nodes in MANETs. Alvarez CF; Palafox LE; Aguilar L; Sanchez MA; Martinez LG PLoS One; 2016; 11(5):e0155820. PubMed ID: 27219671 [TBL] [Abstract][Full Text] [Related]
20. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks. Paramasivan B; Kaliappan M ScientificWorldJournal; 2014; 2014():608984. PubMed ID: 25143986 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]