[1]
Y. Liu, C. Cristina, and M. Hong, A Bayesian Game Approach for Intrusion Detection in Wireless Ad Hoc Networks ACM, October 2006..
[2]
B.R. Yenumula, and S. Srivathsan, "Game Theory Model for Selective Forward Attacks in Wireless Sensor Networks In the Proceedings of IEEE 17th Mediterranean Conference on Control and Automation, 2009,",
[3]
B. Yenumula, "A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks In the Proceedings of IEEE Third International Conference on Sensor Technologies and Applications, 2009, pp. 462-468",
[4]
M. Mohi, M. Ali, and M. Pooya, "A Bayesian Game Approach for Preventing DoS Attacks in Wireless Sensor Networks , In the
Proceedings of IEEE WRI International Conference on Communications
and Mobile Computing, 2009",
[5]
Y. Qiu, C. Zhide, and X. Li, "Active Defense Model of Wireless Sensor Networks Based on Evolutionary Game Theory In the
Proceedings of IEEE WRI 6th International Conference on Wireless
Communications Networking and Mobile Computing, 2010",
[6]
S.F. Mehran, "A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory , In the Proceedings of IEEE Transactions
on Dependable and Secure Computing, vol.7, no. 1, pp.
1545-5971, 2007",
[7]
"Tansu and Sonja, "Security Games for Vehicular Networks", In the
Proceedings of IEEE Transactions on Mobile Computing, vol.10,
no. 1, pp. 1536-1233, 2010",
[8]
S. Zeadally, H. Ray, and C. Yuh-Shyan, Vehicular ad hoc networks (VANETS): status results and challenges.Springer Science+
Business Media, LLC, 2011..
[9]
D. Manuel, Serrat-Olmos, and H. Enrique, "Calafate and Pietro
Manzoni "Accurate Detection of Black Holes in MANETs using
Collaborative Bayesian Watchdogs,"", In the Proceedings of IEEE
on Wireless Days, 2012.,
[10]
H-Y. Shi, and W-L. Wang, N-M Kwok, and Sheng, “Game Theory
for Wireless Sensor Networks: A Survey.,In the Proceedings of
Sensors, 2012, pp. 9055-9097.,
[11]
L. Shalini, Vijay, and M. Nema, "" Analysis of Attacks and Challenges
in VANET"", In the proceedings of International Journal of
Emerging Technology and Advanced Engineering, vol. 4, no. 7,
2014.,
[12]
H. Vin, and C. Ana, Security attacks and Solutions in Vehicular
Ad-hoc Networks: A Survey"", In the proceeding of IJANS, vol.
Vol. 4, no. 2, 2014.,
[13]
B. Subba, S. Biswas, and S. Karmakar, Intrusion Detection in Mobile Ad- hoc Networks:Bayesian game formulation In the Proceedings
of International Journal of Engineering Science and
Technology.. Elsevier, 2015, pp. 782-799..
[14]
S. Basant, B. Santosh, and K. Sushanta, “Enhancing secure routing in Mobile Ad Hoc Networks using a Dynamic Bayesian Signalling Game model,”In the Proceedings of International Journal of Computers and Electrical Engineering., vol. 41. Elsevier, 2015, pp. 301-313.
[15]
B. Mokhtar, and M. Azab, “Survey on Security Issues in Vehicular Ad Hod Networks”,In the Proceedings of Alexandria Engineering Journal., vol. 54. Elsevier, 2015, pp. 1115-1126.
[16]
U. Parmar, S. Sharanjit, and N. Guru, ""Overview of Various Attacks
in VANET,"", In the Proceedings of International Journal of
Engineering Research and General Science,vol.3, 2015, pp. 2091-
2730..
[17]
A. Ahmed, A. Alabdel, and H. Mohammad, "Evolutionary Game Theoretic Analysis of Distributed Denial of Service Attacks in a Wireless Network , In the Proceedings of IEEE on Information Science
and Systems, 2016",
[18]
"Y. Taheri H. G. Garakani And N. M. Zadeh, "“ A Game Theory Approach for Malicious Node Detection in MANETs In the Proceedings of JISE, vol.32, 2016, pp. 559-573",
[19]
M.S. Abdalzaher, K. Seddik, M. Elsabrouty, O. Muta, and H. Furukawa, Abdel-Rahman, “A. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey., In the Proceedings of Sensors vol.16, 2016, p. 1003.
[21]
F. Li, Y. Yang, and J. Wu, "Attack and Flee: Game-Theory-Based Analysis on Interactions Among Nodes in MANETs", Proceedings of IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), vol. 40, pp. 612-622, 2009.
[22]
F. Li, and J. Wu, "Hit and run: A Bayesian game between malicious and regular nodes in mobile networks", In the Proceedings of
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics),
vol.40, 2008, pp. 612-622
[23]
A. Patcha, and J-M Park, A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks In the Proceedings of
International Journal of Network Security, vol.2, no.2, pp. 131-
137, 2006..
[24]
X. Wu, and K.Y. David, "Mitigating Denial-of-Service Attacks in MANET by Incentive-based Packet Filtering: A Game-theoretic Approach", In the Proceedings of Third International Conference
on Security and Privacy in Communications Networks and the
Workshops, 2007.
[25]
X. Wu, and K.Y. David, Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach., ACM, 2007, pp. 20-22.
[26]
W. Wang, M. Chatterjee, K. Kwiat, and Q. Li, “A game theoretic approach to detect and co-exist with malicious nodes in wireless networks.”, In the proceedings of International Journal on Computer Networks., vol. 71. Elsevier, 2014, pp. 63-83. [http://dx.doi.org/10.1016/j.comnet.2014.06.008]
[27]
Q. Zhu, C. Fung, R. Boutaba, and T. Basar, A game-theoretical approach to incentive design in collaborative intrusion detection networks., In the Proceedings of GameNets, 2009.
[28]
K.C. Nguyen, and T. Alpcan, and Basar, "Security games with incomplete
information," In the proceedings of IEEE ICC. 2009, pp. 1-6.,
[30]
J. Zhang, and Q. Zhang, "Stackelberg Game for utility-based cooperative cognitive radio networks", In the Proceedings of ACM Mobihoc, 2009
[31]
H.S. Lim, G. Ghinita, and E. Bertino, "M. A game-theoretic approach for high assurance of data trustworthiness in sensor networks", In the Proceedings of the 28th International Conference
on Data Engineering (ICDE), Arlington, VA, USA, 2012, pp.
1192-1203.
[32]
Z. Han, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications., Cambridge University Press: Cambridge, UK, 2012.
[33]
P. Guan, and J. Zhuang, "Modeling Resources Allocation in Attacker-Defender Games with “Warm Up” CSF", Risk Anal., vol. 36, no. 4, pp. 776-791, 2016. [http://dx.doi.org/10.1111/risa.12502 PMID: 26713543].
[34]
K. Akkarajitsakul, E. Hossain, D. Niyato, and D.I. Kim, "Game-theoretic approaches for multiple access in wireless networks: A survey Commun", Surv. Tutor, vol. 13, pp. 372-395, 2011. [http://dx.doi.org/10.1109/SURV.2011.122310.000119].
[35]
H.Y. Shi, W.L. Wang, N.M. Kwok, and S.Y. Chen, "Game theory for wireless sensor networks: A survey", Sensors (Basel), vol. 12, no. 7, pp. 9055-9097, 2012. [http://dx.doi.org/10.3390/s120709055 PMID: 23012533].
[36]
B. Benmammar, and F. KRIEF, ""Game theory applications in
wireless networks: A survey."", In the Proceedings of the 13th International
Conference on Software Engineering, Parallel and Distributed
Systems (SEPADS'14), Gdansk, Poland, 2014, pp. 15-17,
[37]
S. Shen, G. Yue, Q. Cao, and F. Yu, "A survey of game theory in wireless sensor networks security", J. Netw, vol. 6, pp. 521-532, 2011. [http://dx.doi.org/10.4304/jnw.6.3.521-532].
[41]
V. Viswacheda, "Ali Chekima, “Detection and Mitigation of DoS Attacks in VANET using Minimum Delay Routing Protocol", Proceedings of Eighth International Conference on Soft Computing and Pattern Recognition, 2018
[42]
S. Kumar, and Kulwinder, ""Detect and Mitigation of Denial of
Service Attacks in VANETs Using Packet Detection Algorithm,"",
In Proceedings of International Journal for Research in Applied
Science and Engineering Technology, vol.6, March 2018.,
[43]
C. Guntewar, and Vaishali, ""A Review on Byzantin Attack Detection
and Prevention using Game Theory,"", In Proceedings of International
Journal of Computer Science and Information Technology,
vol. 6.,
[44]
Y. He, S. Limin, Weidong, and Hong, ""A Game Theory Based
Analysis of Data Privacy in Vehicular Sensor Networks,"", In Proceedings
of International Journal of Distributed Sensor Networks,
2014.,