关注
Jean Leneutre
Jean Leneutre
Telecom ParisTech / CNRS LTCI - UMR5141
在 telecom-paristech.fr 的电子邮件经过验证
标题
引用次数
引用次数
年份
A game theoretical framework on intrusion detection in heterogeneous networks
L Chen, J Leneutre
IEEE Transactions on Information Forensics and Security 4 (2), 165-178, 2009
1862009
A game theoretic framework of distributed power and rate control in IEEE 802.11 WLANs
L Chen, J Leneutre
IEEE Journal on Selected Areas in Communications 26 (7), 1128-1137, 2008
662008
A survey on game-theoretic approaches for intrusion detection and response optimization
C Kiennert, Z Ismail, H Debar, J Leneutre
ACM Computing Surveys (CSUR) 51 (5), 1-31, 2018
642018
Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks
L Chen, J Leneutre
27th International Conference on Distributed Computing Systems (ICDCS'07), 16-16, 2007
502007
A game theoretical analysis of data confidentiality attacks on smart-grid AMI
Z Ismail, J Leneutre, D Bateman, L Chen
IEEE journal on selected areas in communications 32 (7), 1486-1499, 2014
472014
On multipath routing in multihop wireless networks: security, performance, and their tradeoff
L Chen, J Leneutre
Eurasip journal on wireless communications and networking 2009, 1-13, 2009
412009
Conflicts and incentives in wireless cooperative relaying: A distributed market pricing framework
L Chen, L Libman, J Leneutre
IEEE Transactions on Parallel and Distributed Systems 22 (5), 758-772, 2010
402010
Fight jamming with jamming–A game theoretic analysis of jamming attack in wireless networks and defense strategy
L Chen, J Leneutre
Computer Networks 55 (9), 2259-2270, 2011
392011
Auditing a cloud provider’s compliance with data backup requirements: A game theoretical analysis
Z Ismail, C Kiennert, J Leneutre, L Chen
IEEE Transactions on Information Forensics and Security 11 (8), 1685-1699, 2016
362016
A policy management framework for self-protection of pervasive systems
R He, M Lacoste, J Leneutre
2010 Sixth International Conference on Autonomic and Autonomous Systems, 104-109, 2010
272010
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols
N Oualha, J Leneutre, Y Roudier
Peer-to-Peer Networking and Applications 5, 231-243, 2012
192012
Authenticated and privacy-preserving consent management in the Internet of Things
M Laurent, J Leneutre, S Chabridon, I Laaouane
Procedia Computer Science 151, 256-263, 2019
182019
Autonomic security for home networks
M Aljnidi, J Leneutre
International Workshop of the EuroNGI Network of Excellence, 239-242, 2006
172006
A secure and scalable time synchronization protocol in IEEE 802.11 ad hoc networks
L Chen, J Leneutre
2006 International Conference on Parallel Processing Workshops (ICPPW'06), 8 …, 2006
172006
Formal analysis of secure device pairing protocols
T Nguyen, J Leneutre
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
162014
A game-theoretical model for security risk management of interdependent ict and electrical infrastructures
Z Ismail, J Leneutre, D Bateman, L Chen
2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015
152015
Data integrity and availability verification game in untrusted cloud storage
B Djebaili, C Kiennert, J Leneutre, L Chen
Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014
122014
Toward secure and scalable time synchronization in ad hoc networks
L Chen, J Leneutre
Computer Communications 30 (11-12), 2453-2467, 2007
122007
On the power and rate control in ieee 802.11 wlans-a game theoretical approach
L Chen, J Leneutre
2007 16th International Conference on Computer Communications and Networks …, 2007
122007
SWAN: A secured watchdog for ad hoc networks
X Xue, J Leneutre, L Chen, J Ben-Othman
International Journal of Computer Science and Network Security (IJCSNS) 6 (2 …, 2006
122006
系统目前无法执行此操作,请稍后再试。
文章 1–20