A game theoretical framework on intrusion detection in heterogeneous networks L Chen, J Leneutre IEEE Transactions on Information Forensics and Security 4 (2), 165-178, 2009 | 186 | 2009 |
A game theoretic framework of distributed power and rate control in IEEE 802.11 WLANs L Chen, J Leneutre IEEE Journal on Selected Areas in Communications 26 (7), 1128-1137, 2008 | 66 | 2008 |
A survey on game-theoretic approaches for intrusion detection and response optimization C Kiennert, Z Ismail, H Debar, J Leneutre ACM Computing Surveys (CSUR) 51 (5), 1-31, 2018 | 64 | 2018 |
Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks L Chen, J Leneutre 27th International Conference on Distributed Computing Systems (ICDCS'07), 16-16, 2007 | 50 | 2007 |
A game theoretical analysis of data confidentiality attacks on smart-grid AMI Z Ismail, J Leneutre, D Bateman, L Chen IEEE journal on selected areas in communications 32 (7), 1486-1499, 2014 | 47 | 2014 |
On multipath routing in multihop wireless networks: security, performance, and their tradeoff L Chen, J Leneutre Eurasip journal on wireless communications and networking 2009, 1-13, 2009 | 41 | 2009 |
Conflicts and incentives in wireless cooperative relaying: A distributed market pricing framework L Chen, L Libman, J Leneutre IEEE Transactions on Parallel and Distributed Systems 22 (5), 758-772, 2010 | 40 | 2010 |
Fight jamming with jamming–A game theoretic analysis of jamming attack in wireless networks and defense strategy L Chen, J Leneutre Computer Networks 55 (9), 2259-2270, 2011 | 39 | 2011 |
Auditing a cloud provider’s compliance with data backup requirements: A game theoretical analysis Z Ismail, C Kiennert, J Leneutre, L Chen IEEE Transactions on Information Forensics and Security 11 (8), 1685-1699, 2016 | 36 | 2016 |
A policy management framework for self-protection of pervasive systems R He, M Lacoste, J Leneutre 2010 Sixth International Conference on Autonomic and Autonomous Systems, 104-109, 2010 | 27 | 2010 |
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols N Oualha, J Leneutre, Y Roudier Peer-to-Peer Networking and Applications 5, 231-243, 2012 | 19 | 2012 |
Authenticated and privacy-preserving consent management in the Internet of Things M Laurent, J Leneutre, S Chabridon, I Laaouane Procedia Computer Science 151, 256-263, 2019 | 18 | 2019 |
Autonomic security for home networks M Aljnidi, J Leneutre International Workshop of the EuroNGI Network of Excellence, 239-242, 2006 | 17 | 2006 |
A secure and scalable time synchronization protocol in IEEE 802.11 ad hoc networks L Chen, J Leneutre 2006 International Conference on Parallel Processing Workshops (ICPPW'06), 8 …, 2006 | 17 | 2006 |
Formal analysis of secure device pairing protocols T Nguyen, J Leneutre 2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014 | 16 | 2014 |
A game-theoretical model for security risk management of interdependent ict and electrical infrastructures Z Ismail, J Leneutre, D Bateman, L Chen 2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015 | 15 | 2015 |
Data integrity and availability verification game in untrusted cloud storage B Djebaili, C Kiennert, J Leneutre, L Chen Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014 | 12 | 2014 |
Toward secure and scalable time synchronization in ad hoc networks L Chen, J Leneutre Computer Communications 30 (11-12), 2453-2467, 2007 | 12 | 2007 |
On the power and rate control in ieee 802.11 wlans-a game theoretical approach L Chen, J Leneutre 2007 16th International Conference on Computer Communications and Networks …, 2007 | 12 | 2007 |
SWAN: A secured watchdog for ad hoc networks X Xue, J Leneutre, L Chen, J Ben-Othman International Journal of Computer Science and Network Security (IJCSNS) 6 (2 …, 2006 | 12 | 2006 |