References

  1. A. Aldini & A. Bogliolo (2012): Model Checking of Trust-Based User-Centric Cooperative Networks. In: Proc. 4th International Conference on Advances in Future Internet (AFIN'12), pp. 32–41.
  2. A. Aldini & A. Bogliolo (2012): Trading Performance and Cooperation Incentives in User-Centric Networks. In: Proc. International Workshop on Quantitative Aspects in Security Assurance (QASA'12).
  3. A. Bogliolo, P. Polidori, A. Aldini, W. Moreira, P. Mendes, M. Yildiz, C. Ballester & J. Seigneur (2012): Virtual Currency and Reputation-based Cooperation Incentives in User-Centric Networks. In: Proc. 8th International Wireless Communications and Mobile Computing Conference (IWCMC'12), pp. 895 –900, doi:10.1109/IWCMC.2012.6314323.
  4. T. Chen, V. Forejt, M. Kwiatkowska, D. Parker & A. Simaitis (2013): Automatic Verification of Competitive Stochastic Systems. Formal Methods in System Design. To appear.
  5. T. Chen, V. Forejt, M. Kwiatkowska, D. Parker & A. Simaitis (2013): PRISM-games: A Model Checker for Stochastic Multi-Player Games. In: Proc. 19th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'13), LNCS 7795. Springer, pp. 187–193.
  6. M. Felegyhazi, J.-P. Hubaux & L. Buttyan (2006): Nash equilibria of packet forwarding strategies in wireless ad hoc networks. Mobile Computing, IEEE Transactions on 5(5), pp. 463 – 476, doi:10.1109/TMC.2006.68.
  7. Z. Li & H. Shen (2012): Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 11(8), pp. 1287 –1303, doi:10.1109/TMC.2011.151.
  8. S. Roy, C. Ellis, S. Shiva, D. Dasgupta, V. Shandilya & Q. Wu (2010): A Survey of Game Theory as Applied to Network Security. In: Proc. 43rd Hawaii International Conference on System Sciences (HICSS'10), pp. 1 –10, doi:10.1109/HICSS.2010.35.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org