1. 2015
  2. Anti-jamming strategies: a stochastic game approach

    Garnaev, A. & Trappe, W., 2015, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Nature, p. 230-243

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

  3. How to deal with an intelligent adversary

    Garnaev, A., Baykal-Gursoy, M. & Vincent Poor, H., 2015, In: Computers and Industrial Engineering. 90, p. 352–360 9 p.

    Research output: Contribution to journalArticlepeer-review

  4. Impact of Incomplete Knowledge on Scanning Strategy

    GARNAEV, ANDREY. & Trappe, W., 2015, 7th IEEE International Workshop on Information Forensics and Security (WIFS) . IEEE Industrial Electronics Society, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

  5. One-Time Spectrum Coexistence in Dynamic Spectrum Access When the Secondary User May Be Malicious

    Garnaev, A. & Trappe, W., 2015, In: IEEE Transactions on Information Forensics and Security. 10, 5, p. 1064-1075

    Research output: Contribution to journalArticle

  6. Spectrum Scanning When The Intruder Might Have Knowledge About The Scanner's Capabilities

    GARNAEV, ANDREY., Trappe, W., Stojadinovic, D. & Seskar, I., 2015, 40th IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Institute of Electrical and Electronics Engineers Inc., p. 1742-1746

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

  7. 2014
  8. Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence

    Garnaev, A. & Trappe, W., 2014, 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014. Institute of Electrical and Electronics Engineers Inc., p. 35-43

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

  9. Fair Resource Allocation Under an Unknown Jamming Attack: A Bayesian Game

    Garnaev, A. & Trappe, W., 2014, 2014 IEEE Workshop on Information Forensics and Security (WISP), Atlanta, Georgia, USA, December 3-5, 2014. Institute of Electrical and Electronics Engineers Inc., p. 227-232

    Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

  10. Incorporating Attack-Type Uncertainty into Network Protection

    Garnaev, A., Baykal-Gursoy, M. & Poor, H. V., 2014, In: IEEE Transactions on Information Forensics and Security. 9, 8, p. 1278-1287

    Research output: Contribution to journalArticle

  11. Infrastructure security games

    Baykal-Gursoy, M., Duan, Z., Poor, H. V. & Garnaev, A., 2014, In: European Journal of Operational Research. 239, 2, p. 469-478

    Research output: Contribution to journalArticlepeer-review

  12. Screening and Hiding versus Search

    Garnaev, A. & Kikuta, K., 2014, In: Mathematical Methods of Operations Research. 80, 3, p. 255-265

    Research output: Contribution to journalArticlepeer-review

ID: 192670