Standard

Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence. / Garnaev, A.; Trappe, W.

2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 35-43.

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

Harvard

Garnaev, A & Trappe, W 2014, Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence. in 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014. Institute of Electrical and Electronics Engineers Inc., pp. 35-43. https://doi.org/10.1109/CNS.2014.6997463

APA

Garnaev, A., & Trappe, W. (2014). Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence. In 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014 (pp. 35-43). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CNS.2014.6997463

Vancouver

Garnaev A, Trappe W. Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence. In 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 35-43 https://doi.org/10.1109/CNS.2014.6997463

Author

Garnaev, A. ; Trappe, W. / Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence. 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 35-43

BibTeX

@inproceedings{df5532e333314670b22a7c285d5499d6,
title = "Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary{\textquoteright}s Presence",
abstract = "Scanning large amounts of bandwidth for anomalous signals is a fundamental tool to building secure spectrum sharing system. When designing a bandwidth scanning algorithm, the system engineer faces several problems: which band to scan, how long to scan the band, and how to detect whether a malicious adversary is present. It is often not possible to conclusively detect an adversary's presence during a single scan, and therefore the anomaly detection procedure needs to run continuously. For a spectrum scanning system that runs continuously, it is possible to tune the algorithm to better detect the presence of a malicious threat by adapting one's belief as to whether the adversary is present, particularly if the previous scanning attempt failed to detect an adversary in the previous time slot. In this paper, by means of a game theoretical model, we demonstrate some approaches to solve these scanning problems. The equilibrium strategies in the suggested models are obtained explicitly, and thereby allows for intere",
author = "A. Garnaev and W. Trappe",
year = "2014",
doi = "10.1109/CNS.2014.6997463",
language = "не определен",
pages = "35--43",
booktitle = "2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "Соединенные Штаты Америки",

}

RIS

TY - GEN

T1 - Bandwidth Scanning Involving a Bayesian Approach to Adapting the Belief of an Adversary’s Presence

AU - Garnaev, A.

AU - Trappe, W.

PY - 2014

Y1 - 2014

N2 - Scanning large amounts of bandwidth for anomalous signals is a fundamental tool to building secure spectrum sharing system. When designing a bandwidth scanning algorithm, the system engineer faces several problems: which band to scan, how long to scan the band, and how to detect whether a malicious adversary is present. It is often not possible to conclusively detect an adversary's presence during a single scan, and therefore the anomaly detection procedure needs to run continuously. For a spectrum scanning system that runs continuously, it is possible to tune the algorithm to better detect the presence of a malicious threat by adapting one's belief as to whether the adversary is present, particularly if the previous scanning attempt failed to detect an adversary in the previous time slot. In this paper, by means of a game theoretical model, we demonstrate some approaches to solve these scanning problems. The equilibrium strategies in the suggested models are obtained explicitly, and thereby allows for intere

AB - Scanning large amounts of bandwidth for anomalous signals is a fundamental tool to building secure spectrum sharing system. When designing a bandwidth scanning algorithm, the system engineer faces several problems: which band to scan, how long to scan the band, and how to detect whether a malicious adversary is present. It is often not possible to conclusively detect an adversary's presence during a single scan, and therefore the anomaly detection procedure needs to run continuously. For a spectrum scanning system that runs continuously, it is possible to tune the algorithm to better detect the presence of a malicious threat by adapting one's belief as to whether the adversary is present, particularly if the previous scanning attempt failed to detect an adversary in the previous time slot. In this paper, by means of a game theoretical model, we demonstrate some approaches to solve these scanning problems. The equilibrium strategies in the suggested models are obtained explicitly, and thereby allows for intere

U2 - 10.1109/CNS.2014.6997463

DO - 10.1109/CNS.2014.6997463

M3 - статья в сборнике материалов конференции

SP - 35

EP - 43

BT - 2014 IEEE Conference on Communications and Network Security (CNS), San Francisco, CA, October 29-31, 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

ID: 4695849