Jean Leneutre
Jean Leneutre
Telecom ParisTech / CNRS LTCI - UMR5141
Email verificata su telecom-paristech.fr
Titolo
Citata da
Citata da
Anno
A game theoretical framework on intrusion detection in heterogeneous networks
L Chen, J Leneutre
IEEE Transactions on Information Forensics and Security 4 (2), 165-178, 2009
1572009
A game theoretic framework of distributed power and rate control in IEEE 802.11 WLANs
L Chen, J Leneutre
IEEE Journal on Selected Areas in Communications 26 (7), 1128-1137, 2008
622008
Selfishness, not always a nightmare: Modeling selfish mac behaviors in wireless mobile ad hoc networks
L Chen, J Leneutre
27th International Conference on Distributed Computing Systems (ICDCS'07), 16-16, 2007
492007
Conflicts and incentives in wireless cooperative relaying: A distributed market pricing framework
L Chen, L Libman, J Leneutre
IEEE Transactions on Parallel and Distributed Systems 22 (5), 758-772, 2010
382010
On multipath routing in multihop wireless networks: security, performance, and their tradeoff
L Chen, J Leneutre
Eurasip journal on wireless communications and networking 2009, 1-13, 2009
362009
Fight jamming with jamming–A game theoretic analysis of jamming attack in wireless networks and defense strategy
L Chen, J Leneutre
Computer Networks 55 (9), 2259-2270, 2011
342011
Auditing a cloud provider’s compliance with data backup requirements: A game theoretical analysis
Z Ismail, C Kiennert, J Leneutre, L Chen
IEEE Transactions on Information Forensics and Security 11 (8), 1685-1699, 2016
302016
A game theoretical analysis of data confidentiality attacks on smart-grid AMI
Z Ismail, J Leneutre, D Bateman, L Chen
IEEE journal on selected areas in communications 32 (7), 1486-1499, 2014
282014
A survey on game-theoretic approaches for intrusion detection and response optimization
C Kiennert, Z Ismail, H Debar, J Leneutre
ACM Computing Surveys (CSUR) 51 (5), 1-31, 2018
252018
A policy management framework for self-protection of pervasive systems
R He, M Lacoste, J Leneutre
2010 Sixth International Conference on Autonomic and Autonomous Systems, 104-109, 2010
252010
Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols
N Oualha, J Leneutre, Y Roudier
Peer-to-Peer Networking and Applications 5 (3), 231-243, 2012
192012
Autonomic security for home networks
M Aljnidi, J Leneutre
Self-Organizing Systems, 239-242, 2006
172006
A secure and scalable time synchronization protocol in IEEE 802.11 ad hoc networks
L Chen, J Leneutre
2006 International Conference on Parallel Processing Workshops (ICPPW'06), 8 …, 2006
172006
A game-theoretical model for security risk management of interdependent ict and electrical infrastructures
Z Ismail, J Leneutre, D Bateman, L Chen
2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015
122015
SWAN: A secured watchdog for ad hoc networks
X Xue, J Leneutre, L Chen, J Ben-Othman
International Journal of Computer Science and Network Security (IJCSNS) 6 (2 …, 2006
122006
Data integrity and availability verification game in untrusted cloud storage
B Djebaili, C Kiennert, J Leneutre, L Chen
International Conference on Decision and Game Theory for Security, 287-306, 2014
112014
On the power and rate control in ieee 802.11 wlans-a game theoretical approach
L Chen, J Leneutre
2007 16th International Conference on Computer Communications and Networks …, 2007
112007
Toward secure and scalable time synchronization in ad hoc networks
L Chen, J Leneutre
Computer Communications 30 (11-12), 2453-2467, 2007
102007
Formal analysis of secure device pairing protocols
T Nguyen, J Leneutre
2014 IEEE 13th International Symposium on Network Computing and Applications …, 2014
92014
Virtual security kernel: A component-based os architecture for self-protection
R He, M Lacoste, J Leneutre
2010 10th IEEE International Conference on Computer and Information …, 2010
92010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20