Mean field game theoretic approach for security in mobile ad-hoc networks [8755-6] (Englisch)
- Neue Suche nach: Wang, Y.
- Neue Suche nach: Tang, H.
- Neue Suche nach: Yu, F.R.
- Neue Suche nach: Huang, M.
- Neue Suche nach: SPIE (Society)
- Neue Suche nach: Wang, Y.
- Neue Suche nach: Tang, H.
- Neue Suche nach: Yu, F.R.
- Neue Suche nach: Huang, M.
- Neue Suche nach: Agaian, Sos S.
- Neue Suche nach: Jassim, Sabah A.
- Neue Suche nach: Du, Eliza Yingzi
- Neue Suche nach: SPIE (Society)
In:
Mobile multimedia/image processing, security, and applications; Mobile Multimedia/Image Processing, Security, and Applications 2013: 29-30 April 2013, Baltimore, Maryland, United States /
;
8755 09
;
2013
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Mean field game theoretic approach for security in mobile ad-hoc networks [8755-6]
-
Beteiligte:Wang, Y. ( Autor:in ) / Tang, H. ( Autor:in ) / Yu, F.R. ( Autor:in ) / Huang, M. ( Autor:in ) / Agaian, Sos S. / Jassim, Sabah A. / Du, Eliza Yingzi / SPIE (Society)
-
Kongress:Conference, Mobile multimedia/image processing, security, and applications; Mobile Multimedia/Image Processing, Security, and Applications 2013: 29-30 April 2013, Baltimore, Maryland, United States / ; 2013 ; Baltimore, MD
-
Erschienen in:PROCEEDINGS- SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING ; 8755 ; 8755 09
-
Verlag:
- Neue Suche nach: SPIE
-
Erscheinungsort:Bellingham, Washington
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:8755 09
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 87550B
-
Location-assured, multifactor authentication on smartphones via LTE communicationKuseler, Torben / Lami, Ihsan A. / Al-Assam, Hisham et al. | 2013
- 87550C
-
Security enhancement for mobile ad hoc networks routing with OLSRv2Wei, Zhexiong / Tang, Helen / Yu, F. Richard / Wang, Maoyu et al. | 2013
- 87550G
-
A new feature selection method for OCT retinal data analysisBanerjee, Madhushri / Chakravarty, Sumit / Da, Huiling et al. | 2013
- 87550H
-
Progress in multi-channel image fusion for face image matchingDelMarco, Stephen et al. | 2013
- 87550I
-
Face detection at a distance with AdaBoost filtering and color-shape informationYeom, Seokwon / Lee, Dong-Su et al. | 2013
- 87550J
-
Feature quality-based multimodal unconstrained eye recognitionZhou, Zhi / Du, Eliza Y. / Lin, Yong / Thomas, N. Luke / Belcher, Craig / Delp, Edward J. et al. | 2013
- 87550L
-
High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal coversCollins, James C. / Agaian, Sos S. et al. | 2013
- 87550M
-
Sub-word based Arabic handwriting analysis for writer identificationMaliki, Makki / Al-Jawad, Naseer / Jassim, Sabah et al. | 2013
- 87550N
-
ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networksBanerjee, Debasmit / Dong, Bo / Biswas, Subir et al. | 2013
- 87550P
-
Super resolution based face recognition: do we need training image set?Al-Hassan, Nadia / Sellahewa, Harin / Jassim, Sabah A. et al. | 2013
- 87550Q
-
Social network forensics: using commercial software in a university forensics lab environmentHalkin, Pavel / Kröger, Knut / Creutzburg, Reiner et al. | 2013
- 87550R
-
Gait recognition using spatio-temporal silhouette-based featuresSabir, Azhin / Al-jawad, Naseer / Jassim, Sabah et al. | 2013
- 87550T
-
BossPro: a biometrics-based obfuscation scheme for software protectionKuseler, Torben / Lami, Ihsan A. / Al-Assam, Hisham et al. | 2013
- 87550Y
-
Security solution against denial of service attacks in BESIP systemRezac, Filip / Voznak, Miroslav / Safarik, Jakub / Partila, Pavol / Tomala, Karel et al. | 2013
- 87550Z
-
IP telephony based danger alert communication system and its implementationRezac, Filip / Safarik, Jakub / Voznak, Miroslav / Tomala, Karel / Partila, Pavol et al. | 2013
- 875501
-
Front Matter: Volume 8755| 2013
- 875502
-
Image encryption in the wavelet domainBao, Long / Zhou, Yicong / Chen, C. L. Philip et al. | 2013
- 875503
-
Biometric feature embedding using robust steganography techniqueRashid, Rasber D. / Sellahewa, Harin / Jassim, Sabah A. et al. | 2013
- 875504
-
Performance assessments of Android-powered military applications operating on tactical handheld devicesWeiss, Brian A. / Fronczek, Lisa / Morse, Emile / Kootbally, Zeid / Schlenoff, Craig et al. | 2013
- 875505
-
No-reference quality assessment of H.264/AVC encoded video based on natural scene featuresZhu, Kongfeng / Asari, Vijayan / Saupe, Dietmar et al. | 2013
- 875506
-
Adjunctive numerical relation codes in multimedia signal coversCollins, James C. / Agaian, Sos S. et al. | 2013
- 875507
-
A novel method of testing image randomness with applications to image shuffling and encryptionWu, Yue / Agaian, Sos / Noonan, Joseph P. et al. | 2013
- 875508
-
Efficient high-capacity steganography techniqueAbdulla, Alan A. / Jassim, Sabah A. / Sellahewa, Harin et al. | 2013
- 875509
-
Mean field game theoretic approach for security in mobile ad-hoc networksWang, Yanwei / Tang, Helen / Yu, F. Richard / Huang, Minyi et al. | 2013
- 875510
-
Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systemsKnobler, Ron / Scheffel, Peter / Jackson, Scott / Gaj, Kris / Kaps, Jens Peter et al. | 2013
- 875511
-
Solving data-at-rest for the storage and retrieval of files in ad hoc networksKnobler, Ron / Scheffel, Peter / Williams, Jonathan / Gaj, Kris / Kaps, Jens-Peter et al. | 2013
- 875512
-
Automatic analysis of attack data from distributed honeypot networkSafarik, Jakub / Voznak, MIroslav / Rezac, Filip / Partila, Pavol / Tomala, Karel et al. | 2013
- 875513
-
Passive radiation detection using optically active CMOS sensorsDosiek, Luke / Schalk, Patrick D. et al. | 2013
- 875514
-
Three dimensional alpha weighted quadratic filter based image color contrast enhancementGao, Chen / Panetta, Karen / Agaian, Sos et al. | 2013
- 875515
-
Mobile object retrieval in server-based image databasesManger, D. / Pagel, F. / Widak, H. et al. | 2013
- 875517
-
Novel infrared and thermal image enhancement algorithmsAgaian, Sos / Roopaei, Mehdi et al. | 2013
- 875518
-
Iterative local color normalization using fuzzy image clusteringMosquera-Lopez, Clara / Agaian, Sos et al. | 2013
- 875519
-
A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigationsKröger, Knut / Creutzburg, Reiner et al. | 2013
-
No-reference quality assessment of H.264/AVC encoded video based on natural scene features [8755-4]Zhu, K. / Asari, V. / Saupe, D. / SPIE (Society) et al. | 2013
-
Adjunctive numerical relation codes in multimedia signal covers [8755-5]Collins, J.C. / Agaian, S.S. / SPIE (Society) et al. | 2013
-
Iterative local color normalization using fuzzy image clustering [8755-41]Mosquera-Lopez, C.M. / Agaian, S. / SPIE (Society) et al. | 2013
-
Efficient high-capacity steganography technique [8755-7]Abdulla, A.A. / Jassim, S.A. / Sellahewa, H. / SPIE (Society) et al. | 2013
-
Novel infrared and thermal image enhancement algorithms [8755-40]Agaian, S. / Roopaei, M. / SPIE (Society) et al. | 2013
-
Location-assured, multifactor authentication on smartphones via LTE communication [8755-10]Kuseler, T. / Lami, I.A. / Al-Assam, H. / SPIE (Society) et al. | 2013
-
A practical overview and comparison of certain commercial forensic software tools for processing large-scale digital investigations [8755-42]Kroger, K. / Creutzburg, R. / SPIE (Society) et al. | 2013
-
Image encyrption in the wavelet domain [8755-1]Bao, L. / Zhou, Y. / Chen, C.L.P. / SPIE (Society) et al. | 2013
-
Security enhancement for mobile ad hoc networks routing with OLSRv2 [8755-11]Wei, Z. / Tang, H. / Yu, F.R. / Wang, M. / SPIE (Society) et al. | 2013
-
Super resolution based face recognition: do we need training image set? (Invited Paper) [8755-46]Al-Hassan, N. / Sellahewa, H. / Jassim, S.A. / SPIE (Society) et al. | 2013
-
Social network forensics: using commercial software in a university forensics lab environment [8755-24]Halkin, P. / Kroger, K. / Creutzburg, R. / SPIE (Society) et al. | 2013
-
Passive radiation detection using optically active CMOS sensors [8755-35]Dosiek, L. / Schalk, P.D. / SPIE (Society) et al. | 2013
-
A new feature selection method for OCT retinal data analysis [8755-26]Banerjee, M. / Chakravarty, S. / Da, H. / SPIE (Society) et al. | 2013
-
Feature quality-based multimodal unconstrained eye recognition [8755-18]Zhou, Z. / Du, E.Y. / Lin, Y. / Thomas, N.L. / Belcher, C. / Delp, E.J. / SPIE (Society) et al. | 2013
-
Face detection at a distance with AdaBoost filtering and color-shape information [8755-17]Yeom, S. / Lee, D.-S. / SPIE (Society) et al. | 2013
-
BossPro: a biometrics-based obfuscation scheme for software protection [8755-47]Kuseler, T. / Lami, I.A. / Al-Assam, H. / SPIE (Society) et al. | 2013
-
IP telephony based danger alert communication system and its implementation [8755-31]Rezac, F. / Safarik, J. / Voznak, M. / Tomala, K. / Partila, P. / SPIE (Society) et al. | 2013
-
Automatic analysis of attack data from distributed honeypot network [8755-34]Safarik, J. / Voznak, M. / Rezac, F. / Partila, P. / Tomala, K. / SPIE (Society) et al. | 2013
-
A novel method of testing image randomness with applications to image shuffling and encryption (Best Paper Award) [8755-8]Wu, Y. / Agaian, S. / Noonan, J.P. / SPIE (Society) et al. | 2013
-
Sub-word based Arabic handwriting analysis for writer identification [8755-22]Maliki, M. / Al-Jawad, N. / Jassim, S. / SPIE (Society) et al. | 2013
-
Gait recognition using spatio-temporal silhouette-based features [8755-25]Sabir, A. / Al-jawad, N. / Jassim, S. / SPIE (Society) et al. | 2013
-
Biometric feature embedding using robust steganography technique [8755-2]Rashid, R.D. / Sellahewa, H. / Jassim, S.A. / SPIE (Society) et al. | 2013
-
High capacity embedding with indexed data recovery using adjunctive numerical relations in multimedia signal covers [8755-21]Collins, J.C. / Agaian, S.S. / SPIE (Society) et al. | 2013
-
ZEA-TDMA: design and system level implementation of a TDMA protocol for anonymous wireless networks [8755-23]Banerjee, D. / Dong, B. / Biswas, S. / SPIE (Society) et al. | 2013
-
Security solution against denial of service attacks in BESIP system [8755-29]Rezac, F. / Voznak, M. / Safarik, J. / Partila, P. / Tomala, K. / SPIE (Society) et al. | 2013
-
Breaking down the barriers of using strong authentication and encryption in resource constrained embedded systems [8755-32]Knobler, R. / Scheffel, P. / Jackson, S. / Gaj, K. / Kaps, J.P. / SPIE (Society) et al. | 2013
-
Solving data-at-rest for the storage and retrieval of files in ad hoc networks [8755-33]Knobler, R. / Scheffel, P. / Williams, J. / Gaj, K. / Kaps, J.P. / SPIE (Society) et al. | 2013
-
Mobile object retrieval in server-based image databases [8755-37]Manger, D. / Pagel, F. / Widak, H. / SPIE (Society) et al. | 2013
-
Mean field game theoretic approach for security in mobile ad-hoc networks [8755-6]Wang, Y. / Tang, H. / Yu, F.R. / Huang, M. / SPIE (Society) et al. | 2013
-
Progress in multi-channel image fusion for face image matching [8755-16]DelMarco, S. / SPIE (Society) et al. | 2013
-
Three dimensional alpha weighted quadratic filter based image color contrast enhancement [8755-36]Gao, C. / Panetta, K. / Agaian, S. / SPIE (Society) et al. | 2013