IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020
DOI: 10.1109/infocomwkshps50562.2020.9162758
|View full text |Cite
|
Sign up to set email alerts
|

Underwater Jamming Attacks as Incomplete Information Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
1
2
0
Order By: Relevance
“…Moreover, the dependence on α is also marginal, since it will not alter the ordinal meaning of the utilities. Other results [12], [23] in the field of games with variable positions of the users hint at this principle by confirming it numerically. For the sake of choosing a value, in the following, we will most often refer to the case α = 2, which would correspond to a free-space propagation.…”
Section: A Environment Layoutsupporting
confidence: 61%
See 2 more Smart Citations
“…Moreover, the dependence on α is also marginal, since it will not alter the ordinal meaning of the utilities. Other results [12], [23] in the field of games with variable positions of the users hint at this principle by confirming it numerically. For the sake of choosing a value, in the following, we will most often refer to the case α = 2, which would correspond to a free-space propagation.…”
Section: A Environment Layoutsupporting
confidence: 61%
“…In this latter case, one should consider smaller values of M to obtain consistent results. These considerations are not limited to vehicular scenarios but also hold, albeit with slightly different models in terms of timescale, speed, LOS vs. non-LOS propagation, to a wide array of networks exploiting RF communication [24], mmWave [33], satellite-aided positioning [34] or underwater acoustic [12]. Moreover, they still apply, to some extent, if the set of available positions is limited [35] and/or the legitimate network agents can approach the jammer to stop it [36].…”
Section: B Application To Ieee 80211pmentioning
confidence: 99%
See 1 more Smart Citation