• Moura J, Marinheiro R and Silva J. (2022). Game Theory for Cooperation in Multi-Access Edge Computing. Research Anthology on Edge Computing Protocols, Applications, and Integration. 10.4018/978-1-6684-5700-9.ch012. (229-279).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-5700-9.ch012

  • Parras J, Apellániz P and Zazo S. (2022). An online learning algorithm to play discounted repeated games in wireless networks. Engineering Applications of Artificial Intelligence. 10.1016/j.engappai.2021.104520. 107. (104520). Online publication date: 1-Jan-2022.

    https://linkinghub.elsevier.com/retrieve/pii/S0952197621003687

  • Srikaanth P and Nagarajan V. (2021). Fuzzy Rough Set Derived Probabilistic Variable Precision-Based Mitigation Technique for Vampire Attack in MANETs. Wireless Personal Communications. 10.1007/s11277-021-08673-z.

    https://link.springer.com/10.1007/s11277-021-08673-z

  • Yue H, Guihe Q, Tong L, Wei H and Chengxun M. (2021). A Multi-factor Reputation Evaluation Model of Vehicular Network. Emerging Trends in Intelligent and Interactive Systems and Applications. 10.1007/978-3-030-63784-2_94. (763-770).

    http://link.springer.com/10.1007/978-3-030-63784-2_94

  • Mao Y, Zhou C, Qi J and Zhu X. (2020). A fair credit-based incentive mechanism for routing in DTN-based sensor network with nodes’ selfishness. EURASIP Journal on Wireless Communications and Networking. 10.1186/s13638-020-01823-0. 2020:1. Online publication date: 1-Dec-2020.

    https://jwcn-eurasipjournals.springeropen.com/articles/10.1186/s13638-020-01823-0

  • Zhang J, Wu Y, Min G, Hao F and Cui L. Balancing Energy Consumption and Reputation Gain of UAV Scheduling in Edge Computing. IEEE Transactions on Cognitive Communications and Networking. 10.1109/TCCN.2020.3004592. 6:4. (1204-1217).

    https://ieeexplore.ieee.org/document/9124670/

  • Yu Z and Wang Z. (2020). Community Behavior Understanding. Human Behavior Analysis: Sensing and Understanding. 10.1007/978-981-15-2109-6_7. (219-260).

    http://link.springer.com/10.1007/978-981-15-2109-6_7

  • Hadjichristofi G and Varveris G. (2019). Visualizing and Aggregating Behavior for Trust Evaluation 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 10.1109/CAMAD.2019.8858434. 978-1-7281-1016-5. (1-6).

    https://ieeexplore.ieee.org/document/8858434/

  • Mughal S, Razaque F, Hassan M and Malani M. (2019). Orchestrating Heterogeneous Communities using Middleware Approach 2019 International Conference on Information Science and Communication Technology (ICISCT). 10.1109/CISCT.2019.8777427. 978-1-7281-0447-8. (1-10).

    https://ieeexplore.ieee.org/document/8777427/

  • Moura J, Marinheiro R and Silva J. Game Theory for Cooperation in Multi-Access Edge Computing. Paving the Way for 5G Through the Convergence of Wireless Systems. 10.4018/978-1-5225-7570-2.ch005. (100-149).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7570-2.ch005

  • Tadayon N and Aissa S. (2018). Radio Resource Allocation and Pricing. IEEE Transactions on Signal Processing. 66:20. (5240-5254). Online publication date: 1-Oct-2018.

    https://doi.org/10.1109/TSP.2018.2862398

  • Balaji Srikaanth P and Nagarajan V. (2018). A Fuzzy Trust Relationship Perspective-Based Prevention Mechanism for Vampire Attack in MANETs. Wireless Personal Communications: An International Journal. 101:1. (339-357). Online publication date: 1-Jul-2018.

    https://doi.org/10.1007/s11277-018-5691-8

  • Ntemos K, Plata-Chaves J, Kolokotronis N, Kalouptsidis N and Moonen M. Secure Information Sharing in Adversarial Adaptive Diffusion Networks. IEEE Transactions on Signal and Information Processing over Networks. 10.1109/TSIPN.2017.2787910. 4:1. (111-124).

    http://ieeexplore.ieee.org/document/8241456/

  • Vedhavathy T and Manikandan M. (2018). Triple referee incentive mechanism for secure mobile adhoc networks. Cluster Computing. 10.1007/s10586-017-1631-8.

    http://link.springer.com/10.1007/s10586-017-1631-8

  • Silva B, Rodrigues J, Kumar N and Han G. Cooperative Strategies for Challenged Networks and Applications: A Survey. IEEE Systems Journal. 10.1109/JSYST.2015.2436927. 11:4. (2749-2760).

    http://ieeexplore.ieee.org/document/7155467/

  • Ntemos K, Kalouptsidis N and Kolokotronis N. (2017). Trust-based strategies for wireless networks under partial monitoring 2017 25th European Signal Processing Conference (EUSIPCO). 10.23919/EUSIPCO.2017.8081679. 978-0-9928626-7-1. (2591-2595).

    http://ieeexplore.ieee.org/document/8081679/

  • Tao J, Xu Y, Zhang Z, Feng F, Tong F and Dong F. (2016). A resource allocation game with restriction mechanism in VANET cloud. Concurrency and Computation: Practice and Experience. 10.1002/cpe.4038. 29:14. Online publication date: 25-Jul-2017.

    https://onlinelibrary.wiley.com/doi/10.1002/cpe.4038

  • Wu C, Gerla M and van der Schaar M. (2017). Social Norm Incentives for Network Coding in Manets. IEEE/ACM Transactions on Networking. 25:3. (1761-1774). Online publication date: 1-Jun-2017.

    https://doi.org/10.1109/TNET.2017.2656059

  • Acharjya D and Ahmed N. (2017). Recognizing Attacks in Wireless Sensor Network in View of Internet of Things. Internet of Things: Novel Advances and Envisioned Applications. 10.1007/978-3-319-53472-5_7. (149-172).

    http://link.springer.com/10.1007/978-3-319-53472-5_7

  • Sony S and Sasi S. (2016). On - off attack management based on trust 2016 Online International Conference on Green Engineering and Technologies (IC-GET). 10.1109/GET.2016.7916760. 978-1-5090-4556-3. (1-4).

    http://ieeexplore.ieee.org/document/7916760/

  • Silva B, Rodrigues J, Kumar N, Proença M and Han G. (2016). MobiCoop. ACM Transactions on Multimedia Computing, Communications, and Applications. 12:4. (1-23). Online publication date: 24-Aug-2016.

    https://doi.org/10.1145/2957752

  • Zhang J, Labiod H, Ren M and Tan H. (2016). Cooperation behavior of vehicles in an evolutionary game for information dissemination 2016 International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC). 10.1109/SSIC.2016.7571811. 978-1-5090-2470-4. (1-8).

    http://ieeexplore.ieee.org/document/7571811/

  • Zhang S, Chen G and Li J. (2016). Cube attack on reduced-round Enhanced-Bivium 2016 International Conference on Security of Smart cities, Industrial Control System and Communications (SSIC). 10.1109/SSIC.2016.7571808. 978-1-5090-2470-4. (1-4).

    http://ieeexplore.ieee.org/document/7571808/

  • Hadjichristofi G, Kyriacou E and Kappos G. (2016). 3-D trust modeling in distributed and dynamic environments 2016 18th Mediterranean Electrotechnical Conference (MELECON). 10.1109/MELCON.2016.7495424. 978-1-5090-0058-6. (1-6).

    http://ieeexplore.ieee.org/document/7495424/

  • Manikandan E, Muthukumarasamy S and Thanigaivelu K. (2016). Stratified Report Assisted Reputation Administration (SRA) system for MANETs 2016 International Conference on Information Communication and Embedded Systems (ICICES). 10.1109/ICICES.2016.7518948. 978-1-5090-2552-7. (1-5).

    http://ieeexplore.ieee.org/document/7518948/

  • Xie Y and Zhang Y. (2016). A secure, service priority-based incentive scheme for delay tolerant networks. Security and Communication Networks. 9:1. (5-18). Online publication date: 10-Jan-2016.

    https://doi.org/10.1002/sec.1372

  • Moura J, Marinheiro R and Silva J. Game Theory for Collaboration in Future Networks. Mobile Computing and Wireless Networks. 10.4018/978-1-4666-8751-6.ch090. (2061-2091).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-8751-6.ch090

  • Ramya S, Shibu N and Malathi P. (2016). A survey on texture synthesis and its approaches 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE). 10.1109/ICCTIDE.2016.7725352. 978-1-4673-8437-7. (1-4).

    http://ieeexplore.ieee.org/document/7725352/

  • Ramya K and Kavitha T. (2016). Deterring selfish nodes using hierarchical account-aided reputation system in MANET 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE). 10.1109/ICCTIDE.2016.7725351. 978-1-4673-8437-7. (1-7).

    http://ieeexplore.ieee.org/document/7725351/

  • Magaia N, Pereira P and Correia M. (2015). Security in Delay-Tolerant Mobile Cyber-Physical Applications. Cyber-Physical Systems. 10.1201/b19290-22. (373-394). Online publication date: 22-Oct-2015.

    http://www.crcnetbase.com/doi/10.1201/b19290-22

  • Tang C, Li A and Li X. When Reputation Enforces Evolutionary Cooperation in Unreliable MANETs. IEEE Transactions on Cybernetics. 10.1109/TCYB.2014.2366971. 45:10. (2190-2201).

    http://ieeexplore.ieee.org/document/6966782/

  • Zhang C, Zhao H and Jia M. (2015). Game theoretic analysis for pricing-based incentive mechanism in non-dedicated cooperative relay networks. Journal of Central South University. 10.1007/s11771-015-2942-7. 22:10. (3977-3989). Online publication date: 1-Oct-2015.

    http://link.springer.com/10.1007/s11771-015-2942-7

  • Gong X, Chen X, Zhang J and Poor H. Exploiting Social Trust Assisted Reciprocity (STAR) Toward Utility-Optimal Socially-Aware Crowdsensing. IEEE Transactions on Signal and Information Processing over Networks. 10.1109/TSIPN.2015.2470110. 1:3. (195-208).

    http://ieeexplore.ieee.org/document/7210202/

  • Zhou H, Wu J, Zhao H, Tang S, Chen C and Chen J. Incentive-Driven and Freshness-Aware Content Dissemination in Selfish Opportunistic Mobile Networks. IEEE Transactions on Parallel and Distributed Systems. 10.1109/TPDS.2014.2366474. 26:9. (2493-2505).

    http://ieeexplore.ieee.org/document/6942224/

  • Paris S, Martignon F, Filippini I and Chen L. An Efficient Auction-based Mechanism for Mobile Data Offloading. IEEE Transactions on Mobile Computing. 10.1109/TMC.2014.2361127. 14:8. (1573-1586).

    http://ieeexplore.ieee.org/document/6915727/

  • Samian N, Zukarnain Z, Seah W, Abdullah A and Hanapi Z. (2015). Cooperation stimulation mechanisms for wireless multihop networks. Journal of Network and Computer Applications. 54:C. (88-106). Online publication date: 1-Aug-2015.

    https://doi.org/10.1016/j.jnca.2015.04.012

  • Samian N, Zukarnain Z, Abdullah A and Hanapi Z. (2015). Compare and measure selfishness detection (CMSD) mechanism: Promptness and accuracy 2015 Seventh International Conference on Ubiquitous and Future Networks (ICUFN). 10.1109/ICUFN.2015.7182664. 978-1-4799-8993-5. (851-856).

    http://ieeexplore.ieee.org/document/7182664/

  • Sánchez-Carmona A, Robles S and Borrego C. (2015). Endeavouring to be in the good books. Awarding DTN network use for acknowledging the reception of bundles. Computer Networks: The International Journal of Computer and Telecommunications Networking. 83:C. (149-166). Online publication date: 4-Jun-2015.

    https://doi.org/10.1016/j.comnet.2015.03.007

  • Abdelkader T, Naik K and Gad W. (2015). A Game-Theoretic Approach to Supporting Fair Cooperation in Delay Tolerant Networks 2015 IEEE 81st Vehicular Technology Conference (VTC Spring). 10.1109/VTCSpring.2015.7145605. 978-1-4799-8088-8. (1-7).

    http://ieeexplore.ieee.org/document/7145605/

  • Chae Y, DiPippo L and Sun Y. Trust Management for Defending On-Off Attacks. IEEE Transactions on Parallel and Distributed Systems. 10.1109/TPDS.2014.2317719. 26:4. (1178-1191).

    http://ieeexplore.ieee.org/document/6800056/

  • Wu H, Ma H and Zhao D. (2015). Videocent. Wireless Networks. 21:3. (769-781). Online publication date: 1-Apr-2015.

    https://doi.org/10.1007/s11276-014-0813-z

  • Martignon F, Paris S, Filippini I, Chen L and Capone A. (2015). Efficient and truthful bandwidth allocation in wireless mesh community networks. IEEE/ACM Transactions on Networking. 23:1. (161-174). Online publication date: 1-Feb-2015.

    https://doi.org/10.1109/TNET.2013.2296401

  • Shen H and Li Z. (2015). A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Transactions on Networking. 23:1. (70-84). Online publication date: 1-Feb-2015.

    https://doi.org/10.1109/TNET.2013.2290731

  • Wang S, Zhang Z and Naït-Abdesselam F. (2015). Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks. Security and Communication Networks. 8:2. (232-244). Online publication date: 25-Jan-2015.

    /doi/10.5555/2914511.2914526

  • Wang S, Zhang Z and Naït‐Abdesselam F. (2014). Towards cross‐layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems. Security and Communication Networks. 10.1002/sec.976. 8:2. (232-244). Online publication date: 25-Jan-2015.

    https://onlinelibrary.wiley.com/doi/10.1002/sec.976

  • Guan X. (2015). A security data forwarding mechanism for sparse social sensor networks. International Journal of Distributed Sensor Networks. 2015. (17-17). Online publication date: 1-Jan-2015.

    https://doi.org/10.1155/2015/931080

  • Hoang D, Lu X, Niyato D, Wang P, Kim D and Han Z. Applications of Repeated Games in Wireless Networks: A Survey. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2015.2445789. 17:4. (2102-2135).

    http://ieeexplore.ieee.org/document/7124400/

  • Saghezchi F, Radwan A and Rodriguez J. (2015). Cooperative Paradigm for Energy Saving. Energy Efficient Smart Phones for 5G Networks. 10.1007/978-3-319-10314-3_5. (115-140).

    https://link.springer.com/10.1007/978-3-319-10314-3_5

  • Logota E, Saghezchi F, Marques H and Rodriguez J. (2015). Cooperative Strategies for End-to-End Energy Saving and QoS Control. Novel 3D Media Technologies. 10.1007/978-1-4939-2026-6_8. (135-161).

    http://link.springer.com/10.1007/978-1-4939-2026-6_8

  • Chen T and Zhong S. An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing. IEEE Transactions on Vehicular Technology. 10.1109/TVT.2014.2312171. 63:9. (4476-4491).

    https://ieeexplore.ieee.org/document/6767128/

  • Wang W, Chatterjee M, Kwiat K and Li Q. (2014). A game theoretic approach to detect and co-exist with malicious nodes in wireless networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 71. (63-83). Online publication date: 1-Oct-2014.

    https://doi.org/10.1016/j.comnet.2014.06.008

  • Tasiopoulos A, Psaras I and Pavlou G. Mind the gap. Proceedings of the 9th ACM MobiCom workshop on Challenged networks. (13-18).

    https://doi.org/10.1145/2645672.2645680

  • Wu H and Ma H. (2014). Opportunistic routing for live video streaming in vehicular ad hoc networks 2014 IEEE 15th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 10.1109/WoWMoM.2014.6919002. 978-1-4799-4786-7. (1-3).

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6919002

  • Wu H and Ma H. (2014). Quality-oriented incentive mechanism for video delivery in opportunistic networks 2014 IEEE 15th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM). 10.1109/WoWMoM.2014.6918957. 978-1-4799-4786-7. (1-6).

    http://ieeexplore.ieee.org/document/6918957/

  • Zhang J, Gauthier V, Labiod H, Banerjee A and Afifi H. (2014). Information dissemination in vehicular networks via evolutionary game theory ICC 2014 - 2014 IEEE International Conference on Communications. 10.1109/ICC.2014.6883306. 978-1-4799-2003-7. (124-129).

    http://ieeexplore.ieee.org/document/6883306/

  • Zhu Y, Liu L, Panneerselvam J, Wang L and Li Z. Credit-Based Incentives in Vehicular Ad Hoc Networks. Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering. (352-357).

    https://doi.org/10.1109/SOSE.2014.51

  • Ben Jaballah W, Conti M, Mosbah M and Palazzi C. (2014). Fast and Secure Multihop Broadcast Solutions for Intervehicular Communication. IEEE Transactions on Intelligent Transportation Systems. 15:1. (433-450). Online publication date: 1-Feb-2014.

    https://doi.org/10.1109/TITS.2013.2277890

  • Vedhavathy T, Manikandan M and Indrajith N. (2014). Secure incentive mechanism for multihop wireless networks 2014 International Conference on Electronics and Communication Systems (ICECS). 10.1109/ECS.2014.6892649. 978-1-4799-2320-5. (1-5).

    https://ieeexplore.ieee.org/document/6892649

  • Moura J, Marinheiro R and Silva J. Game Theory for Collaboration in Future Networks. Convergence of Broadband, Broadcast, and Cellular Network Technologies. 10.4018/978-1-4666-5978-0.ch005. (94-123).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-5978-0.ch005

  • Gong X, Chen X, Yang L and Zhang J. (2014). Introduction. Social Group Utility Maximization. 10.1007/978-3-319-12322-6_1. (1-4).

    https://link.springer.com/10.1007/978-3-319-12322-6_1

  • Liu H, Lee P and Lui J. (2013). On the credit evolution of credit-based incentive protocols in wireless mesh networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 57:17. (3327-3343). Online publication date: 1-Dec-2013.

    https://doi.org/10.1016/j.comnet.2013.07.021

  • Guo B, Zhang D, Wang Z, Yu Z and Zhou X. (2013). Opportunistic IoT. Journal of Network and Computer Applications. 36:6. (1531-1539). Online publication date: 1-Nov-2013.

    https://doi.org/10.1016/j.jnca.2012.12.028

  • Zhou H, Wu J, Zhao H, Tang S, Chen C and Chen J. Incentive-Driven and Freshness-Aware Content Dissemination in Selfish Opportunistic Mobile Networks. Proceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems. (333-341).

    https://doi.org/10.1109/MASS.2013.54

  • Samian N, Seah W and Gang Chen . (2013). Quantifying selfishness and fairness in wireless multihop networks 38th Annual IEEE Conference on Local Computer Networks (LCN 2013). 10.1109/LCN.2013.6761279. 978-1-4799-0537-9. (459-467).

    http://ieeexplore.ieee.org/document/6761279/

  • Paris S, Nita-Rotaru C, Martignon F and Capone A. (2013). Cross-layer metrics for reliable routing in wireless mesh networks. IEEE/ACM Transactions on Networking. 21:3. (1003-1016). Online publication date: 1-Jun-2013.

    https://doi.org/10.1109/TNET.2012.2230337

  • Wu F, Chen T, Zhong S, Qiao C and Chen G. A Game-Theoretic Approach to Stimulate Cooperation for Probabilistic Routing in Opportunistic Networks. IEEE Transactions on Wireless Communications. 10.1109/TWC.2013.022113.120282. 12:4. (1573-1583).

    http://ieeexplore.ieee.org/document/6477056/

  • Paris S, Martisnon F, Filippini I and Clien L. (2013). A bandwidth trading marketplace for mobile data offloading IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2013.6566809. 978-1-4673-5946-7. (430-434).

    http://ieeexplore.ieee.org/document/6566809/

  • Malandrino F, Casetti C and Chiasserini C. (2013). Discovery and provision of content in vehicular networks. Wireless Communications and Mobile Computing. 10.1002/wcm.2198. 13:3. (244-254). Online publication date: 25-Feb-2013.

    https://onlinelibrary.wiley.com/doi/10.1002/wcm.2198

  • Huang S, Wang G, Zhen H, Zhang Z, Bordogna G and Melin P. (2013). An MPS‐BNS Mixed Strategy Based on Game Theory for Wireless Mesh Networks. The Scientific World Journal. 10.1155/2013/936536. 2013:1. Online publication date: 1-Jan-2013.

    https://onlinelibrary.wiley.com/doi/10.1155/2013/936536

  • Hua Q, Tan H, Wang Y, Li H, Yu D, Lau F and Wu C. Computing Capacity and Connectivity in Cognitive Radio Ad-Hoc Networks. Proceedings of the 2012 12th International Symposium on Pervasive Systems, Algorithms and Networks. (9-16).

    https://doi.org/10.1109/I-SPAN.2012.8

  • Hussain M, Nadeem A, Khan O, Iqbal S and Salam A. (2012). Evaluating network layer selfish behavior and a method to detect and mitigate its effect in MANETs 2012 15th International Multitopic Conference (INMIC). 10.1109/INMIC.2012.6511441. 978-1-4673-2252-2. (283-289).

    http://ieeexplore.ieee.org/document/6511441/

  • Li Q, Gao W, Zhu S and Cao G. (2012). A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks. 10:8. (1619-1632). Online publication date: 1-Nov-2012.

    https://doi.org/10.1016/j.adhoc.2011.07.007

  • Ma X and Wang L. Game Theory Based Cooperation Incentive Mechanism in Vehicular Ad Hoc Networks. Proceedings of the 2012 International Conference on Management of e-Commerce and e-Government. (127-132).

    https://doi.org/10.1109/ICMeCG.2012.56

  • Boyer S, Robert J, Otrok H and Rousseau C. (2012). An adaptive tit-for-tat strategy for IEEE 802.11 CSMA/CA protocol. International Journal of Security and Networks. 7:2. (95-106). Online publication date: 1-Oct-2012.

    https://doi.org/10.1504/IJSN.2012.050026

  • Malandrino F, Casetti C and Chiasserini C. (2012). Content Discovery and Caching in Mobile Networks with Infrastructure. IEEE Transactions on Computers. 61:10. (1507-1520). Online publication date: 1-Oct-2012.

    https://doi.org/10.1109/TC.2011.216

  • Minhas Q, Mahmood H and Malik H. (2012). Incentive driven cooperation to avoid packet loss in multihop ad hoc networks 2012 International Conference on Emerging Technologies (ICET). 10.1109/ICET.2012.6375452. 978-1-4673-4451-7. (1-6).

    http://ieeexplore.ieee.org/document/6375452/

  • Guo B, Yu Z, Zhou X and Zhang D. Hybrid SN. Proceedings of the 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing. (188-195).

    https://doi.org/10.1109/UIC-ATC.2012.29

  • Li Z and Shen H. (2012). Game-Theoretic Analysis of Cooperation Incentive Strategies in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing. 11:8. (1287-1303). Online publication date: 1-Aug-2012.

    https://doi.org/10.1109/TMC.2011.151

  • Charilas D, Georgilakis K and Panagopoulos A. (2012). ICARUS. Ad Hoc Networks. 10:6. (976-989). Online publication date: 1-Aug-2012.

    https://doi.org/10.1016/j.adhoc.2011.12.010

  • Zhao B and Lui J. (2012). Using contracts to induce cooperation in large scale P2P communication networks. International Journal of Communication Networks and Distributed Systems. 9:1/2. (62-81). Online publication date: 1-Jul-2012.

    https://doi.org/10.1504/IJCNDS.2012.047896

  • Paris S, Martignon F, Filippini I and Capone A. (2012). A truthful auction for access point selection in heterogeneous mobile networks ICC 2012 - 2012 IEEE International Conference on Communications. 10.1109/ICC.2012.6364569. 978-1-4577-2053-6. (3200-3205).

    http://ieeexplore.ieee.org/document/6364569/

  • Zhang G, Yang K, Liu P, Yang X and Ding E. (2012). Resource-exchange based cooperation stimulating mechanism for wireless ad hoc networks ICC 2012 - 2012 IEEE International Conference on Communications. 10.1109/ICC.2012.6363706. 978-1-4577-2053-6. (297-301).

    http://ieeexplore.ieee.org/document/6363706/

  • Guo B, Yu Z, Zhou X and Zhang D. (2012). Opportunistic IoT: Exploring the social side of the internet of things 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 10.1109/CSCWD.2012.6221932. 978-1-4673-1212-7. (925-929).

    http://ieeexplore.ieee.org/document/6221932/

  • Yu Y, Li K, Zhou W and Li P. (2012). Trust mechanisms in wireless sensor networks. Journal of Network and Computer Applications. 35:3. (867-880). Online publication date: 1-May-2012.

    https://doi.org/10.1016/j.jnca.2011.03.005

  • Li H, Wu C, Li Z, Huang W and Lau F. (2012). Stochastic optimal multirate multicast in socially selfish wireless networks IEEE INFOCOM 2012 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2012.6195545. 978-1-4673-0775-8. (172-180).

    http://ieeexplore.ieee.org/document/6195545/

  • Xu Y and Sakurai K. Cooperatively securing network coding against pollution attacks with incentive mechanism. Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. (1-10).

    https://doi.org/10.1145/2184751.2184815

  • Boyer S, Robert J, Rousseau C and Otrok H. (2012). A novel reputation-based Tit-for-Tat strategy for IEEE 802.11 CSMA/CA protocol 2012 IEEE Consumer Communications and Networking Conference (CCNC). 10.1109/CCNC.2012.6181074. 978-1-4577-2071-0. (143-148).

    http://ieeexplore.ieee.org/document/6181074/

  • Kumar G, Titus I and Thekkekara S. (2012). A Comprehensive Overview on Application of Trust and Reputation in Wireless Sensor Network. Procedia Engineering. 10.1016/j.proeng.2012.06.339. 38. (2903-2912).

    http://linkinghub.elsevier.com/retrieve/pii/S1877705812022527

  • Dehnie S. (2011). Reliable cooperative communications: A signal processing approach MILCOM 2011 - 2011 IEEE Military Communications Conference. 10.1109/MILCOM.2011.6127785. 978-1-4673-0081-0. (85-90).

    http://ieeexplore.ieee.org/document/6127785/

  • Li H, Huang W, Wu C, Li Z and Lau F. Utility-Maximizing Data Dissemination in Socially Selfish Cognitive Radio Networks. Proceedings of the 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems. (212-221).

    https://doi.org/10.1109/MASS.2011.28

  • Martignon F, Paris S, Filippini I and Capone A. (2011). Efficient bandwidth allocation in wireless community networks 2011 IFIP Wireless Days (WD). 10.1109/WD.2011.6098174. 978-1-4577-2028-4. (1-6).

    http://ieeexplore.ieee.org/document/6098174/

  • Wang W, Chatterjee M and Kwiat K. Cooperation in Wireless Networks with Unreliable Channels. IEEE Transactions on Communications. 10.1109/TCOMM.2011.081111.100085. 59:10. (2808-2817).

    http://ieeexplore.ieee.org/document/5997284/

  • Mahmoud M and Shen X. (2011). ESIP. IEEE Transactions on Mobile Computing. 10:7. (997-1010). Online publication date: 1-Jul-2011.

    https://doi.org/10.1109/TMC.2010.211

  • Chen T, Wu F and Zhong S. (2011). FITS. IEEE Transactions on Computers. 60:7. (1045-1056). Online publication date: 1-Jul-2011.

    https://doi.org/10.1109/TC.2010.162

  • Ouyang K, Vaidya B and Makrakis D. (2011). A probabilistic-based approach towards trust evaluation using Poisson Hidden Markov Models and Bonus Malus Systems 2011 Ninth Annual International Conference on Privacy, Security and Trust. 10.1109/PST.2011.5971977. 978-1-4577-0584-7. (150-155).

    http://ieeexplore.ieee.org/document/5971977/

  • Hadjichristofi G, Kappos G and Hadjicostis C. (2011). A novel 3-d model for node and system trust 2011 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011). 10.1109/IWCMC.2011.5982531. 978-1-4244-9539-9. (959-966).

    http://ieeexplore.ieee.org/document/5982531/

  • Charilas D, Vassaki S, Panagopoulos A and Constantinou P. (2011). Cooperation Incentives in 4G Networks. Game Theory for Wireless Communications and Networking. 10.1201/b10975-17. (295-314). Online publication date: 23-Jun-2011.

    http://www.crcnetbase.com/doi/10.1201/b10975-17

  • Guan X and Choi B. (2011). Push or Pull?: Toward Optimal Content Delivery ICC 2011 - 2011 IEEE International Conference on Communications. 10.1109/icc.2011.5963299. 978-1-61284-232-5. (1-5).

    http://ieeexplore.ieee.org/document/5963299/

  • Zheng S, Jiang T and Baras J. (2011). A Robust Collaborative Filtering Algorithm Using Ordered Logistic Regression ICC 2011 - 2011 IEEE International Conference on Communications. 10.1109/icc.2011.5962945. 978-1-61284-232-5. (1-6).

    http://ieeexplore.ieee.org/document/5962945/

  • Zheng S, Jiang T and Baras J. (2011). Exploiting Trust Relations for Nash Equilibrium Efficiency in Ad Hoc Networks ICC 2011 - 2011 IEEE International Conference on Communications. 10.1109/icc.2011.5962655. 978-1-61284-232-5. (1-5).

    http://ieeexplore.ieee.org/document/5962655/

  • Guan X, Liu C, Chen M, Chen H and Ohtsuki T. (2011). Internal Threats Avoiding Based Forwarding Protocol in Social Selfish Delay Tolerant Networks ICC 2011 - 2011 IEEE International Conference on Communications. 10.1109/icc.2011.5962592. 978-1-61284-232-5. (1-6).

    http://ieeexplore.ieee.org/document/5962592/

  • Lee P, Liu H and Lui J. (2011). Analyzing credit evolution for credit-based incentive schemes in wireless mesh networks 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). 10.1109/SAHCN.2011.5984937. 978-1-4577-0094-1. (512-520).

    http://ieeexplore.ieee.org/document/5984937/

  • Chen L, Libman L and Leneutre J. (2011). Conflicts and Incentives in Wireless Cooperative Relaying. IEEE Transactions on Parallel and Distributed Systems. 22:5. (758-772). Online publication date: 1-May-2011.

    https://doi.org/10.1109/TPDS.2010.152

  • Liu Y, Li K, Jin Y, Zhang Y and Qu W. (2011). A novel reputation computation model based on subjective logic for mobile ad hoc networks. Future Generation Computer Systems. 27:5. (547-554). Online publication date: 1-May-2011.

    https://doi.org/10.1016/j.future.2010.03.006

  • Zhang C, Zhu X, Song Y and Fang Y. (2011). C4: A new paradigm for providing incentives in multi-hop wireless networks IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2011.5935317. 978-1-4244-9919-9. (918-926).

    http://ieeexplore.ieee.org/document/5935317/

  • Chen T, Wu L, Wu F and Zhong S. Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach. IEEE Transactions on Vehicular Technology. 10.1109/TVT.2010.2093587. 60:2. (566-579).

    http://ieeexplore.ieee.org/document/5640681/

  • Park H, Ratzin R and van der Schaar M. Peer-to-Peer Networks. Streaming Media Architectures, Techniques, and Applications. 10.4018/978-1-61692-831-5.ch011. (262-294).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-831-5.ch011

  • Park S, Aslam B and Zou C. (2011). Long-term reputation system for vehicular networking based on vehicle's daily commute routine 2011 IEEE Consumer Communications and Networking Conference (CCNC). 10.1109/CCNC.2011.5766507. 978-1-4244-8789-9. (436-441).

    http://ieeexplore.ieee.org/document/5766507/

  • Charilas D and Panagopoulos A. (2010). A survey on game theory applications in wireless networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 54:18. (3421-3430). Online publication date: 1-Dec-2010.

    https://doi.org/10.1016/j.comnet.2010.06.020

  • Uddin M, Godfrey B and Abdelzaher T. RELICS. Proceedings of the The 18th IEEE International Conference on Network Protocols. (203-212).

    https://doi.org/10.1109/ICNP.2010.5762769

  • Malandrino F, Casetti C and Chiasserini C. (2010). Discovery and provision of content in mobile networks with infrastructure support 2010 IFIP Wireless Days (WD). 10.1109/WD.2010.5657763. 978-1-4244-9230-5. (1-5).

    http://ieeexplore.ieee.org/document/5657763/

  • Song C and Zhang Q. (2010). Protocols for stimulating packet forwarding in wireless ad hoc networks. IEEE Wireless Communications. 17:5. (50-55). Online publication date: 1-Oct-2010.

    https://doi.org/10.1109/MWC.2010.5601958

  • Ji Z, Yu W and Ray Liu K. (2010). A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation. IEEE Transactions on Mobile Computing. 9:9. (1242-1254). Online publication date: 1-Sep-2010.

    https://doi.org/10.1109/TMC.2010.87

  • Alicherry M and Keromytis A. DIPLOMA. Proceedings of the 2010 Fourth International Conference on Network and System Security. (89-98).

    https://doi.org/10.1109/NSS.2010.27

  • Estiri M and Khademzadeh A. (2010). A theoretical signaling game model for intrusion detection in wireless sensor networks 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS). 10.1109/NETWKS.2010.5624961. 978-1-4244-6704-4. (1-6).

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5624961

  • Dehnie S and Tomasin S. (2010). Detection of selfish nodes in networks using CoopMAC protocol with ARQ. IEEE Transactions on Wireless Communications. 9:7. (2328-2337). Online publication date: 1-Jul-2010.

    https://doi.org/10.1109/TWC.2010.07.091454

  • Yin L, Lu H, Cao Y and Gao J. (2010). Cooperation in delay tolerant networks 2010 2nd International Conference on Signal Processing Systems (ICSPS). 10.1109/ICSPS.2010.5555572. 978-1-4244-6892-8. (V1-202-V1-205).

    http://ieeexplore.ieee.org/document/5555572/

  • Jaramillo J and Srikant R. (2010). A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks. Ad Hoc Networks. 8:4. (416-429). Online publication date: 1-Jun-2010.

    https://doi.org/10.1016/j.adhoc.2009.10.002

  • Wang W, Chatterjee M and Kwiat K. (2010). Attacker Detection Game in Wireless Networks with Channel Uncertainty ICC 2010 - 2010 IEEE International Conference on Communications. 10.1109/ICC.2010.5502667. 978-1-4244-6402-9. (1-5).

    http://ieeexplore.ieee.org/document/5502667/

  • Wang K and Lin C. (2010). SRD Service: A Stochastic Network Calculus Approach for Service Differentiation Analysis ICC 2010 - 2010 IEEE International Conference on Communications. 10.1109/ICC.2010.5502270. 978-1-4244-6402-9. (1-5).

    http://ieeexplore.ieee.org/document/5502270/

  • Estiri M and Khademzadeh A. (2010). A game-theoretical model for intrusion detection in wireless sensor networks 2010 IEEE 23rd Canadian Conference on Electrical and Computer Engineering - CCECE. 10.1109/CCECE.2010.5575157. 978-1-4244-5376-4. (1-5).

    http://ieeexplore.ieee.org/document/5575157/

  • Ashtiani M and Qiu D. (2010). Achieving fair cooperation for multi-hop ad hoc networks 2010 25th Biennial Symposium on Communications. 10.1109/BSC.2010.5472958. 978-1-4244-5709-0. (377-380).

    http://ieeexplore.ieee.org/document/5472958/

  • Zhong S and Wu F. (2010). A collusion-resistant routing scheme for noncooperative wireless ad hoc networks. IEEE/ACM Transactions on Networking. 18:2. (582-595). Online publication date: 1-Apr-2010.

    https://doi.org/10.1109/TNET.2009.2030325

  • Chen T and Zhong S. INPAC. Proceedings of the 29th conference on Information communications. (1828-1836).

    /doi/10.5555/1833515.1833765

  • Li Q, Zhu S and Cao G. Routing in socially selfish delay tolerant networks. Proceedings of the 29th conference on Information communications. (857-865).

    /doi/10.5555/1833515.1833657

  • Mahmoud M and Shen X. Stimulating cooperation in multi-hop wireless networks using cheating detection system. Proceedings of the 29th conference on Information communications. (776-784).

    /doi/10.5555/1833515.1833648

  • Zhao B and Lui J. Cooperation via contracts. Proceedings of the 29th conference on Information communications. (26-30).

    /doi/10.5555/1833515.1833521

  • Wu Y, Tang S, Xu P and Li X. (2010). Dealing with Selfishness and Moral Hazard in Noncooperative Wireless Networks. IEEE Transactions on Mobile Computing. 9:3. (420-434). Online publication date: 1-Mar-2010.

    https://doi.org/10.1109/TMC.2009.142

  • Li B, Wang D, Wang F and Ni Y. (2010). High Quality Sensor Placement for SHM Systems: Refocusing on Application Demands IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5462159. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5462159/

  • Mahmoud M and Shen X. (2010). Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5462145. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5462145/

  • Li Q, Zhu S and Cao G. (2010). Routing in Socially Selfish Delay Tolerant Networks IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5462138. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5462138/

  • Li F, Yang Y and Wu J. (2010). CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks IEEE INFOCOM 2010 - IEEE Conference on Computer Communications. 10.1109/INFCOM.2010.5462113. 978-1-4244-5836-3. (1-9).

    http://ieeexplore.ieee.org/document/5462113/

  • Ayday E and Fekri F. (2010). A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks. 8:2. (181-192). Online publication date: 1-Mar-2010.

    https://doi.org/10.1016/j.adhoc.2009.07.001

  • Alicherry M, Keromytis A and Stavrou A. Evaluating a collaborative defense architecture for MANETs. Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications. (229-234).

    /doi/10.5555/1812598.1812640

  • Alicherry M, Keromytis A and Stavrou A. (2009). Evaluating a collaborative defense architecture for MANETs 2009 3rd International Conference on Internet Multimedia Services Architecture and Application (IMSAA). 10.1109/IMSAA.2009.5439498. 978-1-4244-4792-3. (1-6).

    http://ieeexplore.ieee.org/document/5439498/

  • Dehnie S, Tomasin S and Ghanadan R. (2009). Sequential detection of misbehaving nodes in cooperative networks with HARQ MILCOM 2009 - 2009 IEEE Military Communications Conference. 10.1109/MILCOM.2009.5379949. 978-1-4244-5238-5. (1-6).

    http://ieeexplore.ieee.org/document/5379949/

  • Janzadeh H, Fayazbakhsh K, Dehghan M and Fallah M. (2009). A secure credit-based cooperation stimulating mechanism for MANETs using hash chains. Future Generation Computer Systems. 25:8. (926-934). Online publication date: 1-Sep-2009.

    https://doi.org/10.1016/j.future.2008.12.002

  • Wang W, Chatterjee M and Kwiat K. Cooperation in ad hoc networks with noisy channels. Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks. (547-555).

    /doi/10.5555/1687299.1687361

  • Song C and Zhang Q. COFFEE. Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks. (458-466).

    /doi/10.5555/1687299.1687351

  • Wang B, Wei W, Zeng W and Pattipati K. (2009). Fault Localization Using Passive End-to-End Measurement and Sequential Testing for Wireless Sensor Networks 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 10.1109/SAHCN.2009.5168934. 978-1-4244-2907-3. (1-10).

    http://ieeexplore.ieee.org/document/5168934/

  • Wang W, Chatterjee M and Kwiat K. (2009). Cooperation in Ad Hoc Networks with Noisy Channels 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 10.1109/SAHCN.2009.5168920. 978-1-4244-2907-3. (1-9).

    http://ieeexplore.ieee.org/document/5168920/

  • Song C and Zhang Q. (2009). COFFEE: A Context-Free Protocol for Stimulating Data Forwarding in Wireless Ad Hoc Networks 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 10.1109/SAHCN.2009.5168916. 978-1-4244-2907-3. (1-9).

    http://ieeexplore.ieee.org/document/5168916/

  • Wang C, Feng T, Kim J, Wang G and Zhang W. (2009). Catching Packet Droppers and Modifiers in Wireless Sensor Networks 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. 10.1109/SAHCN.2009.5168914. 978-1-4244-2907-3. (1-9).

    http://ieeexplore.ieee.org/document/5168914/

  • Wang W, Chatterjee M and Kwiat K. (2009). Coexistence with malicious nodes: A game theoretic approach 2009 International Conference on Game Theory for Networks (GameNets). 10.1109/GAMENETS.2009.5137411. 978-1-4244-4176-1. (277-286).

    http://ieeexplore.ieee.org/document/5137411/

  • Song C and Zhang Q. (2009). OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop. Mobile Networks and Applications. 14:2. (178-187). Online publication date: 1-Apr-2009.

    https://doi.org/10.1007/s11036-008-0145-2

  • Mejia M, Peña N, Muñoz J and Esparza O. (2009). A review of trust modeling in ad hoc networks . Internet Research. 10.1108/10662240910927849. 19:1. (88-104). Online publication date: 30-Jan-2009.

    http://www.emeraldinsight.com/doi/10.1108/10662240910927849

  • Alicherry M, Keromytis A and Stavrou A. (2009). Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks. Security and Privacy in Communication Networks. 10.1007/978-3-642-05284-2_3. (41-50).

    http://link.springer.com/10.1007/978-3-642-05284-2_3

  • Yan L and Hailes S. (2008). Optimal forwarding for wireless ad hoc networks with game theory. International Journal of Autonomous and Adaptive Communications Systems. 1:4. (447-464). Online publication date: 1-Nov-2008.

    https://doi.org/10.1504/IJAACS.2008.021491

  • Boukerche A and Ren Y. A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks. (88-95).

    https://doi.org/10.1145/1454609.1454628

  • Koutsopoulos I and Iosifidis G. Distributed resource allocation algorithms for peer-to-peer networks. Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools. (1-10).

    https://doi.org/10.4108/ICST.VALUETOOLS2008.4389

  • Incentive-aware routing in DTNs. Proceedings of the 2008 IEEE International Conference on Network Protocols.

    https://doi.org/10.1109/ICNP.2008.4697042

  • Wang W, Chatterjee M and Kwiat K. (2008). Enforcing cooperation in ad hoc networks with unreliable channel 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS). 10.1109/MAHSS.2008.4660013. 978-1-4244-2574-7. (456-462).

    http://ieeexplore.ieee.org/document/4660013/

  • Antoniadis P, Le Grand B and Dias de Amorim M. (2008). Socially-motivated Wireless Neighborhood Communities 2008 Third International Conference on Communications and Networking in China (CHINACOM). 10.1109/CHINACOM.2008.4685274. 978-1-4244-2373-6. (1336-1341).

    http://ieeexplore.ieee.org/document/4685274/

  • Song C and Zhang Q. OMH. Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. (1-7).

    /doi/10.5555/1535571.1535587