Mohammad Hossein Manshaei
Mohammad Hossein Manshaei
Verified email at - Homepage
Cited by
Cited by
Game theory meets network security and privacy
M Manshaei, Q Zhu, T Alpcan, T Basar, JP Hubaux
ACM Computing Surveys 45 (3), 2013
IEEE 802.11 rate adaptation: a practical approach
M Lacage, MH Manshaei, T Turletti
Proceedings of the 7th ACM international symposium on Modeling, analysis and …, 2004
On non-cooperative location privacy: a game-theoretic analysis
J Freudiger, MH Manshaei, JP Hubaux, DC Parkes
Proceedings of the 16th ACM conference on Computer and communications …, 2009
On wireless social community networks
MH Manshaei, J Freudiger, M Félegyházi, P Marbach, JP Hubaux
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1552-1560, 2008
Revocation games in ephemeral networks
M Raya, MH Manshaei, M Félegyházi, JP Hubaux
Proceedings of the 15th ACM conference on Computer and communications …, 2008
On the age of pseudonyms in mobile ad hoc networks
J Freudiger, MH Manshaei, JY Le Boudec, JP Hubaux
2010 Proceedings IEEE INFOCOM, 1-9, 2010
Non-cooperative location privacy
J Freudiger, MH Manshaei, JP Hubaux, DC Parkes
IEEE Transactions on Dependable and Secure Computing 10 (2), 84-98, 2012
An evolutionary game model for analysis of rumor propagation and control in social networks
M Askarizadeh, BT Ladani, MH Manshaei
Physica A: statistical mechanics and its applications 523, 21-39, 2019
MMP–TIMP interactions in cancer invasion: An evolutionary game-theoretical framework
JS Sartakhti, MH Manshaei, M Sadeghi
Journal of theoretical biology 412, 17-26, 2017
A game-theoretic analysis of shard-based permissionless blockchains
MH Manshaei, M Jadliwala, A Maiti, M Fooladgar
IEEE Access 6, 78100-78112, 2018
Performance analysis of the IEEE 802.11 MAC and physical layer protocol
MH Manshaei, GR Cantieni, C Barakat, T Turletti
Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005
: A Peer-to-Peer Privacy Preserving Query Service for Location-Based Mobile Applications
M Ghaffari, N Ghadiri, MH Manshaei, MS Lahijani
IEEE Transactions on Vehicular Technology 66 (10), 9458-9469, 2017
Resource allocation for machine-to-machine communications with unmanned aerial vehicles
MN Soorki, M Mozaffari, W Saad, MH Manshaei, H Saidi
2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016
Secure and private data aggregation for energy consumption scheduling in smart grids
MA Rahman, MH Manshaei, E Al-Shaer, M Shehab
IEEE Transactions on Dependable and Secure Computing 14 (2), 221-234, 2015
Tracking games in mobile networks
M Humbert, MH Manshaei, J Freudiger, JP Hubaux
Decision and Game Theory for Security: First International Conference …, 2010
A game-theoretic approach for deceiving remote operating system fingerprinting
MA Rahman, MH Manshaei, E Al-Shaer
2013 IEEE Conference on Communications and Network Security (CNS), 73-81, 2013
CLARA: closed-loop adaptive rate allocation for IEEE 802.11 wireless LANs
C Hoffmann, H Manshaei, T Turletti
2005 International Conference on Wireless Networks, Communications and …, 2005
A dynamic bayesian security game framework for strategic defense mechanism design
S Farhang, MH Manshaei, MN Esfahani, Q Zhu
Decision and Game Theory for Security: 5th International Conference, GameSec …, 2014
Strategic defense against stealthy link flooding attacks: A signaling game approach
A Aydeger, MH Manshaei, MA Rahman, K Akkaya
IEEE Transactions on Network Science and Engineering 8 (1), 751-764, 2021
Ad-blocking games: Monetizing online content under the threat of ad avoidance
N Vratonjic, MH Manshaei, J Grossklags, JP Hubaux
The economics of information security and privacy, 49-73, 2013
The system can't perform the operation now. Try again later.
Articles 1–20