Participatory sensing
This paper introduces the concept of participatory sensing, which tasks everyday mobile
devices, such as cellular phones, to form interactive, participatory sensor networks that …
devices, such as cellular phones, to form interactive, participatory sensor networks that …
[PDF][PDF] Profiling and Clustering Internet Hosts.
Identifying groups of Internet hosts with a similar behavior is very useful for many
applications of Internet security control, such as DDoS defense, worm and virus detection …
applications of Internet security control, such as DDoS defense, worm and virus detection …
Ranking-based optimal resource allocation in peer-to-peer networks
This paper presents a theoretic framework of optimal resource allocation and admission
control for peer-to-peer networks. Peer's behavioral rankings are incorporated into the …
control for peer-to-peer networks. Peer's behavioral rankings are incorporated into the …
Wireless urban sensing systems
M Srivastava, M Hansen, J Burke, A Parker, S Reddy… - 2006 - escholarship.org
The creation over the past decade of unanticipated applications of the Internet, such as web
services, peer-to-peer file sharing, networked gaming, podcasting, and voice telephony, is …
services, peer-to-peer file sharing, networked gaming, podcasting, and voice telephony, is …
Building accountability into the future Internet
J Mirkovic, P Reiher - 2008 4th Workshop on Secure Network …, 2008 - ieeexplore.ieee.org
This paper proposes a future Internet architecture whose security foundations prevent
todaypsilas major threats-IP spoofing, distributed denial-of-service attacks, distributed …
todaypsilas major threats-IP spoofing, distributed denial-of-service attacks, distributed …
[PDF][PDF] Fighting coordinated attackers with cross-organizational information sharing
In this paper we propose an architecture for using crossorganization information sharing to
identify members of a group of hosts enslaved for malicious purposes on the Internet. We …
identify members of a group of hosts enslaved for malicious purposes on the Internet. We …
Primed: community-of-interest-based ddos mitigation
P Verkaik, O Spatscheck, J Van der Merwe… - Proceedings of the …, 2006 - dl.acm.org
Most existing distributed denial-of-service (DDoS) mitigation proposals are reactive in
nature, ie, they are deployed to limit the damage caused by attacks after they are detected …
nature, ie, they are deployed to limit the damage caused by attacks after they are detected …
Rendering unto cæsar the things that are cæsar's: Complex trust models and human understanding
In this position paper we examine some of the aspects of trust models, deployment, use and
'misuse,'and present a manifesto for the application of computational trust in sociotechnical …
'misuse,'and present a manifesto for the application of computational trust in sociotechnical …
On the resilience of network-based moving target defense techniques against host profiling attacks
Researchers propose Moving Target Defense (MTD) strategies for networking
infrastructures as a countermeasure to impede attackers from identifying and exploiting …
infrastructures as a countermeasure to impede attackers from identifying and exploiting …
Viable network intrusion detection in high-performance environments
R Sommer - 2005 - mediatum.ub.tum.de
Network intrusion detection systems (NIDS) continuously monitor network traffic for
malicious activity, raising alerts when they detect attacks. However, high-performance Gbps …
malicious activity, raising alerts when they detect attacks. However, high-performance Gbps …