Author image not provided
 Svetlana Radosavac

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.86
Citation Count82
Publication count14
Publication years2004-2010
Available for download8
Average downloads per article596.50
Downloads (cumulative)4,772
Downloads (12 Months)93
Downloads (6 Weeks)6
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


14 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 14 of 14
Sort by:

1
June 2010 TRUST'10: Proceedings of the 3rd international conference on Trust and trustworthy computing
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

By employing an interdependent security game-theoretic framework, we study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security and trustworthiness of the overall system. We discuss two different forms of intervention: rebates in combination with penalties (pay for outcome) and cost-subsidies (pay ...
Keywords: enhancing trust and security with end users, security economics, internet service provider incentives

2 published by ACM
March 2010 SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 29,   Downloads (Overall): 131

Full text available: PDFPDF
By employing an interdependent security game-theoretic framework, we study how individual Internet Service Providers can coordinate the investment decisions of end users to improve the security of the overall system. We study two different forms of intervention: rebates in combination with penalties (pay for outcome) and costsubsidies (pay for effort).
Keywords: security economics, internet service provider incentives

3
June 2009 ICC'09: Proceedings of the 2009 IEEE international conference on Communications
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0

We propose an admission control policy that admits users into a public access network as soon as possible while limiting the overall security impact on the network and other users. In our model, each user has a particular reputation level when first requesting network access. Before admitting a user into ...

4
April 2009 IEEE/ACM Transactions on Networking (TON): Volume 17 Issue 2, April 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 352

Full text available: PDFPDF
We revisit the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the Sequential Probability Ratio Test (SPRT). Our evaluation is carried out in four steps. We first derive a new analytical formulation of the SPRT that ...
Keywords: IEEE 802.11 MAC, DOMINO, CUSUM, SPRT, intrusion detection, misbehavior

5
October 2008 ValueTools '08: Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
Publisher: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 1,   Downloads (Overall): 27

Full text available: PdfPdf
In this work we evaluate the impact of interference caused by concurrent transmissions of neighboring stations on the performance of quickest detection schemes for detection of back-off misbehavior in the IEEE 802.11 MAC. We evaluate the trade-offs that both the adversary and the detector face under such conditions using a ...

6 published by ACM
August 2008 NetEcon '08: Proceedings of the 3rd international workshop on Economics of networked systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 18,   Downloads (Overall): 451

Full text available: PDFPDF
Managing security risks in the Internet has so far mostly involved methods to reduce the risks and the severity of the damages. Those methods reduce but do not eliminate risk, and the question remains on how to handle the residual risk. Current schemes applied by Internet Service Providers (ISPs) penalize ...
Keywords: ddos, incentive, security, insurance, risk transfer, economy, correlated risk

7 published by ACM
July 2008 ACM Transactions on Information and System Security (TISSEC): Volume 11 Issue 4, July 2008
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 621

Full text available: PDFPDF
The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. In this work we propose a novel framework for detection of intelligent adaptive adversaries in the ...
Keywords: min-max robust detection, Wireless networks, protocol misbehavior, MAC layer

8
February 2008 IEEE Communications Magazine: Volume 46 Issue 2, February 2008
Publisher: IEEE Press
Bibliometrics:
Citation Count: 4

The widespread deployment of wireless networks and hot spots that employ the IEEE 802.11 technology has forced network designers to put emphasis on the importance of ensuring efficient and fair use of network resources. In order to be able to evaluate the performance of the adversary, we define a set ...

9
May 2007 Proceedings of the IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

This paper revisits the problem of detecting greedy behavior in the IEEE 802.11 MAC protocol by evaluating the performance of two previously proposed schemes: DOMINO and the sequential probability ratio test (SPRT). The evaluation is carried out in four steps. We first derive a new analytical formulation of the SPRT ...

10
January 2007 Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks: Volume 15 Issue 1, January 2007
Publisher: IOS Press
Bibliometrics:
Citation Count: 11

Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the problem of detection and prevention of node misbehavior at the MAC layer, focusing on ...
Keywords: security, IEEE 802.11, MAC layer, intrusion detection, Ad hoc networks, back-off manipulation

11 published by ACM
October 2006 SASN '06: Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 5,   Downloads (Overall): 643

Full text available: PDFPDF
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existing links. In this work we consider node misbehavior in the Medium Access Control (MAC) layer and its effects on the performance of the network ...
Keywords: minmax robust detection, protocol misbehavior, Ad-hoc networks, MAC layer, cross-layer

12
September 2005 SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

Buffer overflows constitute by far the most frequently encountered class of attacks against computer systems. In this paper we introduce a tool, termed bufSTAT that achieves a low probability of false alarm and issues early attack warnings. BufSTAT relies on Finite State Machines (FSM) for attack modeling and can detect ...

13 published by ACM
September 2005 WiSe '05: Proceedings of the 4th ACM workshop on Wireless security
Publisher: ACM
Bibliometrics:
Citation Count: 23
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 1,015

Full text available: PDFPDF
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main reasons for the growing interest in the issue of compliance to protocol rules. Reliable and timely detection of deviation from legitimate protocol operation is ...
Keywords: wireless networks, minmax robust detection, protocol misbehavior, MAC layer

14 published by ACM
October 2004 SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Publisher: ACM
Bibliometrics:
Citation Count: 19
Downloads (6 Weeks): 0,   Downloads (12 Months): 10,   Downloads (Overall): 1,532

Full text available: PDFPDF
Selfish behavior at the MAC layer can have devastating side effects on the performance of wireless networks, similar to the effects of DoS attacks. In this paper we focus on the prevention and detection of the manipulation of the backoff mechanism by selfish nodes in 802.11. We first propose an ...
Keywords: ad hoc networks, MAC layer, intrusion detection



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us