Sciweavers

222 search results - page 10 / 45
» Equilibria for Networks with Malicious Users
Sort
View
JSAC
2006
117views more  JSAC 2006»
13 years 7 months ago
A scalable network resource allocation mechanism with bounded efficiency loss
The design of pricing mechanisms for network resource allocation has two important objectives: 1) a simple and scalable end-to-end implementation and 2) efficiency of the resulting...
Ramesh Johari, John N. Tsitsiklis
GLOBECOM
2010
IEEE
13 years 5 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi
PAM
2007
Springer
14 years 1 months ago
A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, w...
Soshant Bali, Sridhar Machiraju, Hui Zang, Victor ...
ACMSE
2006
ACM
13 years 9 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
SEMWEB
2004
Springer
14 years 22 days ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...