Sciweavers

283 search results - page 54 / 57
» Incentive Networks
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...
NOSSDAV
2010
Springer
13 years 11 months ago
Mesh-based peer-to-peer layered video streaming with taxation
Recent advance in scalable video coding (SVC) makes it possible for users to receive the same video with different qualities. To adopt SVC in P2P streaming, two key design questio...
Hao Hu, Yang Guo, Yong Liu
CCS
2010
ACM
14 years 2 months ago
Region-based BGP announcement filtering for improved BGP security
BGP prefix hijacking is a serious security threat on the Internet. In this paper we propose a region-based BGP announcement filtering scheme (RBF) to improve the BGP security. I...
Fernando Sanchez, Zhenhai Duan
ICC
2007
IEEE
214views Communications» more  ICC 2007»
14 years 1 months ago
Distributed ONS and its Impact on Privacy
— The EPC Network is an industry proposal to build a global information architecture for objects carrying RFID tags with Electronic Product Codes (EPC). A so-called Object Naming...
Benjamin Fabian, Oliver Günther
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 7 months ago
Coalition Formation Games for Collaborative Spectrum Sensing
Abstract--Collaborative Spectrum Sensing (CSS) between secondary users (SUs) in cognitive networks exhibits an inherent tradeoff between minimizing the probability of missing the d...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...