Sciweavers

240 search results - page 4 / 48
» Malicious Users in Unstructured Networks
Sort
View
GLOBECOM
2009
IEEE
13 years 5 months ago
CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing
Collaborative spectrum sensing in cognitive radio networks has been proposed as an efficient way to improve the performance of primary users detection. In collaborative spectrum se...
Wenkai Wang, Husheng Li, Yan Sun, Zhu Han
CCS
2004
ACM
14 years 25 days ago
Pong-cache poisoning in GUESS
This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources resilient to coord...
Neil Daswani, Hector Garcia-Molina
ICASSP
2011
IEEE
12 years 11 months ago
Cooperative sensing in cognitive networks under malicious attack
Abstract—This paper considers cooperative sensing in cognitive networks under Spectrum Sensing Data Falsification attack (SSDF) in which malicious users can intentionally send f...
Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li
SAC
2010
ACM
14 years 2 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
INFOCOM
2007
IEEE
14 years 1 months ago
On Node Isolation Under Churn in Unstructured P2P Networks with Heavy-Tailed Lifetimes
— Previous analytical studies [12], [18] of unstructured P2P resilience have assumed exponential user lifetimes and only considered age-independent neighbor replacement. In this ...
Zhongmei Yao, Xiaoming Wang, Derek Leonard, Dmitri...