Svetlana Radosavac

According to our database1, Svetlana Radosavac authored at least 15 papers between 2004 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Utilizing Social Influence in Content Distribution Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Nudge: intermediaries' role in interdependent network security.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Evaluation of detection algorithms for MAC layer misbehavior: theory and experiments.
IEEE/ACM Trans. Netw., 2009

On the Use of Admission Control for Better Quality of Security.
Proceedings of IEEE International Conference on Communications, 2009

2008
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks.
ACM Trans. Inf. Syst. Secur., 2008

Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC.
IEEE Commun. Mag., 2008

Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference.
Proceedings of the 3rd International ICST Conference on Performance Evaluation Methodologies and Tools, 2008

Using insurance to increase internet security.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

2007
Intrusion Detection for Defense at the MAC and Routing Layers of Wireless Networks.
PhD thesis, 2007

Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers.
J. Comput. Secur., 2007

Performance Comparison of Detection Schemes for MAC Layer Misbehavior.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Impact of optimal MAC layer attacks on the network layer.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

2005
A framework for MAC protocol misbehavior detection in wireless networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Short Paper: bufSTAT - a tool for early detection and classification of buffer overflow attacks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2004
Detection and prevention of MAC layer misbehavior in ad hoc networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004


  Loading...