On detecting malicious behaviors in interactive networks: Algorithms and analysis
暂无分享,去创建一个
[1] John C. S. Lui,et al. Mathematical Modeling of Advertisement and Influence Spread in Social Networks , 2009 .
[2] John C. S. Lui,et al. Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[3] Reza Curtmola,et al. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.
[4] Eli Berger. Dynamic Monopolies of Constant Size , 2001, J. Comb. Theory, Ser. B.
[5] Athina Markopoulou,et al. Locating Byzantine Attackers in Intra-Session Network Coding Using SpaceMac , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).
[6] Robert Tappan Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.
[7] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[8] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[9] Sachin Katti,et al. Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.
[10] Tracey Ho,et al. Byzantine Modification Detection in Multicast Networks With Random Network Coding , 2008, IEEE Transactions on Information Theory.
[11] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[12] Prithula Dhungel,et al. The pollution attack in P2P live video streaming: measurement results and defenses , 2007, P2P-TV '07.
[13] John C. S. Lui,et al. Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks , 2011, 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN).
[14] Donald F. Towsley,et al. On distinguishing between Internet power law topology generators , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[15] John C. S. Lui,et al. DCAR: Distributed Coding-Aware Routing in Wireless Networks , 2010, IEEE Trans. Mob. Comput..
[16] Sachin Katti,et al. The Importance of Being Opportunistic: Practical Network Coding for Wireless Environments , 2005 .
[17] John C. S. Lui,et al. Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems , 2010, Perform. Evaluation.
[18] Robert Morris,et al. Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM 2004.
[19] C. Fragouli,et al. On Locating Byzantine Attackers , 2008, 2008 Fourth Workshop on Network Coding, Theory and Applications.
[20] Tracey Ho,et al. On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[21] S Meenatchi. Distributed Coding Aware-Routing in Wireless Networks , 2012 .
[22] John C. S. Lui,et al. On Modeling Product Advertisement in Large-Scale Online Social Networks , 2012, IEEE/ACM Transactions on Networking.
[23] D. Peleg. Local Majority Voting, Small Coalitions and Controlling Monopolies in Graphs: A Review , 1996 .
[24] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..