[C1] |
S. Radosavac and J. S. Baras, "Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference ", accepted for publication at the Third International Conference on Performance Evaluation Methodologies and Tools (Valuetools 2008), October 20-24 2008, Athens, Greece
|
[C2] |
J. S. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas and R. Gopaul, "Intrusion Detection System Resiliency to Byzantine attacks: the case study of wormholes in OLSR ", IEEE MILCOM 2007: Proceedings of the IEEE Military Communications Conference 2007, pp. 1 - 7, October 2007, Orlando, FL [pdf] [bib]
|
[C3] |
A. A. Cárdenas, S. Radosavac and J. S. Baras, "Performance Comparison of Detection Schemes for MAC Layer Misbehavior ", IEEE INFOCOM 2007: Proceedings of the 26th Annual IEEE Conference on Computer Communications, pp. 1496 - 1504, 6-12 May 2007, Anchorage, AK [pdf] [bib]
|
[C4] |
S. Radosavac, J. S. Baras and G. V. Moustakides, "Impact of Optimal MAC Layer Attacks on the Network Layer", SASN '06: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135-146, October 2006. [pdf] [bib]
|
[C5] |
S. Radosavac and J. S. Baras, "Detection and Performance Analysis of Greedy Individual and Colluding MAC Layer Attackers",
15th IST Mobile & Wireless Summit, Myconos, Greece, June 2006. [pdf] [bib]
|
[C6] |
S. Radosavac, J. S. Baras and I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks", WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pp. 33-42, Cologne, Germany, September 2, 2005. [pdf] [bib]
|
[C7] |
S. Radosavac, K. K. Seamon and J. S. Baras, "bufSTAT - a tool for early detection and classification of buffer overflow attacks", First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 231-233, Athens, Greece, 5-9 September, 2005. [pdf] [bib]
|
[C8] |
A. A. Cárdenas, S. Radosavac and J. S. Baras, "Detection and prevention of MAC layer misbehavior in ad hoc networks", SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 17-22, Washington, DC, October 25, 2004. [pdf] [bib]
|
[C9] |
J. S. Baras and S. Radosavac "Attacks and Defenses Utilizing Cross-Layer Interactions in MANET" , Workshop on Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management, June 2–3, 2004, Naval Research Laboratory, Washington, DC [ppt]
|
[C10] |
S. Radosavac, N. Benammar and J. S. Baras, "Cross-layer attacks in wireless ad hoc networks", Proceedings of 38th Conference on Information Sciences and Systems (CISS), pages 1266-1271, Princeton, March 18, 2004. [pdf] [bib]
|
[C11] |
S. Radosavac and J. S. Baras, "Detection and Classification of Network Intrusions using Hidden Markov Models", 37th Conference on Information Sciences and Systems (CISS), Baltimore, March 2003. [pdf] [bib]
|
[C12] |
S. Radosavac, S. Wu and C. Bonnet, "Adaptive power-aware metric for Mobile Ad-hoc Networks", WTC2002 (XVIII World Telecommunications Congress), Paris, France, 22-27 September 2002. [abstract] |