October 17, 2014

Risk-Aware Mitigation for MANET Routing Attacks | FTJ1215

Risk-Aware Mitigation for MANET Routing Attacks : IEEE 2012 Abstract: Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature […]
October 17, 2014

Privacy- and Integrity-Preserving Range Queries in Sensor Networks | FTJ1214

Privacy- and Integrity-Preserving Range Queries in Sensor Networks : IEEE 2012 Abstract: The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier […]
October 17, 2014

Packet-Hiding Methods for Preventing Selective Jamming Attacks | FTJ1213

Packet-Hiding Methods for Preventing Selective Jamming Attacks : IEEE 2012 Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically […]
October 17, 2014

Online Modeling of Proactive Moderation System for Auction Fraud Detection | FTJ1212

Online Modeling of Proactive Moderation System for Auction Fraud Detection : IEEE 2012 Abstract: We consider the problem of building online machine-learned models for detecting auction […]
October 17, 2014

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks | FTJ1211

On the Security of a Ticket-Based Anonymity System with Traceability Property in Wireless Mesh Networks : IEEE 2012 Abstract: In 2011, Sun et al. [5] proposed […]