• Publications
  • Influence
Modeling the spread of active worms
TLDR
We present a mathematical model, referred to as the Analytical Active Worm Propagation (AAWP) model, which characterizes the propagation of worms that employ random scanning. Expand
ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability
TLDR
We propose ProvChain, an architecture to collect and verify cloud data provenance, by embedding the provenance data into blockchain transactions. Expand
An Effective Architecture and Algorithm for Detecting Worms with Various Scan
TLDR
We propose and evaluate an algorithm to detect the spread of worms using real time traces and simulations. Expand
Profiling Users in GUI Based Systems for Masquerade Detection
TLDR
We present a new framework for creating a unique feature set for user behavior on GUI based systems and use support vector machine (SVM) to classify these feature vectors. Expand
Congestion control and fairness in wireless sensor networks
TLDR
In this paper we propose a distributed congestion control algorithm for tree based communications in wireless sensor networks, that seeks to adaptively assign a fair and efficient transmission rate to each node. Expand
Survivable Virtual Infrastructure Mapping in Virtualized Data Centers
TLDR
In a virtualized data center, survivability can be enhanced by creating redundant Virtual Machines as backup for VMs such that after VM or server failures, affected services can be quickly switched over to backup VMs. Expand
Coexistence with malicious nodes: A game theoretic approach
TLDR
In this paper, we use game theory to study the interactions between a malicious node and a regular node in wireless networks with unreliable channels. Expand
Game Theory for Cyber Security and Privacy
TLDR
In this survey, we review the existing game-theoretic approaches for cyber security and privacy issues, categorizing their application into two classes: cyber physical security, communication security, and privacy. Expand
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
TLDR
The blockchain technology has emerged as an attractive solution to address performance and security issues in distributed systems. Expand
A Game Theoretic Framework for Power Control in Wireless Sensor Networks
TLDR
We apply game theory to solve the power control problem in a CDMA-based distributed sensor network and prove that the system is power stable only if the nodes comply with certain transmit power thresholds. Expand
...
1
2
3
4
5
...