Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
Mix-Zones for Location Privacy in Vehicular Networks
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions by periodically broadcast safety messages providing preciseposition information to vehicles.
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks
- M. Félegyházi, M. Cagalj, S. S. Bidokhti, J. Hubaux
- Computer ScienceIEEE INFOCOM - 26th IEEE International…
- 1 May 2007
This paper studies the existence of Nash equilibria in a static game and concludes that, in spite of the non-cooperative behavior of such devices, their channel allocation results in a load-balancing solution.
Game Theory in Wireless Networks: A Tutorial
This tutorial carefully explains how situations of this kind can be modelled by making use of game theory, and introduces the most fundamental concepts of non-cooperative game theory.
Click Trajectories: End-to-End Analysis of the Spam Value Chain
- Kirill Levchenko, Andreas Pitsillidis, S. Savage
- Computer ScienceIEEE Symposium on Security and Privacy
- 22 May 2011
This paper quantifies the full set of resources employed to monetize spam email -- including naming, hosting, payment and fulfillment -- using extensive measurements of three months of diverse spam data, broad crawling of naming and hosting infrastructures, and over 100 purchases from spam-advertised sites.
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
It is concluded that in static ad hoc networks where the relationships between the nodes are likely to be stab le-cooperation needs to be encouraged, and a model based on game theory and graph theory is proposed to investigate equilibrium conditions of packet forwarding strategies.
The Cousins of Stuxnet: Duqu, Flame, and Gauss
This paper presents the analysis of Duqu, an information-collecting malware sharing striking similarities with Stuxnet, and the newest member of the family, called Gauss, whose unique feature is that one of its modules is encrypted such that it can only be decrypted on its target system.
On Wireless Social Community Networks
- M. Manshaei, J. Freudiger, M. Félegyházi, P. Marbach, J. Hubaux
- Computer ScienceIEEE INFOCOM - The 27th Conference on Computer…
- 13 April 2008
This paper shows how the evolution of social community networks depends on their initial coverage, the subscription fee, and the user preferences for coverage, and concludes that by using an efficient static or dynamic pricing strategy, the wireless social community can obtain a high coverage.
On the Potential of Proactive Domain Blacklisting
The potential of leveraging properties inherent to domain registrations and their appearance in DNS zone files to predict the malicious use of domains proactively is explored, using only minimal observation of known-bad domains to drive inference.
Competitive Cyber-Insurance and Internet Security
Although cyber-insurance improves user welfare, in general, competitive cyber- Insurers fail to improve network security.
Duqu: Analysis, Detection, and Lessons Learned
A number of issues that were learned, observed, or identified during the Duqu analysis project concerning the problems of preventing, detecting, and handling targeted malware attacks are discussed; it is believed that solving these issues represents a great challenge to the system.