A framework for MAC protocol misbehavior detection in wireless networks S Radosavac, JS Baras, I Koutsopoulos Proceedings of the 4th ACM workshop on Wireless security, 33-42, 2005 | 186 | 2005 |
Detection and prevention of MAC layer misbehavior in ad hoc networks AA Cardenas, S Radosavac, JS Baras Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 181 | 2004 |
Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments AA Cárdenas, S Radosavac, JS Baras IEEE/ACM Transactions on Networking 17 (2), 605-617, 2008 | 78 | 2008 |
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers S Radosavac, AA Cárdenas, JS Baras, GV Moustakides Journal of Computer Security 15 (1), 103-128, 2007 | 74 | 2007 |
Method and apparatus for security-risk based admission control UC Kozat, S Radosavac, J Kempf US Patent 8,316,428, 2012 | 54 | 2012 |
An analytic framework for modeling and detecting access layer misbehavior in wireless networks S Radosavac, G Moustakides, JS Baras, I Koutsopoulos ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-28, 2008 | 52 | 2008 |
Performance comparison of detection schemes for MAC layer misbehavior AA Cárdenas, S Radosavac, JS Baras IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 49 | 2007 |
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ... MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 46 | 2007 |
Nudge: Intermediaries' role in interdependent network security J Grossklags, S Radosavac, AA Cárdenas, J Chuang Proceedings of the 2010 ACM Symposium on Applied Computing, 1879-1880, 2010 | 39 | 2010 |
Cross-layer attacks in wireless ad hoc networks S Radosavac, N Benammar, JS Baras Conference on Information Sciences and Systems 4, 2004 | 37 | 2004 |
An economic map of cybercrime A Cárdenas, S Radosavac, J Grossklags, J Chuang, CJ Hoofnagle TPRC, 2009 | 34 | 2009 |
Using insurance to increase internet security S Radosavac, J Kempf, UC Kozat Proceedings of the 3rd international workshop on Economics of networked …, 2008 | 24 | 2008 |
Detection and classification of network intrusions using hidden markov models S Radosavac, JS Baras University of Maryland, College Park, 2002 | 20 | 2002 |
Utilizing social influence in content distribution networks H Sharara, C Westphal, S Radosavac, UC Kozat 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 18 | 2011 |
Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC S Radosavac, JS Baras IEEE Communications Magazine 46 (2), 148-154, 2008 | 18 | 2008 |
Method and apparatus for compensating for and reducing security attacks on network entities S Radosavac, J Kempf, UC Kozat US Patent App. 12/270,760, 2009 | 10 | 2009 |
Impact of optimal MAC layer attacks on the network layer S Radosavac, JS Baras, GV Moustakides Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006 | 8 | 2006 |
Short Paper: bufSTAT-a tool for early detection and classification of buffer overflow attacks S Radosavac, K Seamon, JS Baras First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 7 | 2005 |
Attacks and Defenses Utilizing Cross-Layer Interactions in MANET JS Baras, S Radosavac workshop on Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc …, 2004 | 5 | 2004 |
Intrusion detection for defense at the MAC and routing layers of wireless networks S Radosavac University of Maryland, College Park, 2007 | 2 | 2007 |