Svetlana Radosavac
Svetlana Radosavac
Fair Isaac Corporation (FICO)
Verified email at fico.com
Title
Cited by
Cited by
Year
Detection and prevention of MAC layer misbehavior in ad hoc networks
AA Cardenas, S Radosavac, JS Baras
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
1712004
A framework for MAC protocol misbehavior detection in wireless networks
S Radosavac, JS Baras, I Koutsopoulos
Proceedings of the 4th ACM workshop on Wireless security, 33-42, 2005
1702005
Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments
AA Cárdenas, S Radosavac, JS Baras
IEEE/ACM Transactions on Networking 17 (2), 605-617, 2008
652008
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
S Radosavac, AA Cárdenas, JS Baras, GV Moustakides
Journal of Computer Security 15 (1), 103-128, 2007
652007
An analytic framework for modeling and detecting access layer misbehavior in wireless networks
S Radosavac, G Moustakides, JS Baras, I Koutsopoulos
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-28, 2008
502008
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ...
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
432007
Performance comparison of detection schemes for MAC layer misbehavior
AA Cárdenas, S Radosavac, JS Baras
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
432007
Method and apparatus for security-risk based admission control
UC Kozat, S Radosavac, J Kempf
US Patent 8,316,428, 2012
342012
Nudge: Intermediaries’ role in interdependent network security
J Grossklags, S Radosavac, AA Cárdenas, J Chuang
International Conference on Trust and Trustworthy Computing, 323-336, 2010
312010
An economic map of cybercrime
A Cárdenas, S Radosavac, J Grossklags, J Chuang, CJ Hoofnagle
TPRC, 2009
302009
Cross-layer attacks in wireless ad hoc networks
S Radosavac, N Benammar, JS Baras
in Proceedings of CISS, 2004
292004
Using insurance to increase internet security
S Radosavac, J Kempf, UC Kozat
Proceedings of the 3rd international workshop on Economics of networked …, 2008
242008
Detection and classification of network intrusions using hidden markov models
S Radosavac
MARYLAND UNIV COLLEGE PARK INST FOR SYSTEMS RESEARCH, 2002
172002
Utilizing social influence in content distribution networks
H Sharara, C Westphal, S Radosavac, UC Kozat
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
162011
Intrusion detection systems
TM Wu
Information Assurance Technology Analysis Center (IATAC) 9, 2009
162009
Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC
S Radosavac, JS Baras
IEEE Communications Magazine 46 (2), 148-154, 2008
162008
Impact of optimal MAC layer attacks on the network layer
S Radosavac, JS Baras, GV Moustakides
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
92006
Method and apparatus for compensating for and reducing security attacks on network entities
S Radosavac, J Kempf, UC Kozat
US Patent App. 12/270,760, 2009
72009
Attacks and Defenses Utilizing Cross-Layer Interactions in MANET
JS Baras, S Radosavac
MARYLAND UNIV COLLEGE PARK INST FOR SYSTEMS RESEARCH, 2004
52004
Short Paper: bufSTAT-a tool for early detection and classification of buffer overflow attacks
S Radosavac, K Seamon, JS Baras
First International Conference on Security and Privacy for Emerging Areas in …, 2005
42005
The system can't perform the operation now. Try again later.
Articles 1–20