As systems become more distributed, they are vulnerable to new forms of attack. An adversary could seize control of several nodes in a network and reprogram them, unbeknownst to the rest of the network. Strategies are needed that can ensure robust performance in the presence of these sorts of attacks. This thesis studies the adversarial problem in three scenarios. First is the problem of network coding, in which a source seeks to send data to a destination through a network of intermediate nodes that may perform arbitrarily complicated coding functions. When an adversary controls nodes in the network, achievable rates and upper bounds on capacity are found, and Polytope Codes are introduced, which are a nonlinear class of codes specially de...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
It is well known that cyber security plays a critical role in ensuring functionality and reliability...
The network communication scenario where one or more receivers request all the information transmitt...
As systems become more distributed, they are vulnerable to new forms of attack. An adversary could s...
The threat of malicious network attacks has become significant ever since networking became pervasiv...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Network coding substantially increases network throughput. But since it involves mixing of informati...
In this dissertation, we consider the problem of collaborating a network of nodes to accomplish an o...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract — Network coding substantially increases net-work throughput. But since it involves mixing ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...
The growth of information and communication technology is constantly revolutionizing various domains...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) ...
Abstract—The network communication scenario where one or more receivers request all the information ...
This dissertation presents algorithms for achieving communication in the presence of adversarial att...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
It is well known that cyber security plays a critical role in ensuring functionality and reliability...
The network communication scenario where one or more receivers request all the information transmitt...
As systems become more distributed, they are vulnerable to new forms of attack. An adversary could s...
The threat of malicious network attacks has become significant ever since networking became pervasiv...
Network coding substantially increases network throughput. But since it involves mixing of informati...
Network coding substantially increases network throughput. But since it involves mixing of informati...
In this dissertation, we consider the problem of collaborating a network of nodes to accomplish an o...
This dissertation provides strong resilience techniques applying to general networks. Examples of im...
Abstract — Network coding substantially increases net-work throughput. But since it involves mixing ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2...
The growth of information and communication technology is constantly revolutionizing various domains...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2) ...
Abstract—The network communication scenario where one or more receivers request all the information ...
This dissertation presents algorithms for achieving communication in the presence of adversarial att...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
It is well known that cyber security plays a critical role in ensuring functionality and reliability...
The network communication scenario where one or more receivers request all the information transmitt...