This dissertation provides strong resilience techniques applying to general networks. Examples of important networks are private wired networks connecting large datacenters, overlay topology networks delivering live television broadcasts, and wireless mesh networks rapidly set up after a disaster to replace existing damaged infrastructure. Given the trends of increased reliance on networks and capabilities of attackers, network security is vital to national security. Network attacks can be characterized along the two dimensions of access and motivation. Attacker access can be either as an insider or outsider. An insider has more capabilities of having full control of some routing nodes. Attacker motivation can be targeting confidentiality, ...
generating function Supplementarymaterial for this article is available online The robustness of com...
Preventing the success of active attacks is of essential importance for network coding since even th...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The main focus of this paper is the resilience of communication protocols for data gathering in dist...
International audienceThis paper focuses on the security and reliability issues of communication pro...
Traditional network routing protocol exhibits high statics and singleness, which provide significant...
In networks such as the IP-based networks that run the Internet, nodes trust one another to properly...
This document is a research work of a Doctorate in Information Technology and Communications of ITES...
In opportunistic networks, due to node mobility and sporadic connectivity, disconnection and network...
Abstract Much of our commerce and traveling depend on the efficient op-eration of large scale networ...
As systems become more distributed, they are vulnerable to new forms of attack. An adversary could s...
Network Coding is a new possibility to transmit data through a network. By combining different packe...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Abstract: Network robustness and network reliability are important issues in the design of Internet ...
Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to...
generating function Supplementarymaterial for this article is available online The robustness of com...
Preventing the success of active attacks is of essential importance for network coding since even th...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
The main focus of this paper is the resilience of communication protocols for data gathering in dist...
International audienceThis paper focuses on the security and reliability issues of communication pro...
Traditional network routing protocol exhibits high statics and singleness, which provide significant...
In networks such as the IP-based networks that run the Internet, nodes trust one another to properly...
This document is a research work of a Doctorate in Information Technology and Communications of ITES...
In opportunistic networks, due to node mobility and sporadic connectivity, disconnection and network...
Abstract Much of our commerce and traveling depend on the efficient op-eration of large scale networ...
As systems become more distributed, they are vulnerable to new forms of attack. An adversary could s...
Network Coding is a new possibility to transmit data through a network. By combining different packe...
The best efforts of the computer security community have not eliminated software with hidden attacka...
Abstract: Network robustness and network reliability are important issues in the design of Internet ...
Our dependence on networks – be they infrastructure, economic, social or others – leaves us prone to...
generating function Supplementarymaterial for this article is available online The robustness of com...
Preventing the success of active attacks is of essential importance for network coding since even th...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...