conference

R. Biswas, J. Wu and Y. Chen, “Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109/RWS47064.2019.8972010.

Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter Download PDF    IEEEexplore Link   Abstract: A distributed denial-of-service (DDoS) attack is a cyber-attack in which multiple attackers send out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests. In this paper, …

R. Biswas, J. Wu and Y. Chen, “Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 64-70, doi: 10.1109/RWS47064.2019.8972010. Read More »

R. Biswas, J. Wu and A. Srinivasan, “Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109/RWS47064.2019.8972008.

Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack Download PDF   IEEEexplore Link   Abstract: In a denial-of-service (DoS) attack, the attacker sends out a huge number of requests to exhaust the capacity of a server. The victim cannot serve incoming requests and then DoS occurs. When the attacker stops sending requests, the victim gets …

R. Biswas, J. Wu and A. Srinivasan, “Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2019 Resilience Week (RWS), San Antonio, TX, USA, 2019, pp. 57-63, doi: 10.1109/RWS47064.2019.8972008. Read More »

R. Biswas, J. Wu and X. Li, “A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,” 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109/Sarnoff47838.2019.9067822.

A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks Download PDF   IEEEexplore Link   Abstract: Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses …

R. Biswas, J. Wu and X. Li, “A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks,” 2019 IEEE 40th Sarnoff Symposium, Newark, NJ, USA, 2019, pp. 1-6, doi: 10.1109/Sarnoff47838.2019.9067822. Read More »

R. Biswas, J. Wu, W. Chang and P. Ostovari, “Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack,” 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9013985.

Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack Download PDF   IEEEexplore Link   Abstract: A transit-link distributed denial-of- service (DDoS) attack is a special attack in which the attacker sends out a huge number of requests to exhaust the capacity of a link on the path the traffic comes to a server. As a …

R. Biswas, J. Wu, W. Chang and P. Ostovari, “Optimal Filter Assignment Policy against Transit-Link Distributed Denial-of-Service Attack,” 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 2019, pp. 1-6, doi: 10.1109/GLOBECOM38437.2019.9013985. Read More »

R. Biswas, J. Wu and X. Du, “Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761089.

Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks Download PDF   IEEEexplore Link Abstract: Cognitive radio networks (CRNs), offering novel network architecture for utilizing spectrum, have attracted significant attention in recent years. In CRNs, secondary users (SUs) first determine the status of a channel; if it is free, they start transmitting. If …

R. Biswas, J. Wu and X. Du, “Mitigation of the Spectrum Sensing Data Falsifying Attack in Cognitive Radio Networks,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761089. Read More »

R. Biswas and J. Wu, “Co-Existence of LTE-U and Wi-Fi with Direct Communication,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761064.

Co-Existence of LTE-U and Wi-Fi with Direct Communication Abstract: One of the most prominent cellular technologies, Long Term Evolution (LTE), is currently operating on some 800MHz, 2GHz, and 3.5GHz licensed bands. Wi-Fi is currently operating on 2.5GHz and 5GHz unlicensed bands. The declaration stating that 5GHz bands are unlicensed enables LTE to operate on 5GHz …

R. Biswas and J. Wu, “Co-Existence of LTE-U and Wi-Fi with Direct Communication,” ICC 2019 – 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6, doi: 10.1109/ICC.2019.8761064. Read More »

R. Biswas and J. Wu, “Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109/PADSW.2018.8644584.

Title:  Filter Assignment Policy Against Distributed Denial-of-Service Attack   Abstract: A denial-of-service (DoS) attack is a cyber-attack in which the attacker sends out a huge number of requests to exhaust the capacity of a server, so that it can no longer serve incoming requests and DoS occurs. The most devastating distributed DoS attack is performed …

R. Biswas and J. Wu, “Filter Assignment Policy Against Distributed Denial-of-Service Attack,” 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Singapore, Singapore, 2018, pp. 537-544, doi: 10.1109/PADSW.2018.8644584. Read More »