Now showing items 1-10 of 16
The Cyber Losers
A Multi-Tier Wireless Spectrum Sharing System Leveraging Secure Spectrum Auctions
Secure spectrum auctions can revolutionize the spectrum utilization of cellular networks and satisfy the ever increasing demand for resources. In this paper, a multi-tier dynamic spectrum sharing system is studied for ...
LTE PHY Layer Vulnerability Analysis and Testing Using Open-Source SDR Tools
This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual ...
Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities
Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts ...
Fast Detection of Transformed Data Leaks
(Ieee-Inst Electrical Electronics Engineers Inc, 2016-03-01)
Cyber War Game in Temporal Networks
In a cyber war game where a network is fully distributed and characterized by resource constraints and high dynamics, attackers or defenders often face a situation that may require optimal strategies to win the game with ...