Search Results - "Ankunda R. Kiremire"
-
1
Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective
Published in Computer communications (01-08-2014)“…Privacy settings are a crucial part of any online social network as users are confronted with determining which and how many profile attributes to disclose…”
Get full text
Journal Article -
2
A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network
Published in EAI endorsed transactions on collaborative computing (01-05-2014)“…Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the…”
Get full text
Journal Article -
3
Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes
Published in Computer networks (Amsterdam, Netherlands : 1999) (29-10-2014)“…Multiple schemes that utilize Probabilistic Packet Marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
Get full text
Journal Article -
4
Topology dependence of PPM-based Internet Protocol traceback schemes
Published 01-01-2014“…Multiple schemes that utilize probabilistic packet marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
Get full text
Dissertation -
5
A Concise Network-Centric Survey of IP Traceback Schemes based on Probabilistic Packet Marking
Published 29-01-2016“…Multiple probabilistic packet marking (PPM) schemes for IP traceback have been proposed to deal with Distributed Denial of Service (DDoS) attacks by…”
Get full text
Journal Article -
6
Topology dependence of PPM-based Internet Protocol traceback schemes
Get full text
Dissertation -
7
Modeling privacy settings of an online social network from a game-theoretical perspective
Published in 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (01-10-2013)“…Users of online social networks are often required to adjust their privacy settings because of frequent changes in the users' connections as well as occasional…”
Get full text
Conference Proceeding -
8
Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback
Published in 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) (01-01-2014)“…A variety of schemes based on the technique of Probabilistic Packet Marking (PPM) have been proposed to identify Distributed Denial of Service (DDoS) attack…”
Get full text
Conference Proceeding -
9
A prediction based approach to IP traceback
Published in 37th Annual IEEE Conference on Local Computer Networks - Workshops (01-10-2012)“…Sources of a Distributed Denial of Service (DDoS) attack can be identified by the traffic they generate using the IP traceback technique. Because of its…”
Get full text
Conference Proceeding