Search Results - "Ankunda R. Kiremire"

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective by Chen, Jundong, Kiremire, Ankunda R., Brust, Matthias R., Phoha, Vir V.

    Published in Computer communications (01-08-2014)
    “…Privacy settings are a crucial part of any online social network as users are confronted with determining which and how many profile attributes to disclose…”
    Get full text
    Journal Article
  2. 2

    A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network by Jundong Chen, Ankunda R. Kiremire, Matthias R. Brust, Vir V. Phoha

    “…Users of online social networks often adjust their privacy settings to control how much information on their profiles is accessible to other users of the…”
    Get full text
    Journal Article
  3. 3

    Using network motifs to investigate the influence of network topology on PPM-based IP traceback schemes by Kiremire, Ankunda R., Brust, Matthias R., Phoha, Vir V.

    “…Multiple schemes that utilize Probabilistic Packet Marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
    Get full text
    Journal Article
  4. 4

    Topology dependence of PPM-based Internet Protocol traceback schemes by Kiremire, Ankunda R

    Published 01-01-2014
    “…Multiple schemes that utilize probabilistic packet marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
    Get full text
    Dissertation
  5. 5

    A Concise Network-Centric Survey of IP Traceback Schemes based on Probabilistic Packet Marking by Brust, Matthias R, Kiremire, Ankunda R

    Published 29-01-2016
    “…Multiple probabilistic packet marking (PPM) schemes for IP traceback have been proposed to deal with Distributed Denial of Service (DDoS) attacks by…”
    Get full text
    Journal Article
  6. 6

    Topology dependence of PPM-based Internet Protocol traceback schemes by Kiremire, Ankunda R

    “…Multiple schemes that utilize probabilistic packet marking (PPM) have been proposed to deal with Distributed Denial of Service (DDoS) attacks by reconstructing…”
    Get full text
    Dissertation
  7. 7

    Modeling privacy settings of an online social network from a game-theoretical perspective by Jundong Chen, Brust, Matthias R., Kiremire, Ankunda R., Phoha, Vir V.

    “…Users of online social networks are often required to adjust their privacy settings because of frequent changes in the users' connections as well as occasional…”
    Get full text
    Conference Proceeding
  8. 8

    Topology-dependent performance of attack graph reconstruction in PPM-based IP traceback by Kiremire, Ankunda R., Brust, Matthias R., Phoha, Vir V.

    “…A variety of schemes based on the technique of Probabilistic Packet Marking (PPM) have been proposed to identify Distributed Denial of Service (DDoS) attack…”
    Get full text
    Conference Proceeding
  9. 9

    A prediction based approach to IP traceback by Kiremire, A. R., Brust, M. R., Phoha, V. V.

    “…Sources of a Distributed Denial of Service (DDoS) attack can be identified by the traffic they generate using the IP traceback technique. Because of its…”
    Get full text
    Conference Proceeding