Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Swastik Brahma"'
Publikováno v:
2023 57th Annual Conference on Information Sciences and Systems (CISS).
Publikováno v:
IEEE Transactions on Computational Social Systems. 9:469-479
Publikováno v:
GLOBECOM 2022 - 2022 IEEE Global Communications Conference.
Publikováno v:
2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops).
Publikováno v:
Modeling and Design of Secure Internet of Things
This chapter presents a game‐theoretic model to analyze attack–defense scenarios that use fake nodes (computing devices) for deception under consideration of the system deploying defense resources to protect individual nodes in a cost‐effective
Publikováno v:
IEEE Transactions on Network Science and Engineering. 7:562-575
In this work, we consider the problem of inferring links in a communication network, using limited, passive observations of network traffic. Our approach leverages transfer entropy (TE) as a metric for quantifying the strength of the automatic repeat
Publikováno v:
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC).
Publikováno v:
IEEE Transactions on Computational Social Systems. 6:847-857
This paper considers the design of an auction mechanism for target tracking via crowdsensing. We consider that the crowdsourcing framework consists of a set of sensors, which are embedded in devices belonging to crowd participants, and a fusion cente
Publikováno v:
IEEE Transactions on Signal and Information Processing over Networks. 4:643-655
This paper considers the problem of distributed Bayesian detection in the presence of Byzantines who seek to degrade detection performance by falsifying data. The paper employs an audit bit based mechanism to mitigate Byzantine attacks that partition
Publikováno v:
CISS
In this paper, we consider the problem of detecting hardware Trojans in an Integrated Circuit (IC) from a game theoretic standpoint. The paper considers the presence of multiple classes of Trojans, with each class containing multiple Trojan types, an