PUBLICATIONS

  1. S. Radosavac, U. Kozat and J. Kempf, “On the Use of Admission Control to prevent DDoS Attacks on Mobile Networks”, submitted to Transactions on Mobile Computing

  2. A. A. Cardenas, S. Radosavac and J. S. Baras, “Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments”, IEEE/ACM Transactions on Networking (ToN), Pages 605-617, Vol. 17, Issue 2. April 2009. PDF BIB

  3. S. Radosavac, G. V. Moustakides, J. S. Baras and I. Koutsopoulos, “An analytic framework for modeling and detecting access layer misbehavior in wireless networks”, ACM Transactions on Information and System Security (ACM TISSEC), Vol. 11, No. 4, July 2008. PDF BIB

  4. S. Radosavac and J. S. Baras, “Application of Sequential Detection Schemes for Obtaining Performance Bounds of Greedy Users in the IEEE 802.11 MAC”, IEEE Communications Magazine: special issue on Security in Mobile Ad Hoc and Sensor Networks, pages 148-154, Vol. 46, No. 2, February 2008. PDF BIB

  5. S. Radosavac, A. A. Cardenas, J. S. Baras and G. V. Moustakides, “Detecting IEEE 802.11 MAC Layer in Ad Hoc Networks: Robust strategies against individual and colluding attackers” Journal of Computer Security, special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 103-128, January 2007. PDF BIB

CONFERENCES

  1. H. Sharara, C. Westphal, S. Radosavac and U. C. Kozat, “Utilizing Social Influence in Content Distribution Networks” in Proceedings of IEEE ICC-2011, Kyoto, Japan, 2011 (best paper award) PDF BIB

  2. J. Grossklags, S. Radosavac, A. Cardenas, J. Chuang, “Nudge: Intermediaries’ Role in Interdependent Network Security” Proceedings of 3rd International Conference on Trust and Trustworthy Computing (Trust’10), June 2010. PDF BIB

  3. J. Grossklags, S. Radosavac, A. Cardenas, J. Chuang. “Intermediaries’ role in interdependent network security” In Proceedings of SAC’2010. (short paper)

  4. A. Cardenas, S. Radosavac, J. Grossklags, J. Chuang and C. Hoofnagle, “An Economic Map of Cybercrime”, 37th Research Conference on Communication, Information and Internet Policy (TPRC) 2009, George Mason University Law School, Arlington, VA, September 25-27, 2009. PDF BIB

  5. S. Radosavac, U. C. Kozat and J. Kempf, “On the Use of Admission Control for Better Quality of Security”, ICC 2009, June 14-18 2009, Dresden, Germany PDF BIB

  6. S. Radosavac and J. S. Baras, “Performance evaluation and trade-offs of optimal back-off misbehavior detection schemes in wireless networks in the presence of interference”, Third International Conference on Performance Evaluation Methodologies and Tools (Valuetools 2008), October 20-24 2008, Athens, Greece PDF BIB

  7. S. Radosavac, J. Kempf and U. C. Kozat , “Using Insurance for Increasing Internet Security”, ACM SIGCOMM Workshop on the Economics of Networks, Systems and Computation (NetEcon ’08), August 22, Seattle, WA PDF BIB

  8. J. S. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas and R. Gopaul , “Intrusion Detection System Resiliency to Byzantine attacks: the case study of wormholes in OLSR”, IEEE MILCOM 2007: Proceedings of the IEEE Military Communications Conference 2007, pp. 1 - 7, October 2007, Orlando, FL

  9. A. A. Cardenas, S. Radosavac and J. S. Baras, “An Analytical Evaluation of MAC Layer Misbehavior Detection Schemes”, Proceedings of the 26th Annual IEEE Conference on Computer Communications, INFOCOM 2007. PDF BIB

  10. S. Radosavac, J. S. Baras and G. V. Moustakides, “Impact of Optimal MAC Layer Attacks on the Network Layer”, SASN ’06: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135-146, October 2006. PDF BIB

  11. S. Radosavac and J. S. Baras, “Detection and Performance Analysis of Greedy Individual and Colluding MAC Layer Attackers”, 15th IST Mobile & Wireless Summit, Myconos, Greece, June 2006. PDF BIB

  12. S. Radosavac, J. S. Baras and I. Koutsopoulos,“A framework for MAC protocol misbehavior detection in wireless networks”, WiSe ’05: Proceedings of the 4th ACM workshop on Wireless security, pp. 33-42, Cologne, Germany, September 2, 2005. PDF BIB

  13. S. Radosavac, K. Seamon and J. S. Baras, “bufSTAT - a tool for early detection and classification of buffer overflow attacks”, First International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 231-233, Athens, Greece, 5-9 September, 2005. PDF BIB

  14. A. A. Cardenas, S. Radosavac and J. S. Baras, “Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks”, SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 17-22, Washington, DC, October 25, 2004. PDF BIB

  15. J. S. Baras and S. Radosavac, “Attacks and Defenses Utilizing Cross-Layer Interactions in MANETs”, Workshop on ’Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc Wireless Networks: Integration of Communication and Networking Functions to Support Optimal Information Management, Naval Research Laboratory, Washington, DC, June 2-3, 2004. PPT

  16. S. Radosavac, N. Benammar and J. S. Baras, “Cross-layer attacks in wireless ad hoc networks”, 38th Conference on Information Sciences and Systems (CISS), Princeton, March 17-19 2004. PDF BIB

  17. S. Radosavac and J. S. Baras, “Detection and classification of network intrusions using Hidden Markov Models”, 37th Conference on Information Sciences and Systems (CISS), Baltimore, March 2003. PDF BIB

  18. S. Radosavac, S. Wu and C. Bonnet, “Adaptive power-aware metric for Mobile Ad-hoc Networks”, WTC2002 (XVIII World Telecommunications Congress), Paris, France, 22-27 September 2002.

PATENTS

  1. S. Radosavac, J. Kempf and U. Kozat, Method and apparatus for compensating for and reducing security attacks on network entities [pending]

  2. U.Kozat, S. Radosavac and J. Kempf, Method and apparatus for security-risk based admission control [pending]