Now showing items 1-5 of 5

    • Counteracting free riding in Peer-to-Peer networks 

      Karakaya, M.; Körpeoǧlu, I.; Ulusoy, O. (Elsevier BV, 2008-03)
      The existence of a high degree of free riding is a serious threat to Peer-to-Peer (P2P) networks. In this paper, we propose a distributed framework to reduce the adverse effects of free riding on P2P networks. Our solution ...
    • Detecting compromised routers via packet forwarding behavior 

      Mizrak, A.T.; Savage, S.; Marzullo, K. (2008)
      While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well appreciated that Internet routers are also ...
    • Energy cost model for frequent item set discovery in unstructured P2P networks 

      Cem, E.; Demirkaya, E.; Esiner, E.; Ozaydin, B.; Ozkasap O. (2012)
      For large scale distributed systems, designing energy efficient protocols and services has become as significant as considering conventional performance criteria like scalability, reliability, fault-tolerance and security. ...
    • On probability of success in linear and differential cryptanalysis 

      Selçuk, A. A. (Springer New York LLC, 2008-01)
      Despite their widespread usage in block cipher security, linear and differential cryptanalysis still lack a robust treatment of their success probability, and the success chances of these attacks have commonly been estimated ...
    • A survey on information security threats and solutions for Machine to Machine (M2M) communications 

      Tuna, G.; Kogias, D. G.; Gungor, V. C.; Gezer, C.; Taşkın, E.; Ayday, E. (Academic Press Inc., 2017)
      Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...