Svetlana Radosavac
Svetlana Radosavac
Institutional Shareholder Services
Verified email at
Cited by
Cited by
A framework for MAC protocol misbehavior detection in wireless networks
S Radosavac, JS Baras, I Koutsopoulos
Proceedings of the 4th ACM workshop on Wireless security, 33-42, 2005
Detection and prevention of MAC layer misbehavior in ad hoc networks
AA Cardenas, S Radosavac, JS Baras
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
Evaluation of detection algorithms for mac layer misbehavior: Theory and experiments
AA Cárdenas, S Radosavac, JS Baras
IEEE/ACM Transactions on Networking 17 (2), 605-617, 2008
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
S Radosavac, AA Cárdenas, JS Baras, GV Moustakides
Journal of Computer Security 15 (1), 103-128, 2007
Method and apparatus for security-risk based admission control
UC Kozat, S Radosavac, J Kempf
US Patent 8,316,428, 2012
An analytic framework for modeling and detecting access layer misbehavior in wireless networks
S Radosavac, G Moustakides, JS Baras, I Koutsopoulos
ACM Transactions on Information and System Security (TISSEC) 11 (4), 1-28, 2008
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ...
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
Performance comparison of detection schemes for MAC layer misbehavior
AA Cárdenas, S Radosavac, JS Baras
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Nudge: Intermediaries' role in interdependent network security
J Grossklags, S Radosavac, AA Cárdenas, J Chuang
Proceedings of the 2010 ACM Symposium on Applied Computing, 1879-1880, 2010
Cross-layer attacks in wireless ad hoc networks
S Radosavac, N Benammar, JS Baras
Conference on Information Sciences and Systems 4, 2004
An economic map of cybercrime
A Cárdenas, S Radosavac, J Grossklags, J Chuang, CJ Hoofnagle
TPRC, 2009
Using insurance to increase internet security
S Radosavac, J Kempf, UC Kozat
Proceedings of the 3rd international workshop on Economics of networked …, 2008
Detection and classification of network intrusions using hidden markov models
S Radosavac, JS Baras
University of Maryland, College Park, 2002
Application of sequential detection schemes for obtaining performance bounds of greedy users in the IEEE 802.11 MAC
S Radosavac, JS Baras
IEEE Communications Magazine 46 (2), 148-154, 2008
Utilizing social influence in content distribution networks
H Sharara, C Westphal, S Radosavac, UC Kozat
2011 IEEE International Conference on Communications (ICC), 1-6, 2011
Method and apparatus for compensating for and reducing security attacks on network entities
S Radosavac, J Kempf, UC Kozat
US Patent App. 12/270,760, 2009
Impact of optimal MAC layer attacks on the network layer
S Radosavac, JS Baras, GV Moustakides
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor …, 2006
Short Paper: bufSTAT-a tool for early detection and classification of buffer overflow attacks
S Radosavac, K Seamon, JS Baras
First International Conference on Security and Privacy for Emerging Areas in …, 2005
Attacks and Defenses Utilizing Cross-Layer Interactions in MANET
JS Baras, S Radosavac
workshop on Cross-Layer Issues in the Design of Tactical Mobile Ad Hoc …, 2004
Intrusion detection for defense at the MAC and routing layers of wireless networks
S Radosavac
University of Maryland, College Park, 2007
The system can't perform the operation now. Try again later.
Articles 1–20