|
|
|
|
|
Journal
Publications 2008
W. Yan, Z. Zhang,
and N. Ansari, “Revealing Packed Malware,” IEEE Security and
Privacy, Vol. 6, No. 5, pp. 65-69, Sep.-Oct. 2008.
H. Tsunoda, K. Ohta, A.
Yamamoto, N. Ansari, and Y. Nemoto, “Detecting DRDoS Attacks by a
Simple Response Packet Confirmation Mechanism,” Computer
Communications, Vol. 31, No.14 , pp. 3299-3306, Sep. 5, 2008.
A. Belenky and
N. Ansari, “ Internet Deployment
of DPM-based IP Traceback,”
Journal of Computing and
Information Technology,
Special Issue on Recent Advances
in Computer and Communication Networks Technology,
Vol. 16, No. 2, pp. 109-118, June 2008.
G. Cheng, N.
Ansari, and S. Papavassiliou, “Adaptive QoS provisioning by Pricing
Incentive QoS Routing for Next Generation Networks,” Computer
Communications, Vol. 31, No. 10, pp. 2308-2318, 25 June 2008.
N. Ansari, G. Cheng,
and N. Wang, “Routing-Oriented update SchEme (ROSE) for Link
State Updating,” IEEE Transactions on Communications, Vol.
56, No. 6, pp. 948-956, June 2008.
N. Ansari, P.
Sakarindr,
E. Haghani, C. Zhang, A.
K. Jain, and Y.Q. Shi, “Evaluating Electronic Voting Systems
Equipped with Voter-Verified Paper Records,” IEEE Security and
Privacy, Vol. 6, No. 3, pp.30-39, May-June 2008.
T.N. Chang and
N. Ansari, “Passband Control of Lightly Damped Systems with Mode
Separation,” IEEE Transactions on Industrial Electronics,
Vol. 55, No. 5, pp. 2169-2176, May 2008.
Z. Ni, Y.Q. Shi,
N. Ansari, W. Su, Q. Sun, and Xiao Lin, “Robust Lossless Image Data
Hiding Designed for Semi-Fragile Image Authentication,” IEEE
Transactions on Circuits and Systems for Video Technology, Vol.
18, No. 4, pp. 497-509, April 2008.
A. Shevtekar
and N. Ansari, “A Router-Based Technique to Mitigate Reduction of
Quality (RoQ) Attacks,” Computer Networks, Vol. 52, No. 5,
pp 957-970, April 10, 2008 .
N. Ansari, C. Zhang,
R. Rojas-Cessa, S. De, P. Sakarindr, and E.S.H. Hou,
“Networking for Critical Conditions,” IEEE Wireless
Communications, Vol. 15, No. 2, pp. 73-81, April 2008.
Z. Wang, L.
Liu, M. Zhou, and N. Ansari, “A Position-Based Clustering
Technique for Ad Hoc Intervehicle Communication,” IEEE
Transactions Systems, Man and Cybernetics ¾Part
C: Applications and Reviews,
Vol. 38, No. 2, pp. 201-208, March 2008.
A.
Shevtekar, J. Stille, and N. Ansari, “On the Impacts of Low Rate
DoS Attacks on VoIP Traffic,” (Invited Paper)
Security and Communication
Networks, Vol. 1, No.
1, pp. 45-56, February 2008.
S. Yin, Y.
Luo,
L. Zong, S. Rago, J. Yu, N.
Ansari, and T. Wang, “Storage Area Network Extension over Passive
Optical Networks (S-PONs),” IEEE Communications, Vol. 46,
No.1, pp. 44-52, January 2008.
|