Optimal resource allocation to defend against deliberate attacks in networking infrastructures.
Xun XiaoMinming LiJianping WangChunming QiaoPublished in: INFOCOM (2012)
Keyphrases
- optimal resource allocation
- resource allocation
- intrusion prevention
- malicious attacks
- countermeasures
- distributed computing
- chosen plaintext
- peer to peer
- intrusion detection
- watermarking scheme
- terrorist attacks
- traffic analysis
- network infrastructure
- image watermarking
- data management
- security protocols
- computer security
- watermarking technique
- security mechanisms
- information infrastructure
- security threats
- denial of service attacks
- malicious users