Home | Projects | Publications | Presentations | People | News | Activities | About DCSL | Internal |
Reading Group |
||||
Reading Group on Reliable & Secure System Design |
||||
Dates |
Topic |
Papers | Presenter(s) | Presentation |
Aug 28 | Overview of research in DCSL | None | Saurabh Bagchi | Presentation |
Sep 4 | "Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS", Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi, ACSAC '03. |
Saurabh Bagchi | Presentation | |
Sep 11 | "Optimizing sensor networks in the energy-latency-density design space" |
Mark Krasniewski |
Presentation | |
Sep 18 | "Observer-a concept for formal on-line validation of distributed systems" |
Padma Varadharajan |
Presentation | |
Sep 25 | "Survivable Mobile Wireless Networks: Issues, Challenges, and Research Directions" |
Nipoon Malhotra |
||
Oct 2 | "Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks" |
Padma Varadharajan |
||
Oct 9 | Presentation of monitor based detection project |
Gunjan Khanna, Padma Varadharajan |
||
Oct 16 | Presentation of monitor based detection project |
Gunjan Khanna, Padma Varadharajan |
||
Oct 23 | Review of presentation for UIUC visit |
Saurabh Bagchi |
||
Oct 30 | "A taxonomy of wireless micro-sensor network models" Sameer Tilak, Nael B. Abu-Ghazaleh, Wendi Heinzelman April 2002, ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6 Issue 2 |
|||
Nov 6 | "Queries and Aggregation: Computation hierarchy for in-network processing" Ram Kumar, Vlasios Tsiatsis, Mani B. Srivastava Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, September 2003 Available from ACM Digital Library |
|||
Nov 13 | "Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector." |
2003 - Spring |
||||
In this group we will be covering papers from a subset of the following topics. A list of papers is given at the end of the write-up: |
||||
Dates |
Topic |
Papers | Presenter(s) | Presentation |
Feb 4 | "A framework for constructing features and models for intrusion detection systems" by Lee and Stolfo |
Saurabh Bagchi | ||
Feb 13 | Overview of intrusion tolerance research in group |
|
Saurabh Bagchi Hank |
|
Feb 20 | Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, 1999. |
Nipoon Malhotra | Presentation | |
Feb 27 Mar 6 |
Data Mining Approaches to Intrusion Detection |
|
Serdar Cabuk | Presentation |
Mar 13 | Wenke Lee and Dong Xiang, "Information-Theoretic Measures for Anomaly Detection", |
Serdar Cabuk | ||
Apr 3 | "A Software Architecture to support Misuse Intrusion Detection", Sandeep Kumar and Eugene Spafford, Proceedings of the 18th National Information Security Conference, 1995 |
Hank | Presentation | |
Apr 17 | Cryptography protocols for sensor networks |
|
Issa Khalil | Presentation |
Apr 24 | Zhen Xiao and K. Birman, "A Randomized Error Recovery Algorithm for Reliable Multicast", IEEE Infocom April 2001, Alaska. |
Nipoon Malhotra |
Here is the reading group information for other years: | |||||||||
2011 | |||||||||
465 Northwestern Avenue, West Lafayette, IN 47907 | dcsl@ecn.purdue.edu | +1 765 494 3510 |
Home | Projects | Publications | Presentations | People News | Activities | About DCSL | Internal Last Update: August 4, 2011 10:34 by GMHoward |