|
|
Line 46: |
Line 46: |
| |{{Hl2}} |'''Initial readings''' | | |{{Hl2}} |'''Initial readings''' |
| |- | | |- |
| | <strike>Voice Over IP - A Success Story?</strike> (assigned to Christopher Menke) | | | |
| | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler] | | | |
| | [http://en.wikipedia.org/wiki/Voice_over_Internet_Protocol] [http://transition.fcc.gov/voip/]
| |
| |-
| |
| | <strike>Business Models of the Underground Economy</strike> (assigned to Christian Wehrberger)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| |
| | [http://www.blackhat.com/presentations/bh-dc-10/Stevens_Kevin/BlackHat-DC-2010-Stevens-Underground-wp.pdf] [http://weis2011.econinfosec.org/papers/The%20Underground%20Economy%20of%20Fake%20Antivirus%20Software.pdf] [http://www.cs.ucsb.edu/~vigna/publications/2011_stone_cova_gilbert_kemmerer_kruegel_vigna_torpig.pdf]
| |
| |-
| |
| | <strike>Malware Detection in Networks - Anomaly Detection</strike> (assigned to Abouzar Hosseini)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| |
| | [http://www.google.com/url?sa=t&rct=j&q=malware%20detection%20in%20networks&source=web&cd=1&ved=0CB4QFjAA&url=http%3A%2F%2Fwww.networkworld.com%2Fnews%2F2007%2F042507-malware-detection.html&ei=Rm2lTpTFHcrNswaijp2eAw&usg=AFQjCNG5qvZm7a4kS-L8ajgOmMNEVoDQZA&cad=rja]
| |
| |-
| |
| | <strike>Relationship Classification in Social Networks</strike> (assigned to Sonja Neue)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| |
| | [http://research.microsoft.com/en-us/people/weic/infocom11_relationshipclassification.pdf] [http://www.cs.purdue.edu/homes/rxiang/Publication_files/wfp1000-xiang.pdf]
| |
| |-
| |
| | <strike>Modern Data Center Techniques</strike> (assigned to Christof Pohl)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| |
| | [http://conferences.sigcomm.org/sigcomm/2011/papers/sigcomm/p62.pdf] [http://www.cse.iitb.ac.in/~puru/courses/spring11/cs620/references/costofcloud.pdf] [http://ccr.sigcomm.org/online/files/p51.pdf]
| |
| |-
| |
| | <strike>Advances and Challenges in Trust and Recommendation Systems</strike> (assigned to Omar Shaya)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/david_koll David Koll]
| |
| | (To Be Available)
| |
| |-
| |
| | <strike>Security in Near Field Communication (NFC)</strike> (assigned to Georg Jahn)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| |
| | [http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf]
| |
| |-
| |
| | <strike>Malware propagation in mobile phone networks</strike> (assigned to Bassel Zeidan)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| |
| | [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
| |
| |-
| |
| | <strike>Scaling and Partitioning Online Social Networks</strike> (assigned to Subhi Barikhan)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| |
| | [http://ccr.sigcomm.org/online/files/p375.pdf] [http://research.microsoft.com/en-us/projects/ldg/a04-carrasco.pdf] [http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5961377]
| |
| |-
| |
| | <strike>Data Placement among Geo-Distributed Clouds</strike> (assigned to Rasha Mohsen)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/lei_jiao Lei Jiao]
| |
| | [http://www.vldb.org/pvldb/vol4/p1040-kadambi.pdf] [http://www.news.cs.nyu.edu/~trandinh/publications/Nomad-ATC.pdf] [http://research.microsoft.com/en-us/people/sagarwal/nsdi2010.pdf]
| |
| |-
| |
| | <strike>Routing strategies in Delay Tolerent Networks</strike> (assigned to Arne Bochem)
| |
| | [http://www.net.informatik.uni-goettingen.de/people/konglin_zhu Konglin Zhu]
| |
| | [http://delivery.acm.org/10.1145/1380000/1374652/p241-hui.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779081_bdfa9e378cd848d6616ecfc6a0f9e5b1] [http://mcn.cse.psu.edu/paper/weigao/mobihoc09.pdf] [http://delivery.acm.org/10.1145/1290000/1288113/p32-daly.pdf?ip=134.76.81.25&CFID=44287089&CFTOKEN=42866787&__acm__=1316779310_6f8566b2d0ec634be8d30298ef9d129a] [http://prisms.cs.umass.edu/brian/pubs/bburns.infocom.2005.pdf][http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4585387][http://www-npa.lip6.fr/_publications/669-infocom06.pdf]
| |
| |- | | |- |
| |} | | |} |