Talk:A link to the paper: Difference between revisions

From Soma-notes
Created page with "===Raghad=== The attribution dilemma ===Rakhem=== Requirements to achieve attribution ===AbdelRahman=== Why is it difficult to implement attribution ===Omi=== Attribution attacks"
 
No edit summary
 
Line 7: Line 7:
===Omi===
===Omi===
Attribution attacks
Attribution attacks
=Related Work=
===Against attribution attacks===
2006: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1649171 This] paper designed a scalable testbed for evaluating all existing stepping stone attack.<br/>
2007: [http://www.truststc.org/pubs/168/HeTong06ASC.pdf This] paper proposes a technique for robust detection of stepping stone attack.
===Attributing actions over the internet by attributing packets to agents===
2004: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1437851 This] paper uses both <i>link identification</i> and <i>filtering</i> for achieving IP traceback WITHOUT the presence of high network cooperation.<br/>
===Attributing text/documents/articles/codes to authors (Authorship)===
2005: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1556355 This] paper presents a neural network approach for source attribution of text.<br/>
2006: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=4028874 This] paper presents a process to determine the source of a previously unexamined piece of writing.<br/>
2007: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=4456854 This] paper uses feature extractions for document attribution.<br/>
2007: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=4293714 This] paper works to recognize the author of text documents without depending on the document's theme. It also visualizes this attribution using "blobby objects".<br/>
2009: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=5254209 This] paper attributes codes (s/w programs) to persons after learning the personal coding scheme through at least three samples of codes.<br/>
2011: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=5706693 This] paper attributes user-generated text on the web by using a two-stage supervised and non-supervised learning for achieving authorship attribution on web forum posts.

Latest revision as of 08:28, 27 March 2011

Raghad

The attribution dilemma

Rakhem

Requirements to achieve attribution

AbdelRahman

Why is it difficult to implement attribution

Omi

Attribution attacks

Related Work

Against attribution attacks

2006: This paper designed a scalable testbed for evaluating all existing stepping stone attack.
2007: This paper proposes a technique for robust detection of stepping stone attack.

Attributing actions over the internet by attributing packets to agents

2004: This paper uses both link identification and filtering for achieving IP traceback WITHOUT the presence of high network cooperation.

Attributing text/documents/articles/codes to authors (Authorship)

2005: This paper presents a neural network approach for source attribution of text.
2006: This paper presents a process to determine the source of a previously unexamined piece of writing.
2007: This paper uses feature extractions for document attribution.
2007: This paper works to recognize the author of text documents without depending on the document's theme. It also visualizes this attribution using "blobby objects".
2009: This paper attributes codes (s/w programs) to persons after learning the personal coding scheme through at least three samples of codes.
2011: This paper attributes user-generated text on the web by using a two-stage supervised and non-supervised learning for achieving authorship attribution on web forum posts.