Talk:A link to the paper: Difference between revisions
AbdelRahman (talk | contribs) Created page with "===Raghad=== The attribution dilemma ===Rakhem=== Requirements to achieve attribution ===AbdelRahman=== Why is it difficult to implement attribution ===Omi=== Attribution attacks" |
AbdelRahman (talk | contribs) No edit summary |
||
Line 7: | Line 7: | ||
===Omi=== | ===Omi=== | ||
Attribution attacks | Attribution attacks | ||
=Related Work= | |||
===Against attribution attacks=== | |||
2006: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1649171 This] paper designed a scalable testbed for evaluating all existing stepping stone attack.<br/> | |||
2007: [http://www.truststc.org/pubs/168/HeTong06ASC.pdf This] paper proposes a technique for robust detection of stepping stone attack. | |||
===Attributing actions over the internet by attributing packets to agents=== | |||
2004: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1437851 This] paper uses both <i>link identification</i> and <i>filtering</i> for achieving IP traceback WITHOUT the presence of high network cooperation.<br/> | |||
===Attributing text/documents/articles/codes to authors (Authorship)=== | |||
2005: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=1556355 This] paper presents a neural network approach for source attribution of text.<br/> | |||
2006: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=4028874 This] paper presents a process to determine the source of a previously unexamined piece of writing.<br/> | |||
2007: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=4456854 This] paper uses feature extractions for document attribution.<br/> | |||
2007: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=4293714 This] paper works to recognize the author of text documents without depending on the document's theme. It also visualizes this attribution using "blobby objects".<br/> | |||
2009: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=5254209 This] paper attributes codes (s/w programs) to persons after learning the personal coding scheme through at least three samples of codes.<br/> | |||
2011: [http://ieeexplore.ieee.org.proxy.library.carleton.ca/stamp/stamp.jsp?tp=&arnumber=5706693 This] paper attributes user-generated text on the web by using a two-stage supervised and non-supervised learning for achieving authorship attribution on web forum posts. |
Latest revision as of 08:28, 27 March 2011
Raghad
The attribution dilemma
Rakhem
Requirements to achieve attribution
AbdelRahman
Why is it difficult to implement attribution
Omi
Attribution attacks
Related Work
Against attribution attacks
2006: This paper designed a scalable testbed for evaluating all existing stepping stone attack.
2007: This paper proposes a technique for robust detection of stepping stone attack.
Attributing actions over the internet by attributing packets to agents
2004: This paper uses both link identification and filtering for achieving IP traceback WITHOUT the presence of high network cooperation.
Attributing text/documents/articles/codes to authors (Authorship)
2005: This paper presents a neural network approach for source attribution of text.
2006: This paper presents a process to determine the source of a previously unexamined piece of writing.
2007: This paper uses feature extractions for document attribution.
2007: This paper works to recognize the author of text documents without depending on the document's theme. It also visualizes this attribution using "blobby objects".
2009: This paper attributes codes (s/w programs) to persons after learning the personal coding scheme through at least three samples of codes.
2011: This paper attributes user-generated text on the web by using a two-stage supervised and non-supervised learning for achieving authorship attribution on web forum posts.