2023
Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments.
IEEE Trans. Wirel. Commun., November, 2023
Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog.
IEEE Internet Things J., July, 2023
Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
2022
Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection.
IEEE Trans. Mob. Comput., 2022
MTD '22: 9th ACM Workshop on Moving Target Defense.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense.
IEEE Trans. Dependable Secur. Comput., 2021
Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?
IEEE Trans. Wirel. Commun., 2020
Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon.
IEEE/ACM Trans. Netw., 2020
Cyber Deception for Computer and Network Security: Survey and Challenges.
CoRR, 2020
Introduction to the Minitrack on Cyber Deception for Defense.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
MTD'20: 7th ACM Workshop on Moving Target Defense.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
SAS: Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019
2018
Cyber Deception: Overview and the Road Ahead.
IEEE Secur. Priv., 2018
Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
Computer-Aided Human Centric Cyber Situation Awareness.
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Enabling Network Anti-Inference via Proactive Strategies: A Fundamental Perspective.
IEEE/ACM Trans. Netw., 2017
When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
On the Evolution and Impact of Mobile Botnets in Wireless Networks.
IEEE Trans. Mob. Comput., 2016
How the anti-rumor kills the rumor: Conflicting information propagation in networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Modeling and estimating the structure of D2D-based mobile social networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
On the Resilience of D2D-Based Social Networking Service against Random Failures.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
How Robust Is a D2D-Based Messaging Service?
Proceedings of the 2016 IEEE Global Communications Conference, 2016
MTD 2016: Third ACM Workshop on Moving Target Defense.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
Proceedings of the Digital Fingerprinting, 2016
Proceedings of the Digital Fingerprinting, 2016
2015
Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-23288-1, 2015
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming.
IEEE Trans. Dependable Secur. Comput., 2015
War of 2050: a Battle for Information, Communications, and Computer Security.
CoRR, 2015
Will Cybersecurity Dictate the Outcome of Future Wars?
Computer, 2015
On detection and concealment of critical roles in tactical wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015
Network anti-inference: A fundamental perspective on proactive strategies to counter flow inference.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
To Be Proactive or Not: A Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs.
Proceedings of the Second ACM Workshop on Moving Target Defense, 2015
2014
Fundamentals of Sketch-Based Passwords - A General Framework
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-13629-5, 2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications.
IEEE Trans. Mob. Comput., 2014
How can botnets cause storms? Understanding the evolution and impact of mobile botnets.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2012
Modeling and Performance Evaluation of Backoff Misbehaving Nodes in CSMA/CA Networks.
IEEE Trans. Mob. Comput., 2012
Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
2010
On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
On the Impact of Backoff Misbehaving Nodes in IEEE 802.11 Networks.
Proceedings of IEEE International Conference on Communications, 2010
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2008
Attack-Resistant Location Estimation in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008
Secure target localisation in sensor networks using relaxation labelling.
Int. J. Sens. Networks, 2008
2007
IPsec Security Policy Database Configuration MIB.
RFC, March, 2007
Secure and Resilient Time Synchronization in Wireless Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Secure Tracking in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007
A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007
2006
Secure and resilient clock synchronization in wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006
Robust Localization of Multiple Events in Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
TinySeRSync: secure and resilient time synchronization in wireless sensor networks.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Secure Distributed Cluster Formation in Wireless Sensor Networks.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Protocol for Carrying Authentication for Network Access (PANA) Requirements.
RFC, May, 2005
Definitions of Managed Objects for Network Address Translators (NAT).
RFC, March, 2005
Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2005
Supervised Multispectral Image Segmentation using Active Contours.
Proceedings of the 2005 IEEE International Conference on Robotics and Automation, 2005
1994
Edge detection in gated cardiac nuclear medicine images.
Proceedings of the Seventh Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'94), 1994