2018
An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process.
EAI Endorsed Trans. Security Safety, 2018

2016
Improving sensor network immunity under worm attacks: A software diversity approach.
Ad Hoc Networks, 2016

2013
Towards statistically strong source anonymity for sensor networks.
ACM Trans. Sens. Networks, 2013

2012
Secure Trust Metadata Management for Mobile Ad-Hoc Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Sensor Key Management.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Sensor Code Attestation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Anonymous Routing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Resource-misuse attack detection in delay-tolerant networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

2009
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
IEEE Trans. Mob. Comput., 2009

An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Towards event source unobservability with minimum network traffic in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007