An Evaluation Framework for Moving Target Defense Based on Analytic Hierarchy Process.
EAI Endorsed Trans. Security Safety, 2018
Improving sensor network immunity under worm attacks: A software diversity approach.
Ad Hoc Networks, 2016
Towards statistically strong source anonymity for sensor networks.
ACM Trans. Sens. Networks, 2013
Secure Trust Metadata Management for Mobile Ad-Hoc Networks.
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Resource-misuse attack detection in delay-tolerant networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
IEEE Trans. Mob. Comput., 2009
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2009
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008
Towards event source unobservability with minimum network traffic in sensor networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007