Export 56 results:
Sort by: Filters: Author is I.R. Chen [Clear All Filters]
"Composite Trust-based Public Key Management in Mobile Ad Hoc Networks",
ACM 28th Symposium on Applied Computing, Coimbra, Portugal, 03/2013.
"Dynamic Multisource Multipath Routing for Intrusion Tolerance and Lifetime Maximization of Autonomous Wireless Sensor Networks",
IEEE 11th Symposium on Decentralized Autonomous Systems, 03/2013.
"Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems",
IEEE 11th Symposium on Decentralized Autonomous Systems, 03/2013.
"Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications",
IEEE Transactions on Systems, Man and Cybernetics, 2013.
"Behavior Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications",
IEEE Transactions on Smart Grid, 2013.
"Dynamic Agent-based Hierarchical Multicast for Wireless Mesh Networks",
Ad Hoc Networks, vol. 11, no. 6, pp. 1683-1698, 2013.
"Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing",
IEEE Transactions on Parallel and Distributed Systems, 2013.
"Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems",
IEEE Transactions on Reliability, vol. 68, no. 4, pp. 199-210, 2013.
"Hierarchical Agent-Based Secure and Reliable Multicast in Wireless Mesh Networks",
Computer Communications, 2013.
"On Survivability of Mobile Cyber Physical Systems with Intrusion Detection",
Wireless Personal Communications, vol. 68, no. 4, pp. 1377-1391, 2013.
"On the Tradeoff between Altruism and Selfishness in MANET Trust Management",
Ad Hoc Networks, 2013.
"Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks",
IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 189-203, 2013.
"Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems",
Wireless Personal Communications, vol. 69, no. 1, pp. 449-469, 2013.
"An Integrated Framework for Spatio-Temporal-Textual Search and Mining",
Proceedings of the 20th International Conference on Advances in Geographic Information Systems - SIGSPATIAL '12, Redondo Beach, California, ACM Press, pp. 570-573, 11/2012.
"Dynamic Trust Management for Internet of Things Applications",
ICAC 2012 Workshop Self-Aware Internet of Things, San Jose, 09/2012.
"Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems",
21th IEEE International Conference on Computer Communication Networks, Munich, Germany, 08/2012.
"Specification Based Intrusion Detection for Unmanned Aircraft Systems",
Mobihoc 2012 Workshop on Airborne Networks and Communications, Hilton Head Island, SC, USA, 06/2012.
"Trust Management for the Internet of Things and Its Application to Service Composition",
WoWMoM 2012 Workshop on the Internet of Things: Smart Objects and Services, San Francisco, CA, USA, 06/2012.
"Trust-based Task Assignment in Military Tactical Networks",
17th International Command and Control Research and Technology Symposium, Fairfax, VA, USA, 06/2012.
"A Provenance-based Trust Model for Delay Tolerant Networks",
6th IFIP WG 11.11 International Conference on Trust Management, India, 05/2012.
"DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems",
Wireless Personal Communications, vol. 62, no. 3, pp. 479-496, 2012.
"Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing and Intrusion Detection",
IEEE Transactions on Network and Service Management, vol. 9, no. 2, pp. 169-183, 2012.
"Integrated Social and QoS Trust-based Routing in Delay Tolerant Networks",
Wireless Personal Communications, vol. 66, no. 2, pp. 443-459, 2012.
"Mobility Management in Wireless Mesh Networks utilizing Location Routing and Pointer Forwarding",
IEEE Transactions on Network and Service Management, vol. 9, no. 3, pp. 226-239, 2012.
"Modeling and Analysis of Trust Management with Trust Chain Optimization in Mobile Ad Hoc Networks",
Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1001–1012, 2012.
