-
1
-
-
84879051898
-
Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks
-
Jun
-
H. Al-Hamadi and I. R. Chen, "Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks," IEEE Trans. Netw. Service Manage., vol. 10, no. 2, pp. 189-203, Jun. 2013.
-
(2013)
IEEE Trans. Netw. Service Manage
, vol.10
, Issue.2
, pp. 189-203
-
-
Al-Hamadi, H.1
Chen, I.R.2
-
2
-
-
79959317465
-
Security challenges in next generation cyber physical systems
-
Pittsburgh, PA, USA Nov
-
M. Anand, E. Cronin, M. Sherr, M. Blaze, Z. Ives, and I. Lee, "Security challenges in next generation cyber physical systems," Beyond SCADA: Netw. Embedded Control for Cyber Phys. Syst., Pittsburgh, PA, USA, Nov. 2006.
-
(2006)
Beyond SCADA: Netw. Embedded Control for Cyber Phys. Syst
-
-
Anand, M.1
Cronin, E.2
Sherr, M.3
Blaze, M.4
Ives, Z.5
Lee, I.6
-
3
-
-
79957620499
-
Host-based anomaly detection for pervasive medical systems
-
Oct
-
B. Asfaw, D. Bekele, B. Eshete, A. Villafiorita, and K. Weldemariam, "Host-based anomaly detection for pervasive medical systems," in Proc. 5th Int. Conf. Risks Security Internet Syst., Oct. 2010, pp. 1-8.
-
Proc. 5th Int. Conf. Risks Security Internet Syst
, vol.2010
, pp. 1-8
-
-
Asfaw, B.1
Bekele, D.2
Eshete, B.3
Villafiorita, A.4
Weldemariam, K.5
-
4
-
-
80052171869
-
Trust-based intrusion detection in wireless sensor networks
-
Jun
-
F. Bao, I. Chen, M. Chang, and J.H. Cho, "Trust-based intrusion detection in wireless sensor networks," in Proc. IEEE Int. Conf. Commun., Jun. 2011, pp. 1-6.
-
(2011)
Proc. IEEE Int. Conf. Commun
, pp. 1-6
-
-
Bao, F.1
Chen, I.2
Chang, M.3
Cho, J.H.4
-
5
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
Jun
-
F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection," IEEE Trans. Netw. Service Manage., vol. 9, no. 2, pp. 169-183, Jun. 2012.
-
(2012)
IEEE Trans. Netw. Service Manage
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
6
-
-
0037709592
-
Reliability of systems with fuzzy-failure criterion
-
Anaheim, CA, USA Jan
-
F. B. Bastani, I. R. Chen, and T. W. Tsao, "Reliability of systems with fuzzy-failure criterion," in Proc. Annu. Rel. Maintainability Symp., Anaheim, CA, USA, Jan. 1994, pp. 442-448.
-
(1994)
Proc. Annu. Rel. Maintainability Symp
, pp. 442-448
-
-
Bastani, F.B.1
Chen, I.R.2
Tsao, T.W.3
-
7
-
-
79955867639
-
A multidimensional critical state analysis for detecting intrusions in scada systems
-
May
-
A. Carcano, A. Coletta, M. Guglielmi, M. Masera, I. Fovino, and A. Trombetta, "A multidimensional critical state analysis for detecting intrusions in SCADA systems," IEEE Trans. Ind. Inf., vol. 7, no. 2, pp. 179-186, May 2011.
-
(2011)
IEEE Trans. Ind. Inf
, vol.7
, Issue.2
, pp. 179-186
-
-
Carcano, A.1
Coletta, A.2
Guglielmi, M.3
Masera, M.4
Fovino, I.5
Trombetta, A.6
-
8
-
-
80055028776
-
Challenges for securing cyber physical systems
-
A. C-Ardenas, S. Amin, B. Sinopoli, A. Giani, A. Perrig, and S. Sastry, "Challenges for securing cyber physical systems," in Proc. 1st Workshop Cyber-Phys. Syst. Security DHS, 2009, pp. 1-4.
-
(2009)
Proc. 1st Workshop Cyber-Phys. Syst. Security DHS
, pp. 1-4
-
-
C-Ardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.6
-
9
-
-
0042084285
-
Effectof artificial-intelligenceplanningprocedures on system reliability
-
Aug
-
I. R.ChenandF. B. Bastani, "Effectof artificial-intelligenceplanningprocedures on system reliability," IEEE Trans. Rel., vol. 40, no. 3, pp.364-369,Aug.1991.
-
(1991)
IEEE Trans. Rel
, vol.40
, Issue.3
, pp. 364-369
-
-
Chenand, I.R.1
Bastani, F.B.2
-
10
-
-
0029250814
-
On the reliability of ai planning software in real-time applications
-
Feb
-
I. R. Chen, F. B. Bastani, and T. W. Tsao, "On the reliability of AI planning software in real-time applications," IEEE Trans. Knowl. Data Eng., vol. 7, no. 1, pp. 4-13, Feb. 1995.
-
(1995)
IEEE Trans. Knowl. Data Eng
, vol.7
, Issue.1
, pp. 4-13
-
-
Chen, I.R.1
Bastani, F.B.2
Tsao, T.W.3
-
11
-
-
0032121578
-
Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
-
I. R. Chen and T. H. Hsi, "Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers," Perform. Eval., vol. 33, no. 2, pp. 89-112, 1998.
-
(1998)
Perform. Eval
, vol.33
, Issue.2
, pp. 89-112
-
-
Chen, I.R.1
Hsi, T.H.2
-
12
-
-
78751676469
-
Adaptive fault tolerant qos control algorithms for maximizing system lifetime of query-based wireless sensor networks
-
Mar./Apr
-
I. R. Chen, A. P. Speer, and M. Eltoweissy, "Adaptive fault tolerant QOS control algorithms for maximizing system lifetime of query-based wireless sensor networks," IEEE Trans. Dependable Secure Comput., vol. 8, no. 2, pp. 161-176, Mar./Apr. 2011.
-
(2011)
IEEE Trans. Dependable Secure Comput
, vol.8
, Issue.2
, pp. 161-176
-
-
Chen, I.R.1
Speer, A.P.2
Eltoweissy, M.3
-
13
-
-
0141858950
-
Analysis of replicated data with repair dependency
-
I. R. Chen and D. C. Wang, "Analysis of replicated data with repair dependency," The Comput. J., vol. 39, no. 9, pp. 767-779, 1996.
-
(1996)
The Comput. J
, vol.39
, Issue.9
, pp. 767-779
-
-
Chen, I.R.1
Wang, D.C.2
-
14
-
-
0030381055
-
Analyzing dynamic voting using petri nets
-
Niagara Falls, Canada, Oct
-
I. R. Chen and D. C. Wang, "Analyzing dynamic voting using petri nets," in Proc. 15th IEEE Symp. Rel. Distrib. Syst., Niagara Falls, Canada, Oct. 1996, pp. 44-53.
-
(1996)
Proc. 15th IEEE Symp. Rel. Distrib. Syst
, pp. 44-53
-
-
Chen, I.R.1
Wang, D.C.2
-
15
-
-
0037645949
-
Dynamic quota-based admission control with sub-rating in multimedia servers
-
S.-T. Cheng, C.-M. Chen, and I. R. Chen, "Dynamic quota-based admission control with sub-rating in multimedia servers," Multimedia Syst., vol. 8, no. 2, pp. 83-91, 2000.
-
(2000)
Multimedia Syst
, vol.8
, Issue.2
, pp. 83-91
-
-
Cheng, S.-T.1
Chen, C.-M.2
Chen, I.R.3
-
16
-
-
0037350733
-
Performance evaluation of an admission control algorithm: Dynamic threshold with negotiation
-
S.-T. Cheng, C.-M. Chen, and I. R. Chen, "Performance evaluation of an admission control algorithm: Dynamic threshold with negotiation," Perform. Eval., vol. 52, no. 1, pp. 1-13, 2003.
-
(2003)
Perform. Eval
, vol.52
, Issue.1
, pp. 1-13
-
-
Cheng, S.-T.1
Chen, C.-M.2
Chen, I.R.3
-
17
-
-
70350634504
-
Using model-based intrusion detection for scada networks
-
Miami, FL, USA Jan
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes, "Using model-based intrusion detection for SCADA networks," in Proc. SCADA Secur. Sci. Symp., Miami, FL, USA, Jan. 2007, pp. 127-134.
-
(2007)
Proc. SCADA Secur. Sci. Symp
, pp. 127-134
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
18
-
-
77949264858
-
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
-
Mar
-
J. H. Cho, I. R. Chen, and P. G. Feng, "Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks," IEEE Trans. Rel., vol. 59, no. 1, pp. 231-241, Mar. 2010.
-
(2010)
IEEE Trans. Rel
, vol.59
, Issue.1
, pp. 231-241
-
-
Cho, J.H.1
Chen, I.R.2
Feng, P.G.3
-
19
-
-
70749147824
-
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
-
Aug
-
J.-H. Cho, A. Swami, and I.-R. Chen, "Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks," in Proc. Int. Conf. Comput. Sci. Eng., Aug. 2009, pp. 641-650.
-
(2009)
Proc. Int. Conf. Comput. Sci. Eng
, pp. 641-650
-
-
Cho, J.-H.1
Swami, A.2
Chen, I.-R.3
-
20
-
-
84858050885
-
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
-
J.-H. Cho, A. Swami, and I. R. Chen, "Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks," J. Netw. Comput. Appl., vol. 35, no. 3, pp. 1001-1012, 2012.
-
(2012)
J. Netw. Comput. Appl
, vol.35
, Issue.3
, pp. 1001-1012
-
-
Cho, J.-H.1
Swami, A.2
Chen, I.R.3
-
21
-
-
32144435943
-
Decentralized intrusion detection in wireless sensor networks
-
A. daSilva, M. H. T. Martins, B. P. S. Rocha, A. A. F. Loureiro, L. B. Ruiz, and H. C. Wong, "Decentralized intrusion detection in wireless sensor networks," in Proc. 1st ACM Int. Workshop Quality Service Security Wireless Mobile Netw., 2005, pp. 16-23.
-
(2005)
Proc. 1st ACM Int. Workshop Quality Service Security Wireless Mobile Netw
, pp. 16-23
-
-
Dasilva, A.1
Martins, M.H.T.2
Rocha, B.P.S.3
Loureiro, A.A.F.4
Ruiz, L.B.5
Wong, H.C.6
-
22
-
-
84902331601
-
Formal modeling and analysis of the modbus protocol
-
B. Dutertre, "Formal modeling and analysis of the Modbus protocol," in Proc. Critical Infrastructure Protection, 2007, pp. 189-204.
-
(2007)
Proc. Critical Infrastructure Protection
, pp. 189-204
-
-
Dutertre, B.1
-
23
-
-
20844443098
-
Performance analysis of location-Aware mobile service proxies for reducing network cost in personal communication systems
-
B. Gu and I. R. Chen, "Performance analysis of location-Aware mobile service proxies for reducing network cost in personal communication systems," ACM Mobile Netw. Appl., vol. 10, no. 4, pp. 453-463, 2005.
-
(2005)
ACM Mobile Netw. Appl
, vol.10
, Issue.4
, pp. 453-463
-
-
Gu, B.1
Chen, I.R.2
-
24
-
-
44649189449
-
Towards intrusion detection in wireless sensor networks
-
K. Ioannis, T. Dimitriou, and F. Freiling, "Towards intrusion detection in wireless sensor networks," in Proc. 13th Eur. Wireless Conf., 2007, pp. 1-7.
-
(2007)
Proc. 13th Eur. Wireless Conf
, pp. 1-7
-
-
Ioannis, K.1
Dimitriou, T.2
Freiling, F.3
-
26
-
-
78751620590
-
Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
-
Mar
-
Y. Li and I. R. Chen, "Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks," IEEE Trans. Mobile Comput., vol. 10, no. 3, pp. 349-361, Mar. 2011.
-
(2011)
IEEE Trans. Mobile Comput
, vol.10
, Issue.3
, pp. 349-361
-
-
Li, Y.1
Chen, I.R.2
-
27
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
Mar
-
R. Mitchell and I. R. Chen, "Effect of intrusion detection and response on reliability of cyber physical systems," IEEE Trans. Rel., vol. 62, no. 1, pp. 199-210, Mar. 2013.
-
(2013)
IEEE Trans. Rel
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.R.2
-
28
-
-
77956274462
-
Abnormal human behavioral pattern detection in assisted living environments
-
K. Park, Y. Lin, V. Metsis, Z. Le, and F. Makedon, "Abnormal human behavioral pattern detection in assisted living environments," in Proc. 3rd ACM Int. Conf. Pervasive Technol. Related Assist. Environ., 2010, pp. 9:1-9:8.
-
(2010)
Proc. 3rd ACM Int. Conf. Pervasive Technol. Related Assist. Environ
, pp. 91-98
-
-
Park, K.1
Lin, Y.2
Metsis, V.3
Le, Z.4
Makedon, F.5
-
29
-
-
0002629036
-
Emerald: Event monitoring enabling responses to anomalous live disturbances
-
P. Porras and P. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," in Proc. 20th Nat. Inf. Syst. Security Conf., 1997, pp. 353-365.
-
(1997)
Proc. 20th Nat. Inf. Syst. Security Conf
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
31
-
-
35048836274
-
Activity recognition in the home using simple and ubiquitous sensors
-
A. Ferscha, F. Mattern, Eds., Berlin, Germany Springer
-
E. Tapia, S. Intille, and K. Larson, "Activity recognition in the home using simple and ubiquitous sensors," in Pervasive Computing. "Lecture Notes in Computer Science", vol. 3001, A. Ferscha, F. Mattern, Eds., Berlin, Germany, Springer, 2004, pp. 158-175.
-
(2004)
Pervasive Computing. "lecture Notes in Computer Science
, vol.3001
, pp. 158-175
-
-
Tapia, E.1
Intille, S.2
Larson, K.3
-
32
-
-
33847299487
-
Multi-Agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction
-
Dec
-
C.-H. Tsang and S. Kwong, "Multi-Agent intrusion detection system in industrial network using ant colony clustering approach and unsupervised feature extraction," in Proc. IEEE Int. Conf. Ind. Tech., Dec. 2005, pp. 51-56.
-
(2005)
Proc. IEEE Int. Conf. Ind. Tech
, pp. 51-56
-
-
Tsang, C.-H.1
Kwong, S.2
-
33
-
-
85015580987
-
Security solutions for pervasive healthcare
-
New York, NY, USA: Auerbach
-
K. Venkatasubramanian and S. K. S. Gupta, "Security solutions for pervasive healthcare," Security in Distributed, Grid, Mobile, and Pervasive Computing, New York, NY, USA: Auerbach, 2007.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
-
-
Venkatasubramanian, K.1
Gupta, S.K.S.2
-
34
-
-
33644780888
-
A process-mining framework for the detection of healthcare fraud and abuse
-
W.-S. Yang and S.-Y. Hwang, "A process-mining framework for the detection of healthcare fraud and abuse," Expert Syst. Appl., vol. 31, no. 1, pp. 56-68, 2006.
-
(2006)
Expert Syst. Appl
, vol.31
, Issue.1
, pp. 56-68
-
-
Yang, W.-S.1
Hwang, S.-Y.2
-
35
-
-
58149488760
-
Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
-
O. Yilmaz and I. R. Chen, "Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks," Comput. Commun., vol. 32, no. 2, pp. 317-323, 2009.
-
(2009)
Comput. Commun
, vol.32
, Issue.2
, pp. 317-323
-
-
Yilmaz, O.1
Chen, I.R.2
-
36
-
-
77954606031
-
Time-based intrusion detection in cyber-physical systems
-
C. Zimmer, B. Bhat, F. Mueller, and S. Mohan, "Time-based intrusion detection in cyber-physical systems," in Proc. 1st ACM/IEEE Int. Conf. Cyber-Phys. Syst., 2010, pp. 109-118.
-
(2010)
Proc. 1st ACM IEEE Int. Conf. Cyber-Phys. Syst
, pp. 109-118
-
-
Zimmer, C.1
Bhat, B.2
Mueller, F.3
Mohan, S.4
|