Year |
Citation |
Score |
2019 |
Clark A, Alomair B, Bushnell L, Poovendran R. On the Structure and Computation of Random Walk Times in Finite Graphs Ieee Transactions On Automatic Control. 64: 4470-4483. DOI: 10.1109/Tac.2019.2895299 |
0.659 |
|
2018 |
Clark A, Lee P, Alomair B, Bushnell L, Poovendran R. Combinatorial Algorithms for Control of Biological Regulatory Networks Ieee Transactions On Control of Network Systems. 5: 748-759. DOI: 10.1109/Tcns.2017.2781366 |
0.749 |
|
2018 |
Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach Ieee Transactions On Control of Network Systems. 5: 583-596. DOI: 10.1109/Tcns.2016.2633791 |
0.704 |
|
2017 |
Clark A, Alomair B, Bushnell L, Poovendran R. Input Selection for Performance and Controllability of Structured Linear Descriptor Systems Siam Journal On Control and Optimization. 55: 457-485. DOI: 10.1137/140999888 |
0.728 |
|
2017 |
Ambrosin M, Conti M, Gaspari FD, Poovendran R. LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking Ieee Acm Transactions On Networking. 25: 1206-1219. DOI: 10.1109/Tnet.2016.2626287 |
0.464 |
|
2017 |
Ying X, Roy S, Poovendran R. Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping Ieee Transactions On Cognitive Communications and Networking. 3: 242-254. DOI: 10.1109/Tccn.2017.2701812 |
0.329 |
|
2017 |
Clark A, Alomair B, Bushnell L, Poovendran R. Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework Ieee Transactions On Automatic Control. 62: 5055-5068. DOI: 10.1109/Tac.2017.2680739 |
0.736 |
|
2017 |
Clark A, Alomair B, Bushnell L, Poovendran R. Submodularity in Input Node Selection for Networked Linear Systems: Efficient Algorithms for Performance and Controllability Ieee Control Systems Magazine. 37: 52-74. DOI: 10.1109/Mcs.2017.2743518 |
0.733 |
|
2016 |
Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. A host takeover game model for competing malware Proceedings of the Ieee Conference On Decision and Control. 2016: 4523-4530. DOI: 10.1109/CDC.2015.7402926 |
0.669 |
|
2016 |
Clark A, Alomair B, Bushnell L, Poovendran R. Input selection for disturbance rejection in networked cyber-physical systems Proceedings of the Ieee Conference On Decision and Control. 2016: 954-961. DOI: 10.1109/CDC.2015.7401996 |
0.691 |
|
2015 |
Ambrosin M, Conti M, De Gaspari F, Poovendran R. LineSwitch: Efficiently managing switch flow in Software-Defined Networking while effectively tackling DoS attacks Asiaccs 2015 - Proceedings of the 10th Acm Symposium On Information, Computer and Communications Security. 639-644. DOI: 10.1145/2714576.2714612 |
0.371 |
|
2015 |
Clark A, Alomair B, Bushnell L, Poovendran R. Scalable and distributed submodular maximization with matroid constraints 2015 13th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2015. 435-442. DOI: 10.1109/WIOPT.2015.7151103 |
0.682 |
|
2015 |
Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. Jamming-based adversarial control of network flow allocation: A passivity approach Proceedings of the American Control Conference. 2015: 4710-4716. DOI: 10.1109/ACC.2015.7172071 |
0.726 |
|
2015 |
Lee P, Clark A, Alomair B, Bushnell L, Poovendran R. Passivity-based distributed strategies for stochastic stackelberg security games Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9406: 113-129. DOI: 10.1007/978-3-319-25594-1_7 |
0.71 |
|
2015 |
Clark A, Sun K, Bushnell L, Poovendran R. A game-theoretic approach to IP address randomization in decoy-based cyber defense Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9406: 3-21. DOI: 10.1007/978-3-319-25594-1-1 |
0.315 |
|
2014 |
Lee P, Saleh O, Alomair B, Bushnell L, Poovendran R. Graph-based verification and misbehavior detection in multi-agent networks Hicons 2014 - Proceedings of the 3rd International Conference On High Confidence Networked Systems (Part of Cps Week). 77-84. DOI: 10.1145/2566468.2566477 |
0.707 |
|
2014 |
Clark A, Alomair B, Bushnell L, Poovendran R. Distributed online submodular maximization in resource-constrained networks 2014 12th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2014. 397-404. DOI: 10.1109/WIOPT.2014.6850325 |
0.731 |
|
2014 |
Cao Z, Li K, Li X, McDaniel P, Poovendran R, Wang G, Xiang Y. Guest editors' introduction: Special issue on trust, security, and privacy in parallel and distributed systems Ieee Transactions On Parallel and Distributed Systems. 25: 279-282. DOI: 10.1109/Tpds.2014.4 |
0.399 |
|
2014 |
Alomair B, Poovendran R. Efficient authentication for mobile and pervasive computing Ieee Transactions On Mobile Computing. 13: 469-481. DOI: 10.1109/Tmc.2012.252 |
0.735 |
|
2014 |
Alomair B, Poovendran R. ε-MACs: Toward more secure and more efficient constructions of secure channels Ieee Transactions On Computers. 63: 204-217. DOI: 10.1109/TC.2012.176 |
0.704 |
|
2014 |
Lee P, Clark A, Bushnell L, Poovendran R. A passivity framework for modeling and mitigating wormhole attacks on networked control systems Ieee Transactions On Automatic Control. 59: 3224-3237. DOI: 10.1109/Tac.2014.2351871 |
0.498 |
|
2014 |
Clark A, Alomair B, Bushnell L, Poovendran R. Minimizing convergence error in multi-agent systems via leader selection: A supermodular optimization approach Ieee Transactions On Automatic Control. 59: 1480-1494. DOI: 10.1109/Tac.2014.2303236 |
0.708 |
|
2014 |
Clark A, Bushnell L, Poovendran R. A supermodular optimization framework for leader selection under link noise in linear multi-agent systems Ieee Transactions On Automatic Control. 59: 283-296. DOI: 10.1109/Tac.2013.2281473 |
0.407 |
|
2013 |
Venkatasubramanian KK, Nabar S, Gupta SKS, Poovendran R. Cyber physical security solutions for pervasive health monitoring systems User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications. 1: 447-465. DOI: 10.4018/978-1-4666-2770-3.ch022 |
0.606 |
|
2013 |
Alomair B, Clark A, Cuellar J, Poovendran R. Toward a statistical framework for source anonymity in sensor networks Ieee Transactions On Mobile Computing. 12: 248-260. DOI: 10.1109/Tmc.2011.267 |
0.743 |
|
2013 |
Ren K, Zhu H, Han Z, Poovendran R. Security in cognitive radio networks [Guest Editorial] Ieee Network. 27: 2-3. DOI: 10.1109/Mnet.2013.6523800 |
0.301 |
|
2013 |
Yang C, Alomair B, Poovendran R. Optimized relay-route assignment for anonymity in wireless networks Ieee International Symposium On Information Theory - Proceedings. 76-80. DOI: 10.1109/ISIT.2013.6620191 |
0.751 |
|
2013 |
Clark A, Sun K, Poovendran R. Effectiveness of IP address randomization in decoy-based moving target defense Proceedings of the Ieee Conference On Decision and Control. 678-685. DOI: 10.1109/CDC.2013.6759960 |
0.363 |
|
2013 |
Bonaci T, Lee P, Bushnell L, Poovendran R. A convex optimization approach for clone detection in wireless sensor networks Pervasive and Mobile Computing. 9: 528-545. DOI: 10.1016/J.Pmcj.2012.04.003 |
0.461 |
|
2013 |
Lee P, Clark A, Bushnell L, Poovendran R. Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach Lecture Notes in Control and Information Sciences. 449: 161-175. DOI: 10.1007/978-3-319-01159-2_9 |
0.411 |
|
2013 |
Clark A, Zhu Q, Poovendran R, Basar T. An impact-aware defense against Stuxnet Proceedings of the American Control Conference. 4140-4147. |
0.341 |
|
2012 |
Yang C, Alomair B, Poovendran R. Optimized flow allocation for anonymous communication in multipath wireless networks Ieee International Symposium On Information Theory - Proceedings. 219-223. DOI: 10.1109/ISIT.2012.6283842 |
0.745 |
|
2012 |
Zhu Q, Clark A, Poovendran R, Basar T. Deceptive routing games Proceedings of the Ieee Conference On Decision and Control. 2704-2711. DOI: 10.1109/CDC.2012.6426515 |
0.39 |
|
2012 |
Clark A, Alomair B, Bushnell L, Poovendran R. Leader selection in multi-agent systems for smooth convergence via fast mixing Proceedings of the Ieee Conference On Decision and Control. 818-824. DOI: 10.1109/CDC.2012.6426323 |
0.731 |
|
2012 |
Clark A, Bushnell L, Poovendran R. A passivity-based framework for composing attacks on networked control systems 2012 50th Annual Allerton Conference On Communication, Control, and Computing, Allerton 2012. 1814-1821. DOI: 10.1109/Allerton.2012.6483442 |
0.412 |
|
2012 |
Yang C, Alomair B, Poovendran R. Multipath flow allocation in anonymous wireless networks with dependent sources 2012 50th Annual Allerton Conference On Communication, Control, and Computing, Allerton 2012. 1395-1400. DOI: 10.1109/Allerton.2012.6483381 |
0.73 |
|
2012 |
Clark A, Zhu Q, Poovendran R, Başar T. Deceptive routing in relay networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7638: 171-185. DOI: 10.1007/978-3-642-34266-0_10 |
0.385 |
|
2011 |
Wu H, Nabar S, Poovendran R. An energy framework for the network simulator 3 (ns-3) Simutools 2011 - 4th International Icst Conference On Simulation Tools and Techniques. 222-230. DOI: 10.4108/icst.simutools.2011.245584 |
0.662 |
|
2011 |
Alomair B, Lazos L, Poovendran R. Securing low-cost RFID systems: An unconditionally secure approach Journal of Computer Security. 19: 229-257. DOI: 10.3233/Jcs-2010-0406 |
0.726 |
|
2011 |
Banerjee A, Nabar S, Gupta SK, Poovendran R. Energy-efficient long term physiological monitoring Proceedings - Wireless Health 2011, Wh'11. DOI: 10.1145/2077546.2077566 |
0.574 |
|
2011 |
Nabar S, Banerjee A, Gupta SKS, Poovendran R. Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal Proceedings - Wireless Health 2011, Wh'11. DOI: 10.1145/2077546.2077556 |
0.606 |
|
2011 |
Bonaci T, Lee P, Bushnell L, Poovendran R. Distributed clone detection in wireless sensor networks: An optimization approach 2011 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom 2011 - Digital Proceedings. DOI: 10.1109/WoWMoM.2011.5986169 |
0.378 |
|
2011 |
Tague P, Nabar S, Ritcey JA, Poovendran R. Jamming-aware traffic allocation for multiple-path routing using portfolio selection Ieee/Acm Transactions On Networking. 19: 184-194. DOI: 10.1109/Tnet.2010.2057515 |
0.812 |
|
2011 |
Alomair B, Poovendran R. ε-MACs: Towards more secure and more efficient constructions of secure channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6829: 292-310. DOI: 10.1109/Tc.2012.176 |
0.719 |
|
2011 |
Clark A, Poovendran R. A submodular optimization framework for leader selection in linear multi-agent systems Proceedings of the Ieee Conference On Decision and Control. 3614-3621. DOI: 10.1109/CDC.2011.6160248 |
0.31 |
|
2011 |
Nabar S, Banerjee A, Gupta SKS, Poovendran R. GeM-REM: Generative model-driven resource efficient ECG monitoring in body sensor networks Proceedings - 2011 International Conference On Body Sensor Networks, Bsn 2011. 1-6. DOI: 10.1109/BSN.2011.29 |
0.656 |
|
2011 |
Trappe W, Baliga A, Poovendran R. Opening up the last frontiers for securing the future wireless internet Emerging Wireless Technologies and the Future Mobile Internet. 242-282. DOI: 10.1017/CBO9780511921117.010 |
0.373 |
|
2010 |
Alomair B, Clark A, Poovendran R. The power of primes: Security of authentication based on a universal hash-function family Journal of Mathematical Cryptology. 4: 121-148. DOI: 10.1515/Jmc.2010.005 |
0.672 |
|
2010 |
Nabar S, Banerjee A, Gupta SKS, Poovendran R. Evaluation of body sensor network platforms: A design space and benchmarking analysis Proceedings - Wireless Health 2010, Wh'10. 118-127. DOI: 10.1145/1921081.1921096 |
0.637 |
|
2010 |
Clark A, Poovendran R. A metric for quantifying key exposure vulnerability in wireless sensor networks Ieee Wireless Communications and Networking Conference, Wcnc. DOI: 10.1109/WCNC.2010.5506138 |
0.405 |
|
2010 |
Alomair B, Clark A, Cuellar J, Poovendran R. Scalable RFID systems: A privacy-preserving protocol with constant-time identification Proceedings of the International Conference On Dependable Systems and Networks. 1-10. DOI: 10.1109/Tpds.2011.290 |
0.708 |
|
2010 |
Li M, Koutsopoulos I, Poovendran R. Optimal jamming attack strategies and network defense policies in wireless sensor networks Ieee Transactions On Mobile Computing. 9: 1119-1133. DOI: 10.1109/Tmc.2010.75 |
0.52 |
|
2010 |
Clark A, Hardy R, Poovendran R. A joint performance-vulnerability metric framework for designing ad hoc routing protocols Proceedings - Ieee Military Communications Conference Milcom. 930-935. DOI: 10.1109/MILCOM.2010.5679587 |
0.439 |
|
2010 |
Alomair B, Clark A, Cuellar J, Poovendran R. Statistical framework for source anonymity in sensor networks Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2010.5684248 |
0.686 |
|
2010 |
Bonaci T, Bushnell L, Poovendran R. Node capture attacks in wireless sensor networks: A system theoretic approach Proceedings of the Ieee Conference On Decision and Control. 6765-6772. DOI: 10.1109/CDC.2010.5717499 |
0.421 |
|
2010 |
Nabar S, Walling J, Poovendran R. Minimizing energy consumption in body sensor networks via convex optimization 2010 International Conference On Body Sensor Networks, Bsn 2010. 62-67. DOI: 10.1109/BSN.2010.19 |
0.679 |
|
2010 |
Alomair B, Poovendran R. Privacy versus scalability in radio frequency identification systems Computer Communications. 33: 2155-2163. DOI: 10.1016/J.Comcom.2010.08.006 |
0.693 |
|
2010 |
Alomair B, Poovendran R. Information theoretically secure encryption with almost free authentication Journal of Universal Computer Science. 15: 2937-2956. |
0.695 |
|
2009 |
Slater D, Poovendran R, Tague P, Matt BJ. Tradeoffs between jamming resilience and communication efficiency in key establishment Mobile Computing and Communications Review. 13: 14-25. DOI: 10.1145/1558590.1558593 |
0.723 |
|
2009 |
Slater D, Tague P, Poovendran R, Matt BJ. A coding-theoretic approach for efficient message verification over insecure channels Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 151-160. DOI: 10.1145/1514274.1514297 |
0.692 |
|
2009 |
Lazos L, Poovendran R, Ritcey JA. Analytic evaluation of target detection in heterogeneous wireless sensor networks Acm Transactions On Sensor Networks. 5. DOI: 10.1145/1498915.1498924 |
0.389 |
|
2009 |
Tague P, Li M, Poovendran R. Mitigation of control channel jamming under node capture attacks Ieee Transactions On Mobile Computing. 8: 1221-1234. DOI: 10.1109/Tmc.2009.33 |
0.691 |
|
2009 |
Tague P, Slater D, Rogers J, Poovendran R. Evaluating the vulnerability of network traffic using joint security and routing analysis Ieee Transactions On Dependable and Secure Computing. 6: 111-123. DOI: 10.1109/Tdsc.2008.60 |
0.763 |
|
2009 |
Perrig A, Trappe W, Gligor V, Poovendran R, Lee H. Secure wireless networking Journal of Communications and Networks. 11: 533-537. DOI: 10.1109/Jcn.2009.6388406 |
0.394 |
|
2009 |
Lazos L, Poovendran R, Ritcey JA. Detection of mobile targets on the plane and in space using heterogeneous sensor networks Wireless Networks. 15: 667-690. DOI: 10.1007/S11276-007-0092-Z |
0.387 |
|
2009 |
Alomair B, Poovendran R. Unconditionally secure authenticated encryption with shorter keys Security in Information Systems - Proceedings of the 7th International Workshop On Security in Information Systems - Wosis 2009 in Conjunction With Iceis 2009. 3-15. |
0.704 |
|
2009 |
Sampigethaya K, Poovendran R, Bushnell L. A framework for securing future e-enabled aircraft navigation and surveillance Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference. |
0.323 |
|
2009 |
Alomair B, Sampigethaya K, Clark A, Poovendran R. Towards trustworthy cryptographic protection of airplane information assets Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference. |
0.712 |
|
2009 |
Slater D, Tague P, Poovendran R, Li M. A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference. |
0.714 |
|
2008 |
Tague P, Slater D, Poovendran R, Noubir G. Linear programming models for jamming attacks on network traffic flows Proceedings of the 6th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2008. 207-216. DOI: 10.1109/WIOPT.2008.4586066 |
0.665 |
|
2008 |
Tague P, Nabar S, Ritcey JA, Slater D, Poovendran R. Throughput optimization for multipath unicast routing under probabilistic jamming Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2008.4699741 |
0.792 |
|
2008 |
Alomair B, Poovendran R. On the authentication of RFID systems with bitwise operations Proceedings of New Technologies, Mobility and Security Conference and Workshops, Ntms 2008. DOI: 10.1109/NTMS.2008.ECP.74 |
0.693 |
|
2008 |
Tague P, Slater D, Rogers J, Poovendran R. Vulnerability of network traffic under node capture attacks using circuit theoretic analysis Proceedings - Ieee Infocom. 664-672. DOI: 10.1109/INFOCOM.2007.41 |
0.729 |
|
2008 |
Tague P, Poovendran R. Modeling node capture attacks in wireless sensor networks 46th Annual Allerton Conference On Communication, Control, and Computing. 1221-1224. DOI: 10.1109/ALLERTON.2008.4797699 |
0.716 |
|
2008 |
Alomair B, Sampigethaya K, Poovendran R. Efficient generic forward-secure signatures and proxy signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5057: 166-181. DOI: 10.1007/978-3-540-69485-4_12 |
0.68 |
|
2008 |
Sampigethaya K, Poovendran R, Bushnell L. Security of future eEnabled aircraft ad hoc networks 8th Aiaa Aviation Technology, Integration and Operations (Atio) Conference. |
0.351 |
|
2007 |
Tague P, Poovendran R. A canonical seed assignment model for key predistribution in wireless sensor networks Acm Transactions On Sensor Networks. 3. DOI: 10.1145/1281492.1281494 |
0.752 |
|
2007 |
Salido J, Lazos L, Poovendran R. Energy and bandwidth-efficient key distribution in wireless Ad Hoc networks: A cross-layer approach Ieee/Acm Transactions On Networking. 15: 1527-1540. DOI: 10.1109/Tnet.2007.902696 |
0.461 |
|
2007 |
Tague P, Li M, Poovendran R. Probabilistic mitigation of control channel jamming via random key distribution Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2007.4394778 |
0.639 |
|
2007 |
Sampigethaya K, Li M, Poovendran R, Robinson R, Bushnell L, Lintelman S. Secure wireless collection and distribution of commercial airplane health data Aiaa/Ieee Digital Avionics Systems Conference - Proceedings. DOI: 10.1109/Maes.2009.5208555 |
0.485 |
|
2007 |
Sampigethaya K, Li M, Huang L, Poovendran R. AMOEBA: Robust location privacy scheme for VANET Ieee Journal On Selected Areas in Communications. 25: 1569-1589. DOI: 10.1109/Jsac.2007.071007 |
0.45 |
|
2007 |
Li M, Koutsopoulos I, Poovendran R. Optimal jamming attacks and network defense policies in wireless sensor networks Proceedings - Ieee Infocom. 1307-1315. DOI: 10.1109/INFCOM.2007.155 |
0.425 |
|
2007 |
Tague P, Poovendran R. Modeling adaptive node capture attacks in multi-hop wireless networks Ad Hoc Networks. 5: 801-814. DOI: 10.1016/j.adhoc.2007.01.002 |
0.699 |
|
2007 |
Lazos L, Poovendran R. Power proximity based key management for secure multicast in ad hoc networks Wireless Networks. 13: 127-148. DOI: 10.1007/S11276-006-6057-9 |
0.504 |
|
2007 |
Poovendran R, Lazos L. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks Wireless Networks. 13: 27-59. DOI: 10.1007/S11276-006-3723-X |
0.519 |
|
2007 |
Lazos L, Poovendran R. Secure localization for wireless sensor networks using range-independent methods Advances in Information Security. 30: 185-214. |
0.323 |
|
2007 |
Alomair B, Lazos L, Poovendran R. Passive attacks on a class of authentication protocols for RFID Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4817: 102-115. |
0.654 |
|
2007 |
Poovendran R, Wang C, Roy S. Secure localization and time synchronization for wireless sensor and Ad Hoc networks Advances in Information Security. 30. |
0.327 |
|
2007 |
Robinson RV, Sampigethaya K, Li M, Lintelman S, Poovendran R, Von Oheimb D. Challenges for IT infrastructure supporting secure network-enabled commercial airplane operations Collection of Technical Papers - 2007 Aiaa Infotech At Aerospace Conference. 2: 1845-1851. |
0.395 |
|
2007 |
Meadows C, Poovendran R, Pavlovic D, Chang LW, Syverson P. Distance bounding protocols: Authentication logic analysis and collusion attacks Advances in Information Security. 30: 279-298. |
0.4 |
|
2007 |
Robinson RV, Li M, Lintelman SA, Sampigethaya K, Poovendran R, Von Oheimb D, Bußer JU. Impact of public key enabled applications on the operation and maintenance of commercial airplanes Collection of Technical Papers - 7th Aiaa Aviation Technology, Integration, and Operations Conference. 1: 750-759. |
0.304 |
|
2007 |
Robinson R, Li M, Lintelman S, Sampigethaya K, Poovendran R, Von Oheimb D, Bußer JU, Cuellar J. Electronic distribution of airplane software and the impact of information security on airplane safety Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4680: 28-39. |
0.303 |
|
2006 |
Li M, Sampigethaya K, Huang L, Poovendran R. Swing & swap: User-centric approaches towards maximizing location privacy Proceedings of the Acm Conference On Computer and Communications Security. 19-28. DOI: 10.1145/1179601.1179605 |
0.327 |
|
2006 |
Lazos L, Poovendran R. Stochastic coverage in heterogeneous sensor networks Acm Transactions On Sensor Networks. 2: 325-358. DOI: 10.1145/1167935.1167937 |
0.406 |
|
2006 |
Tague P, Poovendran R. A general probabilistic model for improving key assignment in wireless networks 2006 4th International Symposium On Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Wiopt 2006. DOI: 10.1109/WIOPT.2006.1666460 |
0.733 |
|
2006 |
Li M, Poovendran R. Disenrollment with perfect forward secrecy in threshold schemes Ieee Transactions On Information Theory. 52: 1676-1682. DOI: 10.1109/Tit.2006.871050 |
0.362 |
|
2006 |
Lazos L, Poovendran R. HiRLoc: High-resolution robust localization for wireless sensor networks Ieee Journal On Selected Areas in Communications. 24: 233-246. DOI: 10.1109/Jsac.2005.861381 |
0.483 |
|
2006 |
Anjum F, Ghosh AK, Golmie N, Kolodzy P, Poovendran R, Shorey R. Guest editorial security in wireless ad hoc networks Ieee Journal On Selected Areas in Communications. 24: 217-218. DOI: 10.1109/Jsac.2005.861070 |
0.45 |
|
2006 |
Sampigethaya K, Poovendran R. A survey on mix networks and their secure applications Proceedings of the Ieee. 94: 2142-2180. DOI: 10.1109/JPROC.2006.889687 |
0.354 |
|
2006 |
Sampigethaya K, Poovendran R. A framework and taxonomy for comparison of electronic voting schemes Computers and Security. 25: 137-153. DOI: 10.1016/J.Cose.2005.11.003 |
0.335 |
|
2005 |
Poovendran R. Information assurance in manets and wireless sensor networks Sasn'05 - Proceedings of the 2005 Acm Workshop On Security of Ad Hoc and Sensor Networks. 2005: 32. DOI: 10.1145/1102219.1102220 |
0.408 |
|
2005 |
Lazos L, Poovendran R. SeRLoc: Robust localization for wireless sensor networks Acm Transactions On Sensor Networks. 1: 73-100. DOI: 10.1145/1077391.1077395 |
0.487 |
|
2005 |
Kang I, Poovendran R. Scalable power-efficient broadcast over densely deployed wireless ad hoc networks Ieee Wireless Communications and Networking Conference, Wcnc. 4: 2063-2068. DOI: 10.1109/WCNC.2005.1424836 |
0.628 |
|
2005 |
Lazos L, Poovendran R, Meadows C, Syverson P, Chang LW. Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach Ieee Wireless Communications and Networking Conference, Wcnc. 2: 1193-1199. DOI: 10.1109/WCNC.2005.1424678 |
0.387 |
|
2005 |
Lazos L, Poovendran R, Čapkun S. ROPE: Robust position estimation in wireless sensor networks 2005 4th International Symposium On Information Processing in Sensor Networks, Ipsn 2005. 2005: 324-331. DOI: 10.1109/IPSN.2005.1440942 |
0.326 |
|
2005 |
Chan SP, Poovendran R, Sun MT. A key management scheme in distributed sensor networks using attack probabilities Globecom - Ieee Global Telecommunications Conference. 2: 1007-1011. DOI: 10.1109/GLOCOM.2005.1577788 |
0.38 |
|
2005 |
Li M, Poovendran R, McGrew DA. Minimizing center key storage in hybrid one-way function based group key management with communication constraints Information Processing Letters. 93: 191-198. DOI: 10.1016/J.Ipl.2004.10.012 |
0.354 |
|
2005 |
Kang I, Poovendran R. Maximizing network lifetime of broadcasting over wireless stationary ad hoc networks Mobile Networks and Applications. 10: 879-896. DOI: 10.1007/S11036-005-4445-5 |
0.654 |
|
2005 |
Kang I, Poovendran R. Iterated local optimization for minimum energy broadcast Proceedings - Wiopt 2005: Third International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks. 2005: 332-341. |
0.571 |
|
2004 |
Kang I, Poovendran R. Broadcast with heterogeneous node capability Globecom - Ieee Global Telecommunications Conference. 6: 4114-4119. |
0.62 |
|
2004 |
Kang I, Poovendran R. COBRA: Center-oriented broadcast routing algorithms for wireless ad hoc networks 2004 Ieee Wireless Communications and Networking Conference, Wcnc 2004. 2: 813-818. |
0.618 |
|
2004 |
Kang I, Poovendran R. Design issues on broadcast routing algorithms using realistic cost-effective smart antenna models Ieee Vehicular Technology Conference. 59: 2121-2125. |
0.579 |
|
2004 |
Lazos L, Poovendran R. Cross-layer design for energy-efficient secure multicast communications in ad hoc networks Ieee International Conference On Communications. 6: 3633-3639. |
0.342 |
|
2004 |
Lazos L, Salido J, Poovendran R. VP3: Using vertex path and power proximity for energy efficient key distribution Ieee Vehicular Technology Conference. 60: 1228-1232. |
0.346 |
|
2003 |
Trappe W, Song J, Poovendran R, Liu KJR. Key Management and Distribution for Secure Multimedia Multicast Ieee Transactions On Multimedia. 5: 544-557. DOI: 10.1109/Tmm.2003.813279 |
0.302 |
|
2003 |
Lazos L, Poovendran R. Energy-aware secure multicast communication in ad-hoc networks using geographic location information Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 4: 201-204. |
0.352 |
|
2003 |
Kang I, Poovendran R. Maximizing static network lifetime of wireless broadcast adhoc networks Ieee International Conference On Communications. 3: 2256-2261. |
0.634 |
|
2003 |
Kang I, Poovendran R. A Comparison of Power-Efficient Broadcast Routing Algorithms Globecom - Ieee Global Telecommunications Conference. 1: 387-392. |
0.556 |
|
2003 |
Kang I, Poovendran R. S-GPBE: A Power-Efficient Broadcast Routing Algorithm Using Sectored Antenna Proceedings of the Iasted International Conference On Wireless and Optical Communications. 3: 34-39. |
0.496 |
|
2003 |
Kang I, Poovendran R. A novel power-efficient broadcast routing algorithm exploiting broadcast efficiency Ieee Vehicular Technology Conference. 58: 2926-2930. |
0.504 |
|
2002 |
Kang I, Poovendran R. On the lifetime extension of energy-efficient multihop broadcast networks Proceedings of the International Joint Conference On Neural Networks. 1: 365-370. |
0.624 |
|
2001 |
Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes Ieee Transactions On Information Theory. 47: 2824-2834. DOI: 10.1109/18.959263 |
0.578 |
|
Show low-probability matches. |