Year |
Citation |
Score |
2019 |
Harishankar M, Pilaka S, Sharma P, Srinivasan N, Joe-Wong C, Tague P. Procuring Spontaneous Session-Level Resource Guarantees for Real-Time Applications: An Auction Approach Ieee Journal On Selected Areas in Communications. 37: 1534-1548. DOI: 10.1109/Jsac.2019.2916487 |
0.487 |
|
2015 |
Kim YS, Tague P, Lee H, Kim H. A jamming approach to enhance enterprise Wi-Fi secrecy through spatial access control Wireless Networks. 21: 2631-2647. DOI: 10.1007/S11276-015-0935-Y |
0.518 |
|
2015 |
Ricks B, Tague P. Isolation of multiple anonymous attackers in mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 32-45. DOI: 10.1007/978-3-319-25645-0_3 |
0.425 |
|
2014 |
Kim YS, Tague P. Proximity-based wireless access control through considerate jamming Spme 2014 - Proceedings of the Acm Mobicom Workshop On Security and Privacy in Mobile Environments. 19-23. DOI: 10.1145/2646584.2646588 |
0.307 |
|
2014 |
Kim YS, Tian Y, Nguyen LT, Tague P. LAPWiN: Location-aided probing for protecting user privacy in Wi-Fi networks 2014 Ieee Conference On Communications and Network Security, Cns 2014. 427-435. DOI: 10.1109/CNS.2014.6997512 |
0.368 |
|
2014 |
Kim YS, Debruhl B, Tague P. JADE: Jamming-averse routing on cognitive radio mesh networks 2014 Ieee Conference On Communications and Network Security, Cns 2014. 21-28. DOI: 10.1109/CNS.2014.6997461 |
0.502 |
|
2014 |
Debruhl B, Tague P. Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponents Pervasive and Mobile Computing. 12: 244-257. DOI: 10.1016/J.Pmcj.2013.12.005 |
0.331 |
|
2014 |
Athreya AP, Wang X, Kim YS, Tian Y, Tague P. Resistance is not futile: Detecting DDoS attacks without packet inspection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8267: 174-188. DOI: 10.1007/978-3-319-05149-9_11 |
0.489 |
|
2013 |
Adhikarla S, Kang MS, Tague P. Selfish manipulation of cooperative cellular communications via channel fabrication Wisec 2013 - Proceedings of the 6th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 49-54. DOI: 10.1145/2462096.2462105 |
0.371 |
|
2013 |
Wang X, Tague P. ASIA: Accelerated secure in-network aggregation in vehicular sensing networks 2013 Ieee International Conference On Sensing, Communications and Networking, Secon 2013. 514-522. DOI: 10.1109/SAHCN.2013.6645023 |
0.467 |
|
2013 |
Kim YS, Tague P. Wireless mesh network simulator for studying cross-layer jamming effects Proceedings - Ieee 10th International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2013. 437-438. DOI: 10.1109/MASS.2013.92 |
0.527 |
|
2013 |
Kim YS, Debruhl B, Tague P. MeshJam: Intelligent jamming attack and defense in IEEE 802.11s wireless mesh networks Proceedings - Ieee 10th International Conference On Mobile Ad-Hoc and Sensor Systems, Mass 2013. 560-564. DOI: 10.1109/MASS.2013.59 |
0.543 |
|
2013 |
Athreya AP, Tague P. Self-organization of a mesh hierarchy for smart grid monitoring in outage scenarios 2013 Ieee Pes Innovative Smart Grid Technologies Conference, Isgt 2013. DOI: 10.1109/ISGT.2013.6497871 |
0.303 |
|
2013 |
Kim YS, Debruhl B, Tague P. Stochastic optimization of flow-jamming attacks in multichannel wireless networks Ieee International Conference On Communications. 2165-2170. DOI: 10.1109/ICC.2013.6654848 |
0.446 |
|
2012 |
Kim YS, Tague P, Lee H, Kim H. Carving secure Wi-Fi zones with defensive jamming Asiaccs 2012 - 7th Acm Symposium On Information, Computer and Communications Security. 53-54. DOI: 10.1145/2414456.2414487 |
0.408 |
|
2012 |
DeBruhl B, Kim YS, Weinberg Z, Tague P. STIR-ing the wireless medium with self-tuned, inference-based, real-time jamming Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 326-334. DOI: 10.1109/MASS.2012.6502532 |
0.389 |
|
2012 |
Kim YS, Mokaya F, Chen E, Tague P. All your jammers belong to us - Localization of wireless sensors under jamming attack Ieee International Conference On Communications. 949-954. DOI: 10.1109/ICC.2012.6364441 |
0.471 |
|
2011 |
Tague P, Nabar S, Ritcey JA, Poovendran R. Jamming-aware traffic allocation for multiple-path routing using portfolio selection Ieee/Acm Transactions On Networking. 19: 184-194. DOI: 10.1109/Tnet.2010.2057515 |
0.72 |
|
2011 |
Athreya AP, Tague P. Towards secure multi-path routing for wireless mobile ad-hoc networks: A cross-layer strategy 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 146-148. DOI: 10.1109/SAHCN.2011.5984886 |
0.431 |
|
2010 |
Tague P. Improving anti-jamming capability and increasing jamming impact with mobility control 2010 Ieee 7th International Conference On Mobile Adhoc and Sensor Systems, Mass 2010. 501-506. DOI: 10.1109/MASS.2010.5663920 |
0.538 |
|
2009 |
Slater D, Poovendran R, Tague P, Matt BJ. Tradeoffs between jamming resilience and communication efficiency in key establishment Mobile Computing and Communications Review. 13: 14-25. DOI: 10.1145/1558590.1558593 |
0.632 |
|
2009 |
Slater D, Tague P, Poovendran R, Matt BJ. A coding-theoretic approach for efficient message verification over insecure channels Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 151-160. DOI: 10.1145/1514274.1514297 |
0.595 |
|
2009 |
Tague P, Li M, Poovendran R. Mitigation of control channel jamming under node capture attacks Ieee Transactions On Mobile Computing. 8: 1221-1234. DOI: 10.1109/Tmc.2009.33 |
0.611 |
|
2009 |
Tague P, Slater D, Rogers J, Poovendran R. Evaluating the vulnerability of network traffic using joint security and routing analysis Ieee Transactions On Dependable and Secure Computing. 6: 111-123. DOI: 10.1109/Tdsc.2008.60 |
0.712 |
|
2009 |
Slater D, Tague P, Poovendran R, Li M. A game-theoretic framework for jamming attacks and mitigation in commercial aircraft wireless networks Aiaa Infotech At Aerospace Conference and Exhibit and Aiaa Unmanned...Unlimited Conference. |
0.659 |
|
2008 |
Tague P, Slater D, Poovendran R, Noubir G. Linear programming models for jamming attacks on network traffic flows Proceedings of the 6th International Symposium On Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Wiopt 2008. 207-216. DOI: 10.1109/WIOPT.2008.4586066 |
0.587 |
|
2008 |
Tague P, Nabar S, Ritcey JA, Slater D, Poovendran R. Throughput optimization for multipath unicast routing under probabilistic jamming Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2008.4699741 |
0.698 |
|
2008 |
Tague P, Slater D, Rogers J, Poovendran R. Vulnerability of network traffic under node capture attacks using circuit theoretic analysis Proceedings - Ieee Infocom. 664-672. DOI: 10.1109/INFOCOM.2007.41 |
0.694 |
|
2008 |
Tague P, Poovendran R. Modeling node capture attacks in wireless sensor networks 46th Annual Allerton Conference On Communication, Control, and Computing. 1221-1224. DOI: 10.1109/ALLERTON.2008.4797699 |
0.66 |
|
2007 |
Tague P, Poovendran R. A canonical seed assignment model for key predistribution in wireless sensor networks Acm Transactions On Sensor Networks. 3. DOI: 10.1145/1281492.1281494 |
0.688 |
|
2007 |
Tague P, Li M, Poovendran R. Probabilistic mitigation of control channel jamming via random key distribution Ieee International Symposium On Personal, Indoor and Mobile Radio Communications, Pimrc. DOI: 10.1109/PIMRC.2007.4394778 |
0.545 |
|
2007 |
Tague P, Poovendran R. Modeling adaptive node capture attacks in multi-hop wireless networks Ad Hoc Networks. 5: 801-814. DOI: 10.1016/j.adhoc.2007.01.002 |
0.641 |
|
2006 |
Tague P, Poovendran R. A general probabilistic model for improving key assignment in wireless networks 2006 4th International Symposium On Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Wiopt 2006. DOI: 10.1109/WIOPT.2006.1666460 |
0.699 |
|
Show low-probability matches. |