Year |
Citation |
Score |
2020 |
Choudhary G, Astillo PV, You I, Yim K, Chen I, Cho J. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems Ieee Transactions On Network and Service Management. 1-1. DOI: 10.1109/Tnsm.2020.3007535 |
0.489 |
|
2020 |
Yoon S, Cho J, Kim DS, Moore TJ, Free-Nelson F, Lim H. Attack Graph-based Moving Target Defense in Software-Defined Networks Ieee Transactions On Network and Service Management. 17: 1653-1668. DOI: 10.1109/Tnsm.2020.2987085 |
0.489 |
|
2020 |
Cho J, Sharma DP, Alavizadeh H, Yoon S, Ben-Asher N, Moore TJ, Kim DS, Lim H, Nelson FF. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense Ieee Communications Surveys and Tutorials. 22: 709-745. DOI: 10.1109/Comst.2019.2963791 |
0.373 |
|
2020 |
Al-Hamadi H, Saoud M, Chen I, Cho J. Optimizing the Lifetime of IoT-Based Star and Mesh Networks Ieee Access. 8: 63090-63105. DOI: 10.1109/Access.2020.2983873 |
0.63 |
|
2020 |
Sharma DP, Enoch SY, Cho J, Moore TJ, Nelson FF, Lim H, Kim DS. Dynamic security metrics for software-defined network-based moving target defense Journal of Network and Computer Applications. 170: 102805. DOI: 10.1016/J.Jnca.2020.102805 |
0.462 |
|
2019 |
Cho J, Xu S, Hurley PM, Mackay M, Benjamin T, Beaumont M. STRAM Acm Computing Surveys. 51: 1-47. DOI: 10.1145/3277666 |
0.33 |
|
2019 |
Moore TJ, Cho J, Chen I. Network Adaptations Under Cascading Failures for Mission-Oriented Networks Ieee Transactions On Network and Service Management. 16: 1184-1198. DOI: 10.1109/Tnsm.2019.2917934 |
0.617 |
|
2019 |
Mireles JD, Ficke E, Cho J, Hurley P, Xu S. Metrics Towards Measuring Cyber Agility Ieee Transactions On Information Forensics and Security. 14: 3217-3232. DOI: 10.1109/Tifs.2019.2912551 |
0.36 |
|
2019 |
Cho J, Al-Hamadi H, Chen I. COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks Ieee Access. 7: 92296-92313. DOI: 10.1109/Access.2019.2927729 |
0.584 |
|
2019 |
Sharma V, You I, Yim K, Chen I, Cho J. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems Ieee Access. 7: 118556-118580. DOI: 10.1109/Access.2019.2917135 |
0.566 |
|
2019 |
Al-Hamadi H, Chen I, Cho J. Trust Management of Smart Service Communities Ieee Access. 7: 26362-26378. DOI: 10.1109/Access.2019.2901023 |
0.541 |
|
2018 |
Wang Y, Chen I, Cho J, Swami A, Lu Y, Lu C, Tsai JJP. CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks Ieee Transactions On Services Computing. 11: 908-921. DOI: 10.1109/Tsc.2016.2587259 |
0.605 |
|
2018 |
Cho J, Chen I. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 15: 151-165. DOI: 10.1109/Tdsc.2016.2530705 |
0.66 |
|
2018 |
Cho J. Dynamics of Uncertain and Conflicting Opinions in Social Networks Ieee Transactions On Computational Social Systems. 5: 518-531. DOI: 10.1109/Tcss.2018.2826532 |
0.355 |
|
2018 |
Errapotu SM, Wang J, Gong Y, Cho J, Pan M, Han Z. SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT Ieee Internet of Things Journal. 5: 4380-4391. DOI: 10.1109/Jiot.2018.2866998 |
0.408 |
|
2017 |
Pendleton M, Garcia-Lebron R, Cho J, Xu S. A Survey on Systems Security Metrics Acm Computing Surveys. 49: 62. DOI: 10.1145/3005714 |
0.36 |
|
2017 |
Wang Y, Chen I, Cho J, Swami A, Chan KS. Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks Ieee Transactions On Services Computing. 10: 660-672. DOI: 10.1109/Tsc.2015.2491285 |
0.589 |
|
2017 |
Wang Y, Chen I, Cho J, Tsai JJP. Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks Ieee Transactions On Network and Service Management. 14: 217-232. DOI: 10.1109/Tnsm.2016.2636454 |
0.637 |
|
2017 |
Cho J, Wang Y, Chen I, Chan KS, Swami A. A Survey on Modeling and Optimizing Multi-Objective Systems Ieee Communications Surveys and Tutorials. 19: 1867-1901. DOI: 10.1109/Comst.2017.2698366 |
0.52 |
|
2016 |
Cho JH, Gao J. Cyber War Game in Temporal Networks. Plos One. 11: e0148674. PMID 26859840 DOI: 10.1371/Journal.Pone.0148674 |
0.461 |
|
2015 |
Cho JH. Tradeoffs between trust and survivability for mission effectiveness in tactical networks. Ieee Transactions On Cybernetics. 45: 754-66. PMID 25069134 DOI: 10.1109/Tcyb.2014.2335744 |
0.48 |
|
2015 |
Cho JH, Chan K, Adali S. A Survey on Trust Modeling Acm Computing Surveys. 48. DOI: 10.1145/2815595 |
0.42 |
|
2015 |
Adalı S, Chan K, Cho JH. TANDEM: a trust-based agent framework for networked decision making Computational and Mathematical Organization Theory. DOI: 10.1007/S10588-015-9193-X |
0.45 |
|
2014 |
Chen I, Bao F, Chang M, Cho J. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing Ieee Transactions On Parallel and Distributed Systems. 25: 1200-1210. DOI: 10.1109/Tpds.2013.116 |
0.716 |
|
2013 |
Cho J, Chan KS. Building Trust-Based Sustainable Networks Ieee Technology and Society Magazine. 32: 32-38. DOI: 10.1109/Mts.2013.2259311 |
0.408 |
|
2012 |
Bao F, Chen I, Chang M, Cho J. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Ieee Transactions On Network and Service Management. 9: 169-183. DOI: 10.1109/Tcomm.2012.031912.110179 |
0.701 |
|
2012 |
Cho J, Swami A, Chen I. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks Journal of Network and Computer Applications. 35: 1001-1012. DOI: 10.1016/J.Jnca.2011.03.016 |
0.659 |
|
2012 |
Chen I, Bao F, Chang M, Cho J. Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks Wireless Personal Communications. 66: 443-459. DOI: 10.1007/S11277-011-0351-2 |
0.699 |
|
2011 |
Cho J, Swami A, Chen I. A Survey on Trust Management for Mobile Ad Hoc Networks Ieee Communications Surveys and Tutorials. 13: 562-583. DOI: 10.1109/Surv.2011.092110.00088 |
0.649 |
|
2011 |
Cho J, Chen I. Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks Performance Evaluation. 68: 58-75. DOI: 10.1016/J.Peva.2010.09.005 |
0.67 |
|
2011 |
Cho J, Chen I. Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems Wireless Personal Communications. 60: 725-750. DOI: 10.1007/S11277-010-9971-1 |
0.638 |
|
2010 |
Cho J, Chen I, Feng P. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Ieee Transactions On Reliability. 59: 231-241. DOI: 10.1109/Tr.2010.2040534 |
0.632 |
|
2010 |
Cho J, Chen I. Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks Wireless Networks. 16: 1157-1173. DOI: 10.1007/S11276-009-0194-X |
0.646 |
|
2008 |
Cho J, Chen I, Wang D. Performance optimization of region-based group key management in mobile ad hoc networks Performance Evaluation. 65: 319-344. DOI: 10.1016/J.Peva.2007.07.002 |
0.63 |
|
2008 |
Cho JH, Chen IR, Eltoweissy M. On optimal batch rekeying for secure group communications in wireless networks Wireless Networks. 14: 915-927. DOI: 10.1007/S11276-007-0032-Y |
0.632 |
|
Show low-probability matches. |