Jin-Hee Cho, Ph.D. - Publications

Affiliations: 
2008 Virginia Polytechnic Institute and State University, Blacksburg, VA, United States 
Area:
Computer Science

35 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Choudhary G, Astillo PV, You I, Yim K, Chen I, Cho J. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems Ieee Transactions On Network and Service Management. 1-1. DOI: 10.1109/Tnsm.2020.3007535  0.489
2020 Yoon S, Cho J, Kim DS, Moore TJ, Free-Nelson F, Lim H. Attack Graph-based Moving Target Defense in Software-Defined Networks Ieee Transactions On Network and Service Management. 17: 1653-1668. DOI: 10.1109/Tnsm.2020.2987085  0.489
2020 Cho J, Sharma DP, Alavizadeh H, Yoon S, Ben-Asher N, Moore TJ, Kim DS, Lim H, Nelson FF. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense Ieee Communications Surveys and Tutorials. 22: 709-745. DOI: 10.1109/Comst.2019.2963791  0.373
2020 Al-Hamadi H, Saoud M, Chen I, Cho J. Optimizing the Lifetime of IoT-Based Star and Mesh Networks Ieee Access. 8: 63090-63105. DOI: 10.1109/Access.2020.2983873  0.63
2020 Sharma DP, Enoch SY, Cho J, Moore TJ, Nelson FF, Lim H, Kim DS. Dynamic security metrics for software-defined network-based moving target defense Journal of Network and Computer Applications. 170: 102805. DOI: 10.1016/J.Jnca.2020.102805  0.462
2019 Cho J, Xu S, Hurley PM, Mackay M, Benjamin T, Beaumont M. STRAM Acm Computing Surveys. 51: 1-47. DOI: 10.1145/3277666  0.33
2019 Moore TJ, Cho J, Chen I. Network Adaptations Under Cascading Failures for Mission-Oriented Networks Ieee Transactions On Network and Service Management. 16: 1184-1198. DOI: 10.1109/Tnsm.2019.2917934  0.617
2019 Mireles JD, Ficke E, Cho J, Hurley P, Xu S. Metrics Towards Measuring Cyber Agility Ieee Transactions On Information Forensics and Security. 14: 3217-3232. DOI: 10.1109/Tifs.2019.2912551  0.36
2019 Cho J, Al-Hamadi H, Chen I. COSTA: Composite Trust-Based Asset-Task Assignment in Mobile Ad Hoc Networks Ieee Access. 7: 92296-92313. DOI: 10.1109/Access.2019.2927729  0.584
2019 Sharma V, You I, Yim K, Chen I, Cho J. BRIoT: Behavior Rule Specification-Based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems Ieee Access. 7: 118556-118580. DOI: 10.1109/Access.2019.2917135  0.566
2019 Al-Hamadi H, Chen I, Cho J. Trust Management of Smart Service Communities Ieee Access. 7: 26362-26378. DOI: 10.1109/Access.2019.2901023  0.541
2018 Wang Y, Chen I, Cho J, Swami A, Lu Y, Lu C, Tsai JJP. CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks Ieee Transactions On Services Computing. 11: 908-921. DOI: 10.1109/Tsc.2016.2587259  0.605
2018 Cho J, Chen I. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks Ieee Transactions On Dependable and Secure Computing. 15: 151-165. DOI: 10.1109/Tdsc.2016.2530705  0.66
2018 Cho J. Dynamics of Uncertain and Conflicting Opinions in Social Networks Ieee Transactions On Computational Social Systems. 5: 518-531. DOI: 10.1109/Tcss.2018.2826532  0.355
2018 Errapotu SM, Wang J, Gong Y, Cho J, Pan M, Han Z. SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT Ieee Internet of Things Journal. 5: 4380-4391. DOI: 10.1109/Jiot.2018.2866998  0.408
2017 Pendleton M, Garcia-Lebron R, Cho J, Xu S. A Survey on Systems Security Metrics Acm Computing Surveys. 49: 62. DOI: 10.1145/3005714  0.36
2017 Wang Y, Chen I, Cho J, Swami A, Chan KS. Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks Ieee Transactions On Services Computing. 10: 660-672. DOI: 10.1109/Tsc.2015.2491285  0.589
2017 Wang Y, Chen I, Cho J, Tsai JJP. Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks Ieee Transactions On Network and Service Management. 14: 217-232. DOI: 10.1109/Tnsm.2016.2636454  0.637
2017 Cho J, Wang Y, Chen I, Chan KS, Swami A. A Survey on Modeling and Optimizing Multi-Objective Systems Ieee Communications Surveys and Tutorials. 19: 1867-1901. DOI: 10.1109/Comst.2017.2698366  0.52
2016 Cho JH, Gao J. Cyber War Game in Temporal Networks. Plos One. 11: e0148674. PMID 26859840 DOI: 10.1371/Journal.Pone.0148674  0.461
2015 Cho JH. Tradeoffs between trust and survivability for mission effectiveness in tactical networks. Ieee Transactions On Cybernetics. 45: 754-66. PMID 25069134 DOI: 10.1109/Tcyb.2014.2335744  0.48
2015 Cho JH, Chan K, Adali S. A Survey on Trust Modeling Acm Computing Surveys. 48. DOI: 10.1145/2815595  0.42
2015 Adalı S, Chan K, Cho JH. TANDEM: a trust-based agent framework for networked decision making Computational and Mathematical Organization Theory. DOI: 10.1007/S10588-015-9193-X  0.45
2014 Chen I, Bao F, Chang M, Cho J. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing Ieee Transactions On Parallel and Distributed Systems. 25: 1200-1210. DOI: 10.1109/Tpds.2013.116  0.716
2013 Cho J, Chan KS. Building Trust-Based Sustainable Networks Ieee Technology and Society Magazine. 32: 32-38. DOI: 10.1109/Mts.2013.2259311  0.408
2012 Bao F, Chen I, Chang M, Cho J. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Ieee Transactions On Network and Service Management. 9: 169-183. DOI: 10.1109/Tcomm.2012.031912.110179  0.701
2012 Cho J, Swami A, Chen I. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks Journal of Network and Computer Applications. 35: 1001-1012. DOI: 10.1016/J.Jnca.2011.03.016  0.659
2012 Chen I, Bao F, Chang M, Cho J. Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks Wireless Personal Communications. 66: 443-459. DOI: 10.1007/S11277-011-0351-2  0.699
2011 Cho J, Swami A, Chen I. A Survey on Trust Management for Mobile Ad Hoc Networks Ieee Communications Surveys and Tutorials. 13: 562-583. DOI: 10.1109/Surv.2011.092110.00088  0.649
2011 Cho J, Chen I. Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks Performance Evaluation. 68: 58-75. DOI: 10.1016/J.Peva.2010.09.005  0.67
2011 Cho J, Chen I. Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems Wireless Personal Communications. 60: 725-750. DOI: 10.1007/S11277-010-9971-1  0.638
2010 Cho J, Chen I, Feng P. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks Ieee Transactions On Reliability. 59: 231-241. DOI: 10.1109/Tr.2010.2040534  0.632
2010 Cho J, Chen I. Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks Wireless Networks. 16: 1157-1173. DOI: 10.1007/S11276-009-0194-X  0.646
2008 Cho J, Chen I, Wang D. Performance optimization of region-based group key management in mobile ad hoc networks Performance Evaluation. 65: 319-344. DOI: 10.1016/J.Peva.2007.07.002  0.63
2008 Cho JH, Chen IR, Eltoweissy M. On optimal batch rekeying for secure group communications in wireless networks Wireless Networks. 14: 915-927. DOI: 10.1007/S11276-007-0032-Y  0.632
Show low-probability matches.