2008 |
44 | EE | Liang Xie,
Hui Song,
Sencun Zhu:
On the Effectiveness of Internal Patching Against File-Sharing Worms.
ACNS 2008: 1-20 |
43 | EE | Mohammad M. Masud,
Latifur Khan,
Bhavani M. Thuraisingham,
Xinran Wang,
Peng Liu,
Sencun Zhu:
Detecting Remote Exploits Using Data Mining.
IFIP Int. Conf. Digital Forensics 2008: 177-189 |
42 | EE | Hui Song,
Sencun Zhu,
Guohong Cao:
SVATS: A Sensor-Network-Based Vehicle Anti-Theft System.
INFOCOM 2008: 2128-2136 |
41 | EE | Min Shao,
Yi Yang,
Sencun Zhu,
Guohong Cao:
Towards Statistically Strong Source Anonymity for Sensor Networks.
INFOCOM 2008: 51-55 |
40 | EE | Yi Yang,
Sencun Zhu,
Guohong Cao:
Improving sensor network immunity under worm attacks: a software diversity approach.
MobiHoc 2008: 149-158 |
39 | EE | Yi Yang,
Min Shao,
Sencun Zhu,
Bhuvan Urgaonkar,
Guohong Cao:
Towards event source unobservability with minimum network traffic in sensor networks.
WISEC 2008: 77-88 |
38 | EE | Liang Xie,
Hui Song,
Trent Jaeger,
Sencun Zhu:
A systematic approach for cell-phone worm containment.
WWW 2008: 1083-1084 |
37 | EE | Xinran Wang,
Yoon-chan Jhi,
Sencun Zhu,
Peng Liu:
Protecting web services from remote exploit code: a static analysis approach.
WWW 2008: 1139-1140 |
36 | EE | Liang Xie,
Sencun Zhu:
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification.
ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
35 | EE | Yi Yang,
Xinran Wang,
Sencun Zhu,
Guohong Cao:
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks.
ACM Trans. Inf. Syst. Secur. 11(4): (2008) |
34 | EE | Hui Song,
Sencun Zhu,
Wensheng Zhang,
Guohong Cao:
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks.
TOSN 4(4): (2008) |
2007 |
33 | EE | Min Shao,
Sencun Zhu,
Wensheng Zhang,
Guohong Cao:
pDCS: Security and Privacy Support for Data-Centric Sensor Networks.
INFOCOM 2007: 1298-1306 |
32 | EE | Hui Song,
Liang Xie,
Sencun Zhu,
Guohong Cao:
Sensor node compromise detection: the location perspective.
IWCMC 2007: 242-247 |
31 | EE | Wensheng Zhang,
Minh Tran,
Sencun Zhu,
Guohong Cao:
A random perturbation-based scheme for pairwise key establishment in sensor networks.
MobiHoc 2007: 90-99 |
30 | EE | Liang Xie,
Sencun Zhu:
A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms.
Peer-to-Peer Computing 2007: 61-70 |
29 | EE | Yi Yang,
Xinran Wang,
Sencun Zhu,
Guohong Cao:
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks.
SRDS 2007: 219-230 |
28 | EE | Hui Song,
Sencun Zhu,
Guohong Cao:
Attack-resilient time synchronization for wireless sensor networks.
Ad Hoc Networks 5(1): 112-125 (2007) |
27 | EE | Sencun Zhu,
Chao Yao,
Donggang Liu,
Sanjeev Setia,
Sushil Jajodia:
Efficient security mechanisms for overlay multicast based content delivery.
Computer Communications 30(4): 793-806 (2007) |
26 | EE | Patrick Traynor,
Raju Kumar,
Heesook Choi,
Guohong Cao,
Sencun Zhu,
Thomas F. La Porta:
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks.
IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) |
25 | EE | Qijun Gu,
Peng Liu,
Chao-Hsien Chu,
Sencun Zhu:
Defence against packet injection in ad hoc networks.
IJSN 2(1/2): 154-169 (2007) |
24 | EE | Hung-Yuan Hsu,
Sencun Zhu,
Ali R. Hurson:
LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network.
IJSN 2(3/4): 202-215 (2007) |
23 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia,
Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
TOSN 3(3): (2007) |
2006 |
22 | | Sencun Zhu,
Donggang Liu:
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006
ACM 2006 |
21 | EE | Patrick Traynor,
Heesook Choi,
Guohong Cao,
Sencun Zhu,
Tom La Porta:
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks.
INFOCOM 2006 |
20 | EE | Yi Yang,
Xinran Wang,
Sencun Zhu,
Guohong Cao:
SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks.
MobiHoc 2006: 356-367 |
19 | EE | Sencun Zhu,
Shouhuai Xu,
Sanjeev Setia,
Sushil Jajodia:
LHAP: A lightweight network access control protocol for ad hoc networks.
Ad Hoc Networks 4(5): 567-585 (2006) |
18 | EE | Matthew Pirretti,
Sencun Zhu,
Narayanan Vijaykrishnan,
Patrick McDaniel,
Mahmut T. Kandemir,
Richard R. Brooks:
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
IJDSN 2(3): 267-287 (2006) |
17 | EE | Yingjiu Li,
Sencun Zhu,
Xiaoyang Sean Wang,
Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci. 176(8): 1003-1031 (2006) |
16 | EE | Sencun Zhu,
Sanjeev Setia,
Shouhuai Xu,
Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
Journal of Computer Security 14(4): 301-325 (2006) |
15 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia:
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks.
TOSN 2(4): 500-528 (2006) |
2005 |
14 | EE | Sencun Zhu,
Chao Yao,
Donggang Liu,
Sanjeev Setia,
Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
ACNS 2005: 40-55 |
13 | EE | Wensheng Zhang,
Hui Song,
Sencun Zhu,
Guohong Cao:
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks.
MobiHoc 2005: 378-389 |
12 | EE | Donggang Liu,
Peng Ning,
Sencun Zhu,
Sushil Jajodia:
Practical Broadcast Authentication in Sensor Networks.
MobiQuitous 2005: 118-132 |
2004 |
11 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia,
Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
IEEE Symposium on Security and Privacy 2004: 259-271 |
10 | EE | Sencun Zhu,
Sanjeev Setia,
Shouhuai Xu,
Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
MobiQuitous 2004: 42-51 |
2003 |
9 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks.
ACM Conference on Computer and Communications Security 2003: 62-72 |
8 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia:
Performance Optimizations for Group Key Management Scheme.
ICDCS 2003: 163- |
7 | EE | Sencun Zhu,
Shouhuai Xu,
Sanjeev Setia,
Sushil Jajodia:
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
ICDCS Workshops 2003: 749- |
6 | EE | Sencun Zhu,
Shouhuai Xu,
Sanjeev Setia,
Sushil Jajodia:
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
ICNP 2003: 326-335 |
5 | EE | Sencun Zhu,
Sushil Jajodia:
Scalable Group Rekeying for Secure Multicast: A Survey.
IWDC 2003: 1-10 |
4 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia:
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast.
Networked Group Communication 2003: 107-118 |
3 | EE | Sencun Zhu,
Sanjeev Setia,
Sushil Jajodia:
LEAP - efficient security mechanisms for large-scale distributed sensor networks.
SenSys 2003: 308-309 |
2002 |
2 | EE | Yingjiu Li,
Sencun Zhu,
Lingyu Wang,
Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method.
FoIKS 2002: 148-159 |
1 | | Sanjeev Setia,
Sencun Zhu,
Sushil Jajodia:
A comparative performance analysis of reliable group rekey transport protocols for secure multicast.
Perform. Eval. 49(1/4): 21-41 (2002) |