dblp.uni-trier.dewww.uni-trier.de

Sencun Zhu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
44EELiang Xie, Hui Song, Sencun Zhu: On the Effectiveness of Internal Patching Against File-Sharing Worms. ACNS 2008: 1-20
43EEMohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu, Sencun Zhu: Detecting Remote Exploits Using Data Mining. IFIP Int. Conf. Digital Forensics 2008: 177-189
42EEHui Song, Sencun Zhu, Guohong Cao: SVATS: A Sensor-Network-Based Vehicle Anti-Theft System. INFOCOM 2008: 2128-2136
41EEMin Shao, Yi Yang, Sencun Zhu, Guohong Cao: Towards Statistically Strong Source Anonymity for Sensor Networks. INFOCOM 2008: 51-55
40EEYi Yang, Sencun Zhu, Guohong Cao: Improving sensor network immunity under worm attacks: a software diversity approach. MobiHoc 2008: 149-158
39EEYi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, Guohong Cao: Towards event source unobservability with minimum network traffic in sensor networks. WISEC 2008: 77-88
38EELiang Xie, Hui Song, Trent Jaeger, Sencun Zhu: A systematic approach for cell-phone worm containment. WWW 2008: 1083-1084
37EEXinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu: Protecting web services from remote exploit code: a static analysis approach. WWW 2008: 1139-1140
36EELiang Xie, Sencun Zhu: Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
35EEYi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(4): (2008)
34EEHui Song, Sencun Zhu, Wensheng Zhang, Guohong Cao: Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. TOSN 4(4): (2008)
2007
33EEMin Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao: pDCS: Security and Privacy Support for Data-Centric Sensor Networks. INFOCOM 2007: 1298-1306
32EEHui Song, Liang Xie, Sencun Zhu, Guohong Cao: Sensor node compromise detection: the location perspective. IWCMC 2007: 242-247
31EEWensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao: A random perturbation-based scheme for pairwise key establishment in sensor networks. MobiHoc 2007: 90-99
30EELiang Xie, Sencun Zhu: A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. Peer-to-Peer Computing 2007: 61-70
29EEYi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks. SRDS 2007: 219-230
28EEHui Song, Sencun Zhu, Guohong Cao: Attack-resilient time synchronization for wireless sensor networks. Ad Hoc Networks 5(1): 112-125 (2007)
27EESencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007)
26EEPatrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta: Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007)
25EEQijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu: Defence against packet injection in ad hoc networks. IJSN 2(1/2): 154-169 (2007)
24EEHung-Yuan Hsu, Sencun Zhu, Ali R. Hurson: LIP: a lightweight interlayer protocol for preventing packet injection attacks in mobile ad hoc network. IJSN 2(3/4): 202-215 (2007)
23EESencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007)
2006
22 Sencun Zhu, Donggang Liu: Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
21EEPatrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta: Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006
20EEYi Yang, Xinran Wang, Sencun Zhu, Guohong Cao: SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks. MobiHoc 2006: 356-367
19EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006)
18EEMatthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick McDaniel, Mahmut T. Kandemir, Richard R. Brooks: The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. IJDSN 2(3): 267-287 (2006)
17EEYingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006)
16EESencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006)
15EESencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006)
2005
14EESencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55
13EEWensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao: Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. MobiHoc 2005: 378-389
12EEDonggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
2004
11EESencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271
10EESencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51
2003
9EESencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72
8EESencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163-
7EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749-
6EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335
5EESencun Zhu, Sushil Jajodia: Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10
4EESencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118
3EESencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309
2002
2EEYingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
1 Sanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002)

Coauthor Index

1Richard R. Brooks [18]
2Guohong Cao [13] [20] [21] [26] [28] [29] [31] [32] [33] [34] [35] [39] [40] [41] [42]
3Heesook Choi [21] [26]
4Chao-Hsien Chu [25]
5Qijun Gu [25]
6Hung-Yuan Hsu [24]
7Ali R. Hurson (A. R. Hurson) [24]
8Trent Jaeger [38]
9Sushil Jajodia [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [14] [15] [16] [17] [19] [23] [27]
10Yoon-chan Jhi [37]
11Mahmut T. Kandemir [18]
12Latifur Khan [43]
13Raju Kumar [26]
14Yingjiu Li [2] [17]
15Donggang Liu [12] [14] [22] [27]
16Peng Liu [25] [37] [43]
17Mohammad M. Masud [43]
18Patrick Drew McDaniel (Patrick McDaniel) [18]
19Peng Ning [11] [12] [23]
20Matthew Pirretti [18]
21Thomas F. La Porta (Tom La Porta) [21] [26]
22Sanjeev Setia [1] [3] [4] [6] [7] [8] [9] [10] [11] [14] [15] [16] [19] [23] [27]
23Min Shao [33] [39] [41]
24Hui Song [13] [28] [32] [34] [38] [42] [44]
25Bhavani M. Thuraisingham [43]
26Minh Tran [31]
27Patrick Traynor [21] [26]
28Bhuvan Urgaonkar [39]
29Narayanan Vijaykrishnan (Vijaykrishnan Narayanan) [18]
30Lingyu Wang [2]
31Xiaoyang Sean Wang [17]
32Xinran Wang [20] [29] [35] [37] [43]
33Liang Xie [30] [32] [36] [38] [44]
34Shouhuai Xu [6] [7] [10] [16] [19]
35Yi Yang [20] [29] [35] [39] [40] [41]
36Chao Yao [14] [27]
37Wensheng Zhang [13] [31] [33] [34]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)