Name
Affiliation
Papers
THOMAS LA PORTA
Pennsylvania State University
40
Collaborators
Citations 
PageRank 
92
801
91.33
Referers 
Referees 
References 
1978
1199
537
Search Limit
1001000
Title
Citations
PageRank
Year
Link State Estimation Under Cyber-Physical Attacks: Theory and Algorithms00.342022
Reducing the Cost of Consistency: Performance Improvements in Next Generation Cellular Networks With Optimal Resource Reallocation00.342022
Preventing Outages Under Coordinated Cyber–Physical Attack With Secured PMUs00.342022
Scalable Resource Allocation Techniques for Edge Computing Systems00.342022
VidQ: Video Query Using Optimized Audio-Visual Processing00.342021
Budget-Constrained Reinforcement of SCADA for Cascade Mitigation10.362021
<italic>MLSNet:</italic> A Policy Complying Multilevel Security Framework for Software Defined Networking10.352021
Minimizing Rate Variability with Effective Resource Utilization in 5G Networks10.352021
Power Grid State Estimation under General Cyber-Physical Attacks00.342020
Large-Scale Hybrid ad hoc Network for Mobile Platforms: Challenges and Experiences00.342019
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures00.342019
On Progressive Network Recovery From Massive Failures Under Uncertainty10.362019
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud10.382019
A Computing Platform for Video Crowdprocessing Using Deep Learning.00.342018
Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices.90.602017
Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge10.362017
Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints00.342014
Throughput Maximization in Mobile WSN Scheduling With Power Control and Rate Selection40.462014
Link prediction in human mobility networks30.392013
A framework of traveling companion discovery on trajectory data streams281.122013
Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system30.412013
Trustworthiness analysis of sensor data in cyber-physical systems190.762013
Utility-based bandwidth adaptation in mission-oriented wireless sensor networks100.732012
Resource Allocation with Stochastic Demands20.422012
From mobile phones to responsible devices101.002011
netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks00.342011
Sensor-Mission Assignment in Constrained Environments120.642010
Network Coding aware Rate Selection in multi-rate IEEE 802.1190.522010
Sensor-mission assignment in wireless sensor networks150.712010
On cellular botnets: measuring the impact of malicious devices on a cellular network core11510.472009
Mitigating attacks on open functionality in SMS-capable cellular networks585.082009
Control-theoretic optimization of utility over mission lifetimes in multi-hop wireless networks30.452009
Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows30.432009
Exploiting open functionality in SMS-capable cellular networks121.372008
On attack causality in internet-connected cellular networks484.082007
Limiting Sybil Attacks In Structured P2p Networks461.892007
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks421.412007
Assigning sensors to missions with demands141.732007
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks130.672006
HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks31750.121999