Link State Estimation Under Cyber-Physical Attacks: Theory and Algorithms | 0 | 0.34 | 2022 |
Reducing the Cost of Consistency: Performance Improvements in Next Generation Cellular Networks With Optimal Resource Reallocation | 0 | 0.34 | 2022 |
Preventing Outages Under Coordinated Cyber–Physical Attack With Secured PMUs | 0 | 0.34 | 2022 |
Scalable Resource Allocation Techniques for Edge Computing Systems | 0 | 0.34 | 2022 |
VidQ: Video Query Using Optimized Audio-Visual Processing | 0 | 0.34 | 2021 |
Budget-Constrained Reinforcement of SCADA for Cascade Mitigation | 1 | 0.36 | 2021 |
<italic>MLSNet:</italic> A Policy Complying Multilevel Security Framework for Software Defined Networking | 1 | 0.35 | 2021 |
Minimizing Rate Variability with Effective Resource Utilization in 5G Networks | 1 | 0.35 | 2021 |
Power Grid State Estimation under General Cyber-Physical Attacks | 0 | 0.34 | 2020 |
Large-Scale Hybrid ad hoc Network for Mobile Platforms: Challenges and Experiences | 0 | 0.34 | 2019 |
Modeling, Monitoring and Scheduling Techniques for Network Recovery from Massive Failures | 0 | 0.34 | 2019 |
On Progressive Network Recovery From Massive Failures Under Uncertainty | 1 | 0.36 | 2019 |
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud | 1 | 0.38 | 2019 |
A Computing Platform for Video Crowdprocessing Using Deep Learning. | 0 | 0.34 | 2018 |
Modeling the Resource Requirements of Convolutional Neural Networks on Mobile Devices. | 9 | 0.60 | 2017 |
Controlling Cascading Failures in Interdependent Networks under Incomplete Knowledge | 1 | 0.36 | 2017 |
Data Selection for Maximum Coverage in Sensor Networks with Cost Constraints | 0 | 0.34 | 2014 |
Throughput Maximization in Mobile WSN Scheduling With Power Control and Rate Selection | 4 | 0.46 | 2014 |
Link prediction in human mobility networks | 3 | 0.39 | 2013 |
A framework of traveling companion discovery on trajectory data streams | 28 | 1.12 | 2013 |
Mining lines in the sand: on trajectory discovery from untrustworthy data in cyber-physical system | 3 | 0.41 | 2013 |
Trustworthiness analysis of sensor data in cyber-physical systems | 19 | 0.76 | 2013 |
Utility-based bandwidth adaptation in mission-oriented wireless sensor networks | 10 | 0.73 | 2012 |
Resource Allocation with Stochastic Demands | 2 | 0.42 | 2012 |
From mobile phones to responsible devices | 10 | 1.00 | 2011 |
netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks | 0 | 0.34 | 2011 |
Sensor-Mission Assignment in Constrained Environments | 12 | 0.64 | 2010 |
Network Coding aware Rate Selection in multi-rate IEEE 802.11 | 9 | 0.52 | 2010 |
Sensor-mission assignment in wireless sensor networks | 15 | 0.71 | 2010 |
On cellular botnets: measuring the impact of malicious devices on a cellular network core | 115 | 10.47 | 2009 |
Mitigating attacks on open functionality in SMS-capable cellular networks | 58 | 5.08 | 2009 |
Control-theoretic optimization of utility over mission lifetimes in multi-hop wireless networks | 3 | 0.45 | 2009 |
Distributed utility-based rate adaptation protocols for prioritized, quasi-elastic flows | 3 | 0.43 | 2009 |
Exploiting open functionality in SMS-capable cellular networks | 12 | 1.37 | 2008 |
On attack causality in internet-connected cellular networks | 48 | 4.08 | 2007 |
Limiting Sybil Attacks In Structured P2p Networks | 46 | 1.89 | 2007 |
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks | 42 | 1.41 | 2007 |
Assigning sensors to missions with demands | 14 | 1.73 | 2007 |
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks | 13 | 0.67 | 2006 |
HAWAII: a domain-based approach for supporting mobility in wide-area wireless networks | 317 | 50.12 | 1999 |