Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Cliff Wang
@article{DBLP:journals/iotj/WangWW23, author = {Jie Wang and Wenye Wang and Cliff Wang}, title = {Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {13}, pages = {11669--11682}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3245100}, doi = {10.1109/JIOT.2023.3245100}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/WangPWW23, author = {Jie Wang and Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {22}, number = {11}, pages = {8320--8335}, year = {2023}, url = {https://doi.org/10.1109/TWC.2023.3262311}, doi = {10.1109/TWC.2023.3262311}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/WangPWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Ferguson-Walter23, author = {Kimberly Ferguson{-}Walter and Sunny Fugate and Cliff Wang and Matt Bishop}, editor = {Tung X. Bui}, title = {Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense}, booktitle = {56th Hawaii International Conference on System Sciences, {HICSS} 2023, Maui, Hawaii, USA, January 3-6, 2023}, pages = {845}, publisher = {ScholarSpace}, year = {2023}, url = {https://hdl.handle.net/10125/102734}, timestamp = {Thu, 16 Feb 2023 16:52:47 +0100}, biburl = {https://dblp.org/rec/conf/hicss/Ferguson-Walter23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/WangWWS22, author = {Jie Wang and Wenye Wang and Cliff Wang and Min Song}, title = {Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {5}, pages = {1829--1846}, year = {2022}, url = {https://doi.org/10.1109/TMC.2020.3032434}, doi = {10.1109/TMC.2020.3032434}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/WangWWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkhraviW22, author = {Hamed Okhravi and Cliff Wang}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {{MTD} '22: 9th {ACM} Workshop on Moving Target Defense}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {3539--3540}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3563358}, doi = {10.1145/3548606.3563358}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OkhraviW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/FugateBWF22, author = {Sunny Fugate and Matt Bishop and Cliff Wang and Kimberly Ferguson{-}Walter}, title = {Introduction to the Minitrack on Cyber Deception and Cyberpsychology for Defense}, booktitle = {55th Hawaii International Conference on System Sciences, {HICSS} 2022, Virtual Event / Maui, Hawaii, USA, January 4-7, 2022}, pages = {1--2}, publisher = {ScholarSpace}, year = {2022}, url = {http://hdl.handle.net/10125/79607}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/FugateBWF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2022mtd, editor = {Hamed Okhravi and Cliff Wang}, title = {Proceedings of the 9th {ACM} Workshop on Moving Target Defense, {MTD} 2022, Los Angeles, CA, USA, 7 November 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560828}, doi = {10.1145/3560828}, isbn = {978-1-4503-9878-7}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2022mtd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhaoLW21, author = {Shangqing Zhao and Zhuo Lu and Cliff Wang}, title = {Measurement Integrity Attacks Against Network Tomography: Feasibility and Defense}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2617--2630}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2958934}, doi = {10.1109/TDSC.2019.2958934}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhaoLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/BishopWFF21, author = {Matt Bishop and Cliff Wang and Kimberly Ferguson{-}Walter and Sunny Fugate}, title = {Introduction to the Minitrack on Cyber Deception and Cyber Psychology for Defense}, booktitle = {54th Hawaii International Conference on System Sciences, {HICSS} 2021, Kauai, Hawaii, USA, January 5, 2021}, pages = {1--2}, publisher = {ScholarSpace}, year = {2021}, url = {https://hdl.handle.net/10125/70852}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/BishopWFF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangWW20, author = {Jie Wang and Wenye Wang and Cliff Wang}, title = {Modeling and Analysis of Conflicting Information Propagation in a Finite Time Horizon}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {28}, number = {3}, pages = {972--985}, year = {2020}, url = {https://doi.org/10.1109/TNET.2020.2976972}, doi = {10.1109/TNET.2020.2976972}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/ZhaoLW20, author = {Shangqing Zhao and Zhuo Lu and Cliff Wang}, title = {How Can Randomized Routing Protocols Hide Flow Information in Wireless Networks?}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {19}, number = {11}, pages = {7224--7236}, year = {2020}, url = {https://doi.org/10.1109/TWC.2020.3009839}, doi = {10.1109/TWC.2020.3009839}, timestamp = {Thu, 31 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/twc/ZhaoLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkhraviW20, author = {Hamed Okhravi and Cliff Wang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {MTD'20: 7th {ACM} Workshop on Moving Target Defense}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2137--2138}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3416244}, doi = {10.1145/3372297.3416244}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OkhraviW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/Ferguson-Walter20, author = {Kimberly Ferguson{-}Walter and Sunny Fugate and Cliff Wang}, title = {Introduction to the Minitrack on Cyber Deception for Defense}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--2}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/63964}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/Ferguson-Walter20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/20/JCSS2020, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Adaptive Autonomous Secure Cyber Systems}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1}, doi = {10.1007/978-3-030-33432-1}, isbn = {978-3-030-33431-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/JCSS2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020mtd, editor = {Hamed Okhravi and Cliff Wang}, title = {Proceedings of the 7th {ACM} Workshop on Moving Target Defense, MTD@CCS 2020, Virtual Event, USA, November 9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411496}, doi = {10.1145/3411496}, isbn = {978-1-4503-8085-0}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020mtd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-14497, author = {Zhuo Lu and Cliff Wang and Shangqing Zhao}, title = {Cyber Deception for Computer and Network Security: Survey and Challenges}, journal = {CoRR}, volume = {abs/2007.14497}, year = {2020}, url = {https://arxiv.org/abs/2007.14497}, eprinttype = {arXiv}, eprint = {2007.14497}, timestamp = {Mon, 03 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-14497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/AWHW2019, author = {Ehab Al{-}Shaer and Jinpeng Wei and Kevin W. Hamlen and Cliff Wang}, title = {Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-02110-8}, doi = {10.1007/978-3-030-02110-8}, isbn = {978-3-030-02109-2}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/AWHW2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WangWW19, author = {Jie Wang and Wenye Wang and Cliff Wang}, title = {{SAS:} Modeling and Analysis of Spectrum Activity Surveillance in Wireless Overlay Networks}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {2143--2151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737585}, doi = {10.1109/INFOCOM.2019.8737585}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WangWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/11830, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6}, doi = {10.1007/978-3-030-30719-6}, isbn = {978-3-030-30718-9}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/11830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/WangL18, author = {Cliff Wang and Zhuo Lu}, title = {Cyber Deception: Overview and the Road Ahead}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {2}, pages = {80--85}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1870866}, doi = {10.1109/MSP.2018.1870866}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/WangL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/PambudiWW18, author = {Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {Fast Rendezvous for Spectrum-Agile IoT Devices with Limited Channel Hopping Capability}, booktitle = {2018 {IEEE} Conference on Computer Communications, {INFOCOM} 2018, Honolulu, HI, USA, April 16-19, 2018}, pages = {1385--1393}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFOCOM.2018.8486208}, doi = {10.1109/INFOCOM.2018.8486208}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/PambudiWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/LuW17, author = {Zhuo Lu and Cliff Wang}, title = {Enabling Network Anti-Inference via Proactive Strategies: {A} Fundamental Perspective}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {25}, number = {1}, pages = {43--55}, year = {2017}, url = {https://doi.org/10.1109/TNET.2016.2553666}, doi = {10.1109/TNET.2016.2553666}, timestamp = {Wed, 26 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/LuW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PambudiWW17, author = {Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {From Isolation Time to Node Resilience: Impact of Cascades in D2D-Based Social Networks}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8255073}, doi = {10.1109/GLOCOM.2017.8255073}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PambudiWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangWW17, author = {Jie Wang and Wenye Wang and Cliff Wang}, title = {Modeling and Strategy Design for Spectrum Monitoring over a Geographical Region}, booktitle = {2017 {IEEE} Global Communications Conference, {GLOBECOM} 2017, Singapore, December 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/GLOCOM.2017.8254113}, doi = {10.1109/GLOCOM.2017.8254113}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/PambudiWW17, author = {Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {On the Root Cause of Dropout-Induced Contraction Process in D2D-Based Mobile Social Networks}, booktitle = {26th International Conference on Computer Communication and Networks, {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCCN.2017.8038389}, doi = {10.1109/ICCCN.2017.8038389}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/PambudiWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhaoLW17, author = {Shangqing Zhao and Zhuo Lu and Cliff Wang}, editor = {Kisung Lee and Ling Liu}, title = {When Seeing Isn't Believing: On Feasibility and Detectability of Scapegoating in Network Tomography}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {172--182}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.23}, doi = {10.1109/ICDCS.2017.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ZhaoLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17, author = {Massimiliano Albanese and Nancy J. Cooke and Gonz{\'{a}}lez Coty and David Hall and Christopher G. Healey and Sushil Jajodia and Peng Liu and Michael D. McNeese and Peng Ning and Douglas S. Reeves and V. S. Subrahmanian and Cliff Wang and John Yen}, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {Computer-Aided Human Centric Cyber Situation Awareness}, booktitle = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, pages = {3--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5\_1}, doi = {10.1007/978-3-319-61152-5\_1}, timestamp = {Mon, 03 Jan 2022 21:52:37 +0100}, biburl = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2017feast, editor = {Taesoo Kim and Cliff Wang and Dinghao Wu}, title = {Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017}, publisher = {{ACM}}, year = {2017}, url = {http://dl.acm.org/citation.cfm?id=3141235}, isbn = {978-1-4503-5395-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2017feast.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/10030, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5}, doi = {10.1007/978-3-319-61152-5}, isbn = {978-3-319-61151-8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/10030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LuWW16, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {On the Evolution and Impact of Mobile Botnets in Wireless Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {15}, number = {9}, pages = {2304--2316}, year = {2016}, url = {https://doi.org/10.1109/TMC.2015.2492545}, doi = {10.1109/TMC.2015.2492545}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LuWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0005W16, author = {Peng Liu and Cliff Wang}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{MTD} 2016: Third {ACM} Workshop on Moving Target Defense}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1868--1869}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990483}, doi = {10.1145/2976749.2990483}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0005W16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PambudiWW16, author = {Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {How Robust Is a D2D-Based Messaging Service?}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841877}, doi = {10.1109/GLOCOM.2016.7841877}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PambudiWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PambudiWW16a, author = {Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {On the Resilience of D2D-Based Social Networking Service against Random Failures}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7842061}, doi = {10.1109/GLOCOM.2016.7842061}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PambudiWW16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangWW16, author = {Jie Wang and Wenye Wang and Cliff Wang}, title = {Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841747}, doi = {10.1109/GLOCOM.2016.7841747}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/PambudiWW16, author = {Sigit Aryo Pambudi and Wenye Wang and Cliff Wang}, title = {Modeling and estimating the structure of D2D-based mobile social networks}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7511491}, doi = {10.1109/ICC.2016.7511491}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/PambudiWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWW16, author = {Jie Wang and Wenye Wang and Cliff Wang}, title = {How the anti-rumor kills the rumor: Conflicting information propagation in networks}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7511492}, doi = {10.1109/ICC.2016.7511492}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/GuanKWG16, author = {Yong Guan and Sneha Kumar Kasera and Cliff Wang and Ryan M. Gerdes}, editor = {Cliff Wang and Ryan M. Gerdes and Yong Guan and Sneha Kumar Kasera}, title = {Introduction}, booktitle = {Digital Fingerprinting}, pages = {1--3}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6601-1\_1}, doi = {10.1007/978-1-4939-6601-1\_1}, timestamp = {Fri, 30 Jun 2017 10:25:53 +0200}, biburl = {https://dblp.org/rec/books/sp/16/GuanKWG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/LuWW16, author = {Zhuo Lu and Cliff Wang and Mingkui Wei}, editor = {Sushil Jajodia and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks}, booktitle = {Cyber Deception, Building the Scientific Foundation}, pages = {99--116}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32699-3\_5}, doi = {10.1007/978-3-319-32699-3\_5}, timestamp = {Wed, 25 Sep 2019 17:41:11 +0200}, biburl = {https://dblp.org/rec/books/sp/16/LuWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/GuanKWG16a, author = {Yong Guan and Sneha Kumar Kasera and Cliff Wang and Ryan M. Gerdes}, editor = {Cliff Wang and Ryan M. Gerdes and Yong Guan and Sneha Kumar Kasera}, title = {Conclusion}, booktitle = {Digital Fingerprinting}, pages = {177--181}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6601-1\_9}, doi = {10.1007/978-1-4939-6601-1\_9}, timestamp = {Fri, 30 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/GuanKWG16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/JSSW2016, editor = {Sushil Jajodia and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Deception, Building the Scientific Foundation}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32699-3}, doi = {10.1007/978-3-319-32699-3}, isbn = {978-3-319-32697-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/JSSW2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/WGGK2016, editor = {Cliff Wang and Ryan M. Gerdes and Yong Guan and Sneha Kumar Kasera}, title = {Digital Fingerprinting}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-1-4939-6601-1}, doi = {10.1007/978-1-4939-6601-1}, isbn = {978-1-4939-6599-1}, timestamp = {Fri, 30 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/WGGK2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016mtd, editor = {Peng Liu and Cliff Wang}, title = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272}, doi = {10.1145/2995272}, isbn = {978-1-4503-4570-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016mtd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/LuWW15, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23288-1}, doi = {10.1007/978-3-319-23288-1}, isbn = {978-3-319-23287-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/LuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KottAW15, author = {Alexander Kott and David S. Alberts and Cliff Wang}, title = {Will Cybersecurity Dictate the Outcome of Future Wars?}, journal = {Computer}, volume = {48}, number = {12}, pages = {98--101}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.359}, doi = {10.1109/MC.2015.359}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KottAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuWW15, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {31--44}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2316795}, doi = {10.1109/TDSC.2014.2316795}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuMW15, author = {Zhuo Lu and Lisa M. Marvel and Cliff Wang}, editor = {George Cybenko and Dijiang Huang}, title = {To Be Proactive or Not: {A} Framework to Model Cyber Maneuvers for Critical Path Protection in MANETs}, booktitle = {Proceedings of the Second {ACM} Workshop on Moving Target Defense, {MTD} 2015, Denver, Colorado, USA, October 12, 2015}, pages = {85--93}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808475.2808479}, doi = {10.1145/2808475.2808479}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuW15, author = {Zhuo Lu and Cliff Wang}, title = {Network anti-inference: {A} fundamental perspective on proactive strategies to counter flow inference}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {280--288}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218392}, doi = {10.1109/INFOCOM.2015.7218392}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LuWW15, author = {Zhuo Lu and Cliff Wang and Mingkui Wei}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {On detection and concealment of critical roles in tactical wireless networks}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {909--914}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357561}, doi = {10.1109/MILCOM.2015.7357561}, timestamp = {Thu, 07 Nov 2019 09:04:27 +0100}, biburl = {https://dblp.org/rec/conf/milcom/LuWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/56, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1}, doi = {10.1007/978-3-319-14039-1}, isbn = {978-3-319-14038-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/56.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KottAW15, author = {Alexander Kott and David S. Alberts and Cliff Wang}, title = {War of 2050: a Battle for Information, Communications, and Computer Security}, journal = {CoRR}, volume = {abs/1512.00360}, year = {2015}, url = {http://arxiv.org/abs/1512.00360}, eprinttype = {arXiv}, eprint = {1512.00360}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KottAW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/RigganSW14, author = {Benjamin S. Riggan and Wesley E. Snyder and Cliff Wang}, title = {Fundamentals of Sketch-Based Passwords - {A} General Framework}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13629-5}, doi = {10.1007/978-3-319-13629-5}, isbn = {978-3-319-13628-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/RigganSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LuWW14, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {13}, number = {8}, pages = {1746--1759}, year = {2014}, url = {https://doi.org/10.1109/TMC.2013.146}, doi = {10.1109/TMC.2013.146}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LuWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuWW14, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {How can botnets cause storms? Understanding the evolution and impact of mobile botnets}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {1501--1509}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848085}, doi = {10.1109/INFOCOM.2014.6848085}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LuWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Preview}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {1--5}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_1}, doi = {10.1007/978-3-319-11391-3\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14a, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Concluding Thoughts}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {323--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_15}, doi = {10.1007/978-3-319-11391-3\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/securecloud2014, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Secure Cloud Computing}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8}, doi = {10.1007/978-1-4614-9278-8}, isbn = {978-1-4614-9277-1}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014spsm, editor = {Cliff Wang and Dijiang Huang and Kapil Singh and Zhenkai Liang}, title = {Proceedings of the 4th {ACM} Workshop on Security and Privacy in Smartphones {\&} Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2666620}, isbn = {978-1-4503-3155-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014spsm.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/62, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3}, doi = {10.1007/978-3-319-11391-3}, isbn = {978-3-319-11390-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013cycar, editor = {Ahmad{-}Reza Sadeghi and Cliff Wang and Herv{\'{e}} Seudie}, title = {CyCAR'13, Proceedings of the 2013 {ACM} Workshop on Security, Privacy and Dependability for CyberVehicles, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2517968}, isbn = {978-1-4503-2487-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013cycar.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/100, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8}, doi = {10.1007/978-1-4614-5416-8}, isbn = {978-1-4614-5415-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LuWW12, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {Modeling and Performance Evaluation of Backoff Misbehaving Nodes in {CSMA/CA} Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {11}, number = {8}, pages = {1331--1344}, year = {2012}, url = {https://doi.org/10.1109/TMC.2011.164}, doi = {10.1109/TMC.2011.164}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/LuWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuWW12, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {3066--3070}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195760}, doi = {10.1109/INFCOM.2012.6195760}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LuWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuWW11, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {1871--1879}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5934989}, doi = {10.1109/INFCOM.2011.5934989}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LuWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/54, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9}, doi = {10.1007/978-1-4614-0977-9}, isbn = {978-1-4614-0976-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/54.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LiuNDLW10, author = {An Liu and Peng Ning and Huaiyu Dai and Yao Liu and Cliff Wang}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {367--376}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920315}, doi = {10.1145/1920261.1920315}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LiuNDLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LuWW10, author = {Zhuo Lu and Cliff Wang and Wenye Wang}, title = {On the Impact of Backoff Misbehaving Nodes in {IEEE} 802.11 Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502302}, doi = {10.1109/ICC.2010.5502302}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/LuWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuWW10, author = {Zhuo Lu and Wenye Wang and Cliff Wang}, title = {On Order Gain of Backoff Misbehaving Nodes in CSMA/CA-based Wireless Networks}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {1819--1827}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462002}, doi = {10.1109/INFCOM.2010.5462002}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/LuWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/46, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8}, doi = {10.1007/978-1-4419-0140-8}, isbn = {978-1-4419-0139-2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/46.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/ChangSW08, author = {Chih{-}Chieh Geoff Chang and Wesley E. Snyder and Cliff Wang}, title = {Secure target localisation in sensor networks using relaxation labelling}, journal = {Int. J. Sens. Networks}, volume = {4}, number = {3}, pages = {172--184}, year = {2008}, url = {https://doi.org/10.1504/IJSNET.2008.022110}, doi = {10.1504/IJSNET.2008.022110}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/ChangSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/LiuNLWD08, author = {Donggang Liu and Peng Ning and An Liu and Cliff Wang and Wenliang Du}, title = {Attack-Resistant Location Estimation in Wireless Sensor Networks}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {4}, pages = {22:1--22:39}, year = {2008}, url = {https://doi.org/10.1145/1380564.1380570}, doi = {10.1145/1380564.1380570}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/LiuNLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/36, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, publisher = {Springer}, year = {2008}, isbn = {978-0-387-68768-1}, timestamp = {Wed, 19 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/36.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChangSW07, author = {Chih{-}Chieh Geoff Chang and Wesley E. Snyder and Cliff Wang}, title = {A New Relaxation Labeling Architecture for Secure Localization in Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {3076--3081}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.511}, doi = {10.1109/ICC.2007.511}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChangSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChangSW07a, author = {Chih{-}Chieh Geoff Chang and Wesley E. Snyder and Cliff Wang}, title = {Secure Tracking in Sensor Networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {3082--3087}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.512}, doi = {10.1109/ICC.2007.512}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChangSW07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SunNW07, author = {Kun Sun and Peng Ning and Cliff Wang}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure and Resilient Time Synchronization in Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {347--367}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_15}, doi = {10.1007/978-0-387-46276-9\_15}, timestamp = {Mon, 15 Jun 2020 07:44:16 +0200}, biburl = {https://dblp.org/rec/series/ais/SunNW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/27, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1}, doi = {10.1007/978-0-387-44599-1}, isbn = {978-0-387-32720-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/27.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/30, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9}, doi = {10.1007/978-0-387-46276-9}, isbn = {978-0-387-32721-1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/30.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4807, author = {Michael Baer and Ricky Charlet and Wes Hardaker and Robert Story and Cliff Wang}, title = {IPsec Security Policy Database Configuration {MIB}}, journal = {{RFC}}, volume = {4807}, pages = {1--71}, year = {2007}, url = {https://doi.org/10.17487/RFC4807}, doi = {10.17487/RFC4807}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/SunNW06, author = {Kun Sun and Peng Ning and Cliff Wang}, title = {Secure and resilient clock synchronization in wireless sensor networks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {2}, pages = {395--408}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2005.861396}, doi = {10.1109/JSAC.2005.861396}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/SunNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SunPNW06, author = {Kun Sun and Pai Peng and Peng Ning and Cliff Wang}, title = {Secure Distributed Cluster Formation in Wireless Sensor Networks}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {131--140}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.46}, doi = {10.1109/ACSAC.2006.46}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SunPNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SunNW06, author = {Kun Sun and Peng Ning and Cliff Wang}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {TinySeRSync: secure and resilient time synchronization in wireless sensor networks}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {264--277}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180439}, doi = {10.1145/1180405.1180439}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SunNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sutc/ChangSW06, author = {Chih{-}Chieh Geoff Chang and Wesley E. Snyder and Cliff Wang}, title = {Robust Localization of Multiple Events in Sensor Networks}, booktitle = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing {(SUTC} 2006), 5-7 June 2006, Taichung, Taiwan}, pages = {168--177}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.117}, doi = {10.1109/SUTC.2006.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sutc/ChangSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunNW05, author = {Kun Sun and Peng Ning and Cliff Wang}, title = {Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {3}, pages = {177--189}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.36}, doi = {10.1109/TDSC.2005.36}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/SunNW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/LeeSW05, author = {Cheolha Pedro Lee and Wesley E. Snyder and Cliff Wang}, title = {Supervised Multispectral Image Segmentation using Active Contours}, booktitle = {Proceedings of the 2005 {IEEE} International Conference on Robotics and Automation, {ICRA} 2005, April 18-22, 2005, Barcelona, Spain}, pages = {4242--4247}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ROBOT.2005.1570772}, doi = {10.1109/ROBOT.2005.1570772}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icra/LeeSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4008, author = {R. Rohit and Pyda Srisuresh and Rajiv Raghunarayan and Nalinaksh Pai and Cliff Wang}, title = {Definitions of Managed Objects for Network Address Translators {(NAT)}}, journal = {{RFC}}, volume = {4008}, pages = {1--64}, year = {2005}, url = {https://doi.org/10.17487/RFC4008}, doi = {10.17487/RFC4008}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4058, author = {Alper E. Yegin and Yoshihiro Ohba and Reinaldo Penno and George Tsirtsis and Cliff Wang}, title = {Protocol for Carrying Authentication for Network Access {(PANA)} Requirements}, journal = {{RFC}}, volume = {4058}, pages = {1--19}, year = {2005}, url = {https://doi.org/10.17487/RFC4058}, doi = {10.17487/RFC4058}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbms/WangSSW94, author = {Cliff Wang and Lori Small and Wesley E. Snyder and Rodney Williams}, title = {Edge detection in gated cardiac nuclear medicine images}, booktitle = {Seventh Annual {IEEE} Symposium on Computer-Based Medical Systems (CBMS'94), June 10-12, 1994, Winston-Salem, NC, {USA}}, pages = {28--33}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/CBMS.1994.315981}, doi = {10.1109/CBMS.1994.315981}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/cbms/WangSSW94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.