Security and privacy issues with health care information technology M Meingast, T Roosta, S Sastry 2006 international conference of the IEEE engineering in medicine and …, 2006 | 481 | 2006 |
Time synchronization attacks in sensor networks M Manzo, T Roosta, S Sastry Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005 | 170 | 2005 |
Key management and secure software updates in wireless process control environments DK Nilsson, T Roosta, U Lindqvist, A Valdes Proceedings of the first ACM conference on Wireless network security, 100-108, 2008 | 165 | 2008 |
Taxonomy of security attacks in sensor networks and countermeasures T Roosta, S Shieh, S Sastry The first IEEE international conference on system integration and …, 2006 | 165 | 2006 |
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems AA Cardenas, T Roosta, S Sastry Ad Hoc Networks 7 (8), 1434-1447, 2009 | 142 | 2009 |
Instrumenting wireless sensor networks for real-time surveillance S Sastry, M Manzo, S Oh, P Chen Proceedings 2006 IEEE International Conference on Robotics and Automation …, 2006 | 127 | 2006 |
A testbed for secure and robust SCADA systems A Giani, G Karsai, T Roosta, A Shah, B Sinopoli, J Wiley ACM SIGBED Review 5 (2), 1-4, 2008 | 116 | 2008 |
Probabilistic geographic routing protocol for ad hoc and sensor networks T Roosta, M Menzo, S Sastry Proceeding (474) wireless networks and emerging technologies, 2005 | 79 | 2005 |
Transactional confidentiality in sensor networks S Pai, M Meingast, T Roosta, S Bermudez, SB Wicker, DK Mulligan, ... IEEE Security & Privacy 6 (4), 28-35, 2008 | 59 | 2008 |
Convergence analysis of reweighted sum-product algorithms TG Roosta, MJ Wainwright, SS Sastry IEEE Transactions on Signal Processing 56 (9), 4293-4305, 2008 | 57 | 2008 |
An intrusion detection system for wireless process control systems T Roosta, DK Nilsson, U Lindqvist, A Valdes 2008 5th IEEE international conference on mobile ad hoc and sensor systems …, 2008 | 52 | 2008 |
Distributed reputation system for tracking applications in sensor networks T Roosta, M Meingast, S Sastry 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems …, 2006 | 32 | 2006 |
Attacks and defenses of ubiquitous sensor networks TG Roosta University of California, Berkeley, 2008 | 28 | 2008 |
Inherent security of routing protocols in ad-hoc and sensor networks T Roosta, S Pai, P Chen, S Sastry, S Wicker IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1273-1278, 2007 | 20 | 2007 |
Using social network theory towards development of wireless ad hoc network trust S Pai, T Roosta, S Wicker, S Sastry 21st International Conference on Advanced Information Networking and …, 2007 | 20 | 2007 |
Confidentiality in sensor networks: Transactional information S Pai, M Meingast, T Roosta, S Bermudez, S Wicker, DK Mulligan, ... IEEE Security and Privacy magazine, 2008 | 19 | 2008 |
Testbed implementation of a secure flooding time synchronization protocol T Roosta, WC Liao, WC Teng, S Sastry 2008 IEEE Wireless Communications and Networking Conference, 3157-3162, 2008 | 15 | 2008 |
Integrity checker for wireless sensor networks in health care applications A Giani, T Roosta, S Sastry 2008 Second International Conference on Pervasive Computing Technologies for …, 2008 | 15 | 2008 |
Robust estimation and detection in ad hoc and sensor networks T Roosta, SM Mishra, A Ghazizadeh 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 236-245, 2006 | 15 | 2006 |
Cyber security basic defenses and attack trends AA Cárdenas, T Roosta, G Taban, S Sastry Homeland Security Technology Challenges, 73-101, 2008 | 13 | 2008 |