Mobility models for ad hoc network simulation G Lin, G Noubir, R Rajaraman IEEE INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer …, 2004 | 336 | 2004 |
Performance of IEEE 802.11 under jamming E Bayraktaroglu, C King, X Liu, G Noubir, R Rajaraman, B Thapa Mobile Networks and Applications 18 (5), 678-696, 2013 | 323 | 2013 |
Low-power DoS attacks in data wireless LANs and countermeasures G Noubir, G Lin ACM SIGMOBILE Mobile Computing and Communications Review 7 (3), 29-30, 2003 | 287 | 2003 |
Application-awareness in SDN ZA Qazi, J Lee, T Jin, G Bellala, M Arndt, G Noubir Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 487-488, 2013 | 233 | 2013 |
Inferring user routes and locations using zero-permission mobile sensors S Narain, TD Vo-Huu, K Block, G Noubir 2016 IEEE Symposium on Security and Privacy (SP), 397-413, 2016 | 188 | 2016 |
On link layer denial of service in data wireless LANs G Lin, G Noubir Wireless Communications and Mobile Computing 5 (3), 273-284, 2005 | 174 | 2005 |
Fingerprinting Wi-Fi devices using software defined radios TD Vo-Huu, TD Vo-Huu, G Noubir Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 158 | 2016 |
On connectivity in ad hoc networks under jamming using directional antennas and mobility G Noubir International Conference on Wired/Wireless Internet Communications, 186-200, 2004 | 151 | 2004 |
Broadcast control channel jamming: Resilience and identification of traitors A Chan, X Liu, G Noubir, B Thapa 2007 IEEE International Symposium on Information Theory, 2496-2500, 2007 | 148 | 2007 |
Secure multicast groups on ad hoc networks T Kaya, G Lin, G Noubir, A Yilmaz Proceedings of the 1st ACM workshop on security of ad hoc and sensor …, 2003 | 143 | 2003 |
Wizi-cloud: Application-transparent dual zigbee-wifi radios for low power internet access T Jin, G Noubir, B Sheng 2011 Proceedings IEEE INFOCOM, 1593-1601, 2011 | 120 | 2011 |
Spread: Foiling smart jammers using multi-layer agility X Liu, G Noubir, R Sundaram, S Tan IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 118 | 2007 |
Universal approximations for TSP, Steiner tree, and set cover L Jia, G Lin, G Noubir, R Rajaraman, R Sundaram Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005 | 115 | 2005 |
Hierarchy-based access control in distributed environments JC Birget, X Zou, G Noubir, B Ramamurthy ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001 | 91 | 2001 |
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. A Cassola, WK Robertson, E Kirda, G Noubir NDSS, 2013 | 89 | 2013 |
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming G Noubir, R Rajaraman, B Sheng, B Thapa Proceedings of the fourth ACM conference on Wireless network security, 97-108, 2011 | 85 | 2011 |
Toward robust hidden volumes using write-only oblivious RAM EO Blass, T Mayberry, G Noubir, K Onarlioglu Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 84 | 2014 |
Zero pre-shared secret key establishment in the presence of jammers T Jin, G Noubir, B Thapa Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009 | 83 | 2009 |
Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning S Narain, A Sanatinia, G Noubir Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 81 | 2014 |
Linear programming models for jamming attacks on network traffic flows P Tague, D Slater, R Poovendran, G Noubir 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad …, 2008 | 80 | 2008 |