A survey on trust management for mobile ad hoc networks JH Cho, A Swami, R Chen IEEE communications surveys & tutorials 13 (4), 562-583, 2010 | 1020 | 2010 |
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection F Bao, R Chen, MJ Chang, JH Cho IEEE Transactions on Network and Service Management 9 (2), 169-183, 2012 | 585 | 2012 |
A survey on trust modeling JH Cho, K Chan, S Adali ACM Computing Surveys (CSUR) 48 (2), 1-40, 2015 | 432 | 2015 |
A Survey on Systems Security Metrics M Pendleton, R Garcia-Lebron, JH Cho, S Xu ACM Computing Surveys 49 (4), Article 62, 2017 | 312 | 2017 |
Toward proactive, adaptive defense: A survey on moving target defense JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ... IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020 | 300 | 2020 |
Dynamic trust management for delay tolerant networks and its application to secure routing I Chen, F Bao, M Chang, J Cho IEEE Transactions on Parallel and Distributed Systems 25 (5), 2014 | 242 | 2014 |
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks JH Cho, A Swami, R Chen Journal of Network and Computer Applications 35 (3), 1001-1012, 2012 | 163 | 2012 |
A Survey on Modeling and Optimizing Multi-Objective Systems JH Cho, Y Wang, IR Chen, K Chan, A Swami IEEE Communications Surveys and Tutorials, 2017 | 156 | 2017 |
Trust-based intrusion detection in wireless sensor networks F Bao, R Chen, MJ Chang, JH Cho 2011 IEEE international conference on communications (ICC), 1-6, 2011 | 151 | 2011 |
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey G Choudhary, V Sharma, I You, IR Chen, JH Cho The 14th International Wireless Communications and Mobile Computing …, 2018 | 107 | 2018 |
Trust management for encounter-based routing in delay tolerant networks R Chen, F Bao, M Chang, JH Cho 2010 IEEE global telecommunications conference GLOBECOM 2010, 1-6, 2010 | 105 | 2010 |
Uncertainty Aware Semi-Supervised Learning on Graph Data X Zhao, S Hu, F Chen, JH Cho Thirty-Fourth Annual Conference on Neural Information Processing Systems …, 2020 | 103 | 2020 |
STRAM: Measuring the trustworthiness of computer-based systems JH Cho, S Xu, PM Hurley, M Mackay, T Benjamin, M Beaumont ACM Computing Surveys (CSUR) 51 (6), 1-47, 2019 | 97 | 2019 |
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks JH Cho, R Chen, PG Feng IEEE Transactions on Reliability 59 (1), 231-241, 2010 | 91 | 2010 |
Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis JH Cho, H Cam, A Oltramari IEEE International Multi-Disciplinary Conference on Cognitive Methods in …, 2016 | 85 | 2016 |
Trust management in mobile ad hoc networks for bias minimization and application performance maximization R Chen, J Guo, F Bao, JH Cho Ad Hoc Networks 19, 59-74, 2014 | 84 | 2014 |
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networking DP Sharma, DS Kim, S Yoon, H Lim, JH Cho, TJ Moore The 17th IEEE International Conference on Trust, Security and Privacy in …, 2018 | 81 | 2018 |
BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems V Sharma, I You, K Yim, R Chen, JH Cho IEEE Access 7, 118556-118580, 2019 | 79 | 2019 |
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks JH Cho, A Swami, R Chen 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 78 | 2009 |
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks JH Cho, IR Chen IEEE Transactions on Dependable and Secure Computing, 2018 | 72 | 2018 |