Search

Search Constraints

Start Over You searched for: Graduate Program Computer Science and Engineering Remove constraint Graduate Program: Computer Science and Engineering Committee Member Sencun Zhu Remove constraint Committee Member: Sencun Zhu

Search Results

2. SUPPORTING NEW SERVICES IN 3G NETWORKS: ENERGY AND SECURITY PERSPECTIVES

open_access
Open Access

3. Supporting Multi-Missions In Wireless Sensor Networks

open_access
Open Access

5. A SECURITY FRAMEWORK FOR MOBILE AD HOC NETWORKS

open_access
Open Access

6. SECURE WIRELESS SENSOR NETWORKS: BUILDING BLOCKS AND APPLICATIONS

open_access
Open Access

8. RESOURCE ALLOCATION IN WIRELESS NETWORKS

open_access
Open Access

10. ANGEL: A HYBRID CONTENT-BASED FILTERING TOOL FOR PROTECTING TEENS’ SAFETY IN ONLINE SOCIAL NETWORK

open_access
Open Access

11. Secure Communications in Sensor Networks

open_access
Open Access

13. DESIGN OF COMMUNICATION NETWORK ARCHITECTURE FOR THE SMART GRID

open_access
Open Access

14. Secure Systems Development Using Security-Typed Languages

open_access
Open Access

15. Adaptive Social Networking With Applications To Security

open_access
Open Access

16. Mitigating Congestion in Wireless Networks

open_access
Open Access

18. UTILITY-BASED DYNAMIC RESOURCE OPTIMIZATION IN MISSION-ORIENTED WIRELESS SENSOR NETWORKS

open_access
Open Access

20. Compromise-Resilient Anti-Jamming Communication in Wireless Sensor Networks

open_access
Open Access

21. Protecting software from attack and theft via program analysis

open_access
Open Access

22. A STUDY OF SELECTED SECURITY MEASURES AGAINST NON-LEGITIMATE USE OF CODE

open_access
Open Access

23. VARIATION-AWARE BEHAVIORAL SYNTHESIS FOR NANOMETER VLSI CHIPS

open_access
Open Access

24. DETECTING OFFENSIVE LANGUAGE IN SOCIAL MEDIAS FOR PROTECTION OF ADOLESCENT ONLINE SAFETY

open_access
Open Access

25. Towards Compromise Resilient Wireless Sensor Networks

open_access
Open Access

26. INTEGRATED SERVICE MODEL IN HETEROGENEOUS WIRELESS NETWORKS

open_access
Open Access

27. Virtualization-based Security Analysis of Production Server Systems

open_access
Open Access

28. Detecting Policy Violators in Online Social Community an Extended Bayesian Belief Network Approach

open_access
Open Access

29. Data Service Analysis, Threats and Countermeasures in Wireless Mobile Environments

open_access
Open Access

33. Node Misbehavior Detection and Secure Trust Metadata Management in Mobile Networks

open_access
Open Access

35. Security and Privacy of New Features on Smartphones

open_access
Open Access

39. Security and Privacy Mechanisms for Web and Third-party Applications

open_access
Open Access

46. Protect Children Online Safety on Social Media and Mobile Platforms

open_access
Open Access

47. Resilient and Efficient Data Access in Cognitive Radio Networks

open_access
Open Access

48. Improving Software Security With Concurrent Monitoring, Automated Diagnosis, and Self-shielding

open_access
Open Access

49. New Techniques for Trustworthy Mobile Computing

open_access
Open Access

50. Energy Optimization for Smartphones in Wireless Networks

open_access
Open Access