Number of items at this level: 68.
Bye, Rainer, Luther, Katja, Camtepe, Seyit A., Alpcan, Tansu, Albayrak, Sahin, & Yener, Bulent
Decentralized detector generation in cooperative intrusion detection system.
Lecture Notes in Computer Science : Stabilization, Safety, and Security of Distributed Systems, 4838, pp. 37-51.
Caelli, William, Liu, Vicky, & Longley, Dennis
Background to the development of a curriculum for the history of “cyber” and “communications” security. In
Dodge Jr., R.C. & Futcher, L. (Eds.)
Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8 Proceedings [IFIP Advances in Information and Communication Technology, Volume 406], Springer, Auckland, New Zealand, pp. 39-47.
Camtepe, Seyit A., Bsufka, Karsten, Hennig, Leonhard, Simsek, Cihan, & Albayrak, Sahin
A framework for automated identification of attack scenarios on IT infrastructures.
PIK ( Praxis der Informationsverarbeitung und Kommunikation) Journal on Network Attack Detection and Defence, 35(1), pp. 25-31.
Caron, David, Stauffer, Beth, Darjany, Lindsay, Oberg, Carl, Pereira, Arvind, Das, Jnaneshwar, et al.
Networked aquatic microbial observing systems: An overview. In
Center for Embedded Networked Sensing Annual Research Review,, May 12, 2009, University of California (Los Angeles) [UCLA].
Chen, Xiaoqin, Jayalath, Dhammika, Munasinghe, Gayan, & Ziri-Castro, Karla I.
Analysis of multiple shared channel cooperative routing in OFDM based wireless networks. In
Proceedings of IET International Communication Conference on Wireless Mobile & Computing, Institution of Engineering Technology (IET), Blue Palace Hotel, Shanghai, pp. 175-180.
Chen, Yen-Lin, Tian, Guosong, Gao, Jing, & Tian, Yu-Chu
Cross-layer design for traffic management in wireless networked control systems. In
Proceedings of the 9th IEEE Conference on Industrial Electronics and Applications (ICIEA 2014), IEEE, Hangzhou, China, pp. 187-192.
Chin, Yiyong, Jayalath, Dhammika, & Senadji, Bouchra
Slotted distributed space-time coding. In
Proceedings of Personal Indoor and Mobile Radio Communications (PIMRC), 2012 IEEE 23rd International Symposium on, IEEE, Sydney, N.S.W, pp. 783-788.
Chin, Yiyong, Widanagamage, Anushka, & Jayalath, Dhammika
Sequential slotted amplify-decode-and-forward. In
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), IEEE, Shanghai, Chaina, pp. 2699-2704.
Choi, Jaz Hee-jeong, Foth, Marcus, Lawson, Shaun, & Hirsch, Tad
Food(ing): between human-computer and human-food-experience. In
5th International Conference on Communities & Technologies (C&T 2011), 29 June - 2 July 2011, State Library of Queensland, Brisbane, QLD.
Edirippulige, Sisira, Martin-Khan, Melinda, Beattie, Elizabeth, Smith, Anthony, & Gray, Leonard
A systematic review of telemedicine services for residents in long term care facilities.
Journal of Telemedicine and Telecare, 19(3), pp. 127-132.
Adapting to virtual third space language learning futures.
Veiga Marriott, R & Torres, P (Eds.) Handbook of Research on E-Learning Methodologies for Language Acquisition.
Information Science Reference (IGI Global), United States of America, Pennsylvania, Hershey, pp. 524-538.
Gui, Li & Tian, Yu-Chu
A conditional retransmission enabled transport protocol for real-time networked control systems. In
Pfeifer, Tom, Jayasumana, Anura, & Aschenbruck, Nils (Eds.)
Proceedings of the 36th Annual IEEE Conference on Local Computer Networks (LCN 2011), IEEE , Hilton Hotel, Bonn, pp. 235-238.
Ingram, David M.E., Campbell, Duncan A., Schaub, Pascal, & Ledwich, Gerard
Test and evaluation system for multi-protocol sampled value protection schemes. In
Proceedings of IEEE PES Trondheim PowerTech 2011, IEEE, Norwegian University of Science and Technology (NTNU), Trondheim, Norway.
Ingram, David M.E., Steinhauser, Fred, Marinescu, Cristian, Taylor, Richard R., Schaub, Pascal, & Campbell, Duncan A.
Direct evaluation of IEC 61850-9-2 process bus network performance.
IEEE Transactions on Smart Grid, 3(4), pp. 1853-1854.
Jurdak, Raja, Corke, Peter, Dharman, Dhinesh, & Salagnac, Guillaume
Adaptive GPS duty cycling and radio ranging for energy-efficient localization. In
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems - SenSys '10, Association for Computing Machinery (ACM), ETH Zurich, Zurich, pp. 57-73.
Lau, Andy, Mason, Richard, Pham, Binh, Richards, Mark, Roe, Paul, & Zhang, Jinglan
Monitoring the environment through acoustics using smartphone-based sensors and 3G networking. In
Langendoen, K (Ed.)
Proceedings of the Second International Workshop on Wireless Sensor Network Deployments (WiDeploy08); 4th IEEE International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, 11-14 June 2008, Greece, Santorini Island.
Liu, Vicky, Tesfamicael, Aklilu Daniel, Caelli, William, & Sahama, Tony R.
Network security and performance testing for health information system management. In
17th International Conference on E-health Networking, Application & Services (HealthCom2015), 14-17 October 2015, Boston, Mass.
Mathew, Avin D., Purser, Michael, Ma, Lin, & Barlow, Matthew
Open standards-based system integration for asset management decision support. In
Kiritsis, Dimitris, Emmanouilidis, Christos, Koronios, Andy, & Mathew, Joseph (Eds.)
Proceedings of the Fourth World Congress on Engineering Asset Management (WCEAM) 2009, Springer-Verlag London Limited, Athens, Greece, pp. 221-229.
Pereira, Arvind, Das, Jnaneshwar, Heidarsson, Hordur, Smith, Ryan N., Stauffer, Beth, Seubert, Erica, et al.
Networked robotic sensor platform deployments for use in coastal environmental assessment in southern California. In
Posters for the Center for Embedded Network Sensing, 5 Dec., 2009, University of California Los Angeles, Los Angeles, CA.
Rangasamy, Jothi, Stebila, Douglas, Boyd, Colin, & Gonzalez Nieto, Juan M.
An integrated approach to cryptographic mitigation of denial-of-service attacks. In
Sandhu, Ravi & Wong, Duncan S. (Eds.)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS) 2011, ACM, HKU SPACE Admiralty Learning Center, Hong Kong, pp. 114-123.
Schmidt, Stephan, Bye, Rainer, Chinnow, Joel, Bsufka, Karsten, Camtepe, Seyit A., & Albayrak, Sahin
Application-level simulation for network security.
Simulation, 86(5-6), pp. 311-330.
Smith, Ryan N. , Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Caron, David A., Jones, Burton H., et al.
Implementation of an embedded sensor network for the coordination of Slocum gliders for coastal monitoring and observation. In
WUWNet 09 : Proceedings of the 4th ACM International Workshop on UnderWater Networks, ACM, Bechtel Engineering Center, Berkeley, California, pp. 1-8.
Smith, Ryan N. , Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Cetinic, Ivona, Darjany, Lindsay, et al.
USC CINAPS Builds bridges : observing and monitoring the southern california bight.
IEEE Robotics and Automation Magazine, 17(1), pp. 20-30.
Smith, Ryan N. , Stauffer, Beth, Das, Jnaneshwar, Heidarsson, Hordur, Pereira, Arvind, Chao, Yi, et al.
Design and implementation of sensor networks for the observation and research of harmful algal blooms in southern California coastal waters. In
Proceedings of the 2009 Conference on Coastal Environmental Sensing Networks, Boston Park Plaza & University of Massachusetts, Boston, MA.
Stebila, Douglas, Kuppusamy, Lakshmi, Rangasamy, Jothi, Boyd, Colin, & Gonzalez Nieto, Juan
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. In
Kiayias, Aggelos (Ed.)
Topics in Cryptology – CT-RSA 2011, Springer, San Francisco, California, pp. 284-301.
Suriadi, Suriadi, Clark, Andrew J., & Schmidt, Desmond
Validating denial of service vulnerabilities in web services. In
Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei, & Sadeghi, Ahmad-Reza (Eds.)
IEEE Computer Society Proceedings of the Fourth International Conference on Network and System Security, IEEE Computer Society, Melbourne.
Tian, Guosong, Tian, Yu-Chu, & Fidge, Colin J.
Performance analysis of IEEE 802.11 DCF based WNCS networks. In
Proceedings of The 35th IEEE Conference on Local Computer Networks (LCN), IEEE, Sheraton Denver Downtown, Denver, Colorado, pp. 512-519.
Yildiz, Mursel, Toker, Ahmet Cihat, Sivrikaya, Fikret, Camtepe, Seyit A., & Albayrak, Sahin
User facilitated congestion and attack mitigation. In
Pentikousis, Kostas, Aguiar, Rui, Sargento, Susana, & Aguero, Ramon (Eds.)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering: Mobile Networks and Management, Springer Berlin Heidelberg, Aveiro, Portugal, pp. 358-371.