Bo Sun

Affiliations:
  • Lamar University, Department of Computer Science, Beaumont, TX, USA
  • Texas A&M University, Department of Computer Science, College Station, TX, USA (PhD 2004)


According to our database1, Bo Sun authored at least 69 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Utilisation and energy consumption of fair-access in sensor networks with selected grid topologies.
Int. J. Ad Hoc Ubiquitous Comput., 2017

2016
Software-Defined Device-to-Device (D2D) Communications in Virtual Wireless Networks With Imperfect Network State Information (NSI).
IEEE Trans. Veh. Technol., 2016

Computer operating system logging and security issues: a survey.
Secur. Commun. Networks, 2016

Security Issues in ProtoGENI.
EAI Endorsed Trans. Ind. Networks Intell. Syst., 2016

Water quality monitoring using STORM 3 Data Loggers and a wireless sensor network.
Int. J. Sens. Networks, 2016

2015
A geographic information system framework for data visualisation in wireless sensor networks.
Int. J. Sens. Networks, 2015

ProtoGENI experiments.
Int. J. Secur. Networks, 2015

2013
Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks.
IEEE Syst. J., 2013

A Prototype Wireless Sensor Network for Precision Agriculture.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
A delineated R-tree indexing method for managing moving objects.
Int. J. Inf. Decis. Sci., 2012

Utilizing silent negative voting and sleep/wakeup method for power efficient data fusion.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Application layer QoS optimization for multimedia transmission over cognitive radio networks.
Wirel. Networks, 2011

A lightweight block cipher based on a multiple recursive generator for wireless sensor networks and RFID.
Wirel. Commun. Mob. Comput., 2011

Licklider transmission protocol (LTP)-based DTN for cislunar communications.
IEEE/ACM Trans. Netw., 2011

Efficient Monitoring Strategy for Active Environments.
J. Softw., 2011

QoS Provisioning for Multimedia Transmission in Cognitive Radio Networks
CoRR, 2011

A Highly Adaptable Information Dissemination Strategy.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

Hot spot aware energy efficient clustering approach for Wireless Sensor Networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

TORP: TinyOS Opportunistic Routing Protocol for Wireless Sensor Networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Coverage and Detection of a Randomized Scheduling Algorithm in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

Intelligent Sensor Independent Decisions for Entropic Targets.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Protocols for reliable data transport in space internet.
IEEE Commun. Surv. Tutorials, 2009

Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks.
Comput. Networks, 2009

Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications.
Ad Hoc Networks, 2009

Mobi-watchdog: you can steal, but you can't run!
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

An Efficient Information Access Scheme for Mobile Objects.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

2008
Security co-existence of wireless sensor networks and RFID for pervasive computing.
Comput. Commun., 2008

Three Dimensional Intrusion Objects Detection under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the MSN 2008, 2008

Intrusion Objects with Shapes under Randomized Scheduling Algorithm in Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

A Distributed Algorithm for Finding Global Icebergs with Linked Counting Bloom Filters.
Proceedings of IEEE International Conference on Communications, 2008

Worm Propagation Dynamics in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Lightweight Block Cipher Based on a Multiple Recursive Generator.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Intrusion detection techniques in mobile ad hoc and wireless sensor networks.
IEEE Wirel. Commun., 2007

Optimal Utilization and Effects of Inaccurate Estimation in Mobile Database Failure Restoration.
IEEE Trans. Wirel. Commun., 2007

Detection of Fraudulent Usage in Wireless Networks.
IEEE Trans. Veh. Technol., 2007

Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks.
Int. J. Wirel. Mob. Comput., 2007

Integration of mobility and intrusion detection for wireless <i>ad hoc</i> networks.
Int. J. Commun. Syst., 2007

A survey of key management schemes in wireless sensor networks.
Comput. Commun., 2007

Secure data aggregation without persistent cryptographic operations in wireless sensor networks.
Ad Hoc Networks, 2007

Modeling Detection Metrics in Randomized Scheduling Algorithm in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Experimental Performance Comparison of Rate-based and Store-and-Forward Transmission Mechanisms over Error-Prone Cislunar Communication Links.
Proceedings of IEEE International Conference on Communications, 2007

Integration of Secure In-Network Aggregation and System Monitoring for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2007

Change-Point Monitoring for Secure In-Network Aggregation in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2007

2006
Enhancing security using mobility-based anomaly detection in cellular mobile networks.
IEEE Trans. Veh. Technol., 2006

Random Coverage with Guaranteed Connectivity: Joint Scheduling for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2006

MAC Security and Security Overhead Analysis in the IEEE 802.15.4 Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2006

A lightweight secure protocol for wireless sensor networks.
Comput. Commun., 2006

Security and privacy in RFID and applications in telemedicine.
IEEE Commun. Mag., 2006

Zone-Based Intrusion Detection for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2006

A LCG-based Secure Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Performance Analysis of Advanced Encryption Standard (AES).
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Maximizing Network Lifetime under QoS Constraints in Wireless Sensor Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Configurable Acknowledgment Delay (CAD) Mechanism for Asymmetric Space-Internet Links.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Experimental Evaluation of SCPS-TP over Lossy GEO-Space Links.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Enhancing Security using Calling Activity for Wireless Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Lightweight Secure Solution for RFID.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Enhancing Security using Mobility Profile for Cellular Mobile Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Security Issues in the IEEE 802.15.3 WPANs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Towards adaptive anomaly detection in cellular mobile networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
Intrusion detection in mobile ad hoc networks.
PhD thesis, 2005

Which transmission mechanism is best for space Internet: window-based, rate-based, or a hybrid of the two?
IEEE Wirel. Commun., 2005

Security services and enhancements in the IEEE 802.15.4 wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

An experimental analysis of rate-based and window-based transmission mechanisms over simulated space-Internet links.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Using Linear Congruential Generators for Cryptographic Purposes.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

2004
Mobility-based anomaly detection in cellular mobile networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Towards adaptive intrusion detection in mobile ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Alert aggregation in mobile ad hoc networks.
Proceedings of the 2003 ACM Workshop on Wireless Security, 2003

Routing anomaly detection in mobile ad hoc networks.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003


  Loading...