Thomas M. Chen

According to our database1, Thomas M. Chen authored at least 54 papers between 1989 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Cryptography in WSNs.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

Wearables Security and Privacy.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

2018
Automated generation of colluding apps for experimental research.
J. Computer Virology and Hacking Techniques, 2018

Detection of app collusion potential using logic programming.
J. Network and Computer Applications, 2018

Optimal Policy Derivation for Transmission Duty-Cycle Constrained LPWAN.
IEEE Internet of Things Journal, 2018

2017
PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

Android Application Collusion Demystified.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

2016
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves.
J. UCS, 2016

A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices.
IJCSA, 2016

A Survey of Wearable Biometric Recognition Systems.
ACM Comput. Surv., 2016

Towards Automated Android App Collusion Detection.
Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, 2016

2015
ETARP: An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks.
J. Sensors, 2015

2014
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things.
IEEE Trans. Industrial Informatics, 2014

Write Pattern Format Algorithm for Reliable NAND-Based SSDs.
IEEE Trans. on Circuits and Systems, 2014

Concatenated LDPC-TCM coding for reliable storage in multi-level flash memories.
Proceedings of the 9th International Symposium on Communication Systems, 2014

Energy Harvesting Aware routing protocol for wireless sensor networks.
Proceedings of the 9th International Symposium on Communication Systems, 2014

2013
Nonintrusive tracing in the Internet.
Security and Communication Networks, 2013

Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of DSRC Network for Road Safety Applications.
IJDSN, 2013

2012
Editor's note.
IEEE Network, 2012

2011
Performance analysis of DSRC priority mechanism for road safety applications in vehicular networks.
Wireless Communications and Mobile Computing, 2011

Petri Net Modeling of Cyber-Physical Attacks on Smart Grid.
IEEE Trans. Smart Grid, 2011

How networks changed the world.
IEEE Network, 2011

Lessons from Stuxnet.
IEEE Computer, 2011

Malicious and Spam Posts in Online Social Networks.
IEEE Computer, 2011

2010
Identity Theft through the Web.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Proliferation and Detection of Blog Spam.
IEEE Security & Privacy, 2010

Adaptive congestion control for DSRC vehicle networks.
IEEE Communications Letters, 2010

Web Filtering and Censoring.
IEEE Computer, 2010

Studying Non-intrusive Tracing in the Internet.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2010

2009
Classification of Traffic Flows into QoS Classes by Unsupervised Learning and KNN Clustering.
TIIS, 2009

Design considerations for a honeypot for SQL injection Attacks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

A Mathematical View of Network-Based Suppressions of Worm Epidemics.
Proceedings of IEEE International Conference on Communications, 2009

2008
Authentication and Privacy.
Encyclopedia of Wireless and Mobile Communications, 2008

2007
A Web-Based Network Worm Simulator.
Proceedings of IEEE International Conference on Communications, 2007

2006
HEAF: A Novel Estimator for Long-Range Dependent Self-similar Network Traffic.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2006

A Decision Theoretic Approach to Measurement-based Admission Control.
Proceedings of IEEE International Conference on Communications, 2006

Effectiveness of Quarantine in Worm Epidemics.
Proceedings of IEEE International Conference on Communications, 2006

Effectiveness of Rate Control in Slowing Down Worm Epidemics.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks.
IEEE Internet Computing, 2005

2004
Worm Epidemics in High-Speed Networks.
IEEE Computer, 2004

Enhancing the support of multihopping in an IEEE 802.11 ad-hoc network.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Measurement-based real-time traffic model classification.
Proceedings of IEEE International Conference on Communications, 2004

An overlay algorithm to improve the support of multi-hopping in the IEEE 802.11 WLANs.
Proceedings of IEEE International Conference on Communications, 2004

2003
ATM dynamic bandwidth allocation using F-ARIMA prediction model.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

2002
A model and evaluation of distributed network management approaches.
IEEE Journal on Selected Areas in Communications, 2002

2001
Increasing the observability of Internet behavior.
Commun. ACM, 2001

Models and Analysis of Trade-offs in Distributed Network Management Approaches.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
Guest editorial recent advances in network management and operations.
IEEE Journal on Selected Areas in Communications, 2000

Fault restoration and spare capacity allocation with QoS constraints for MPLS networks.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

1998
Editorial - Wireless LANs.
MONET, 1998

1995
Time-Dependent Behavior of Fluid Buffer Models with Markov Input and Constant Output Rates.
SIAM Journal of Applied Mathematics, 1995

ATM switching systems.
Artech House, ISBN: 978-0-89006-682-9, 1995

1994
Parameter estimation for partially observed queues.
IEEE Trans. Communications, 1994

1989
Dynamic priority protocols for packet voice.
IEEE Journal on Selected Areas in Communications, 1989


  Loading...