关注
Hasan Cam
Hasan Cam
Best Buy
在 bestbuy.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Energy-efficient secure pattern based data aggregation for wireless sensor networks
H Çam, S Özdemir, P Nair, D Muthuavinashiappan, HO Sanli
Computer Communications 29 (4), 446-455, 2006
2662006
Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks
S Ozdemir, H Çam
IEEE/ACM Transactions on networking 18 (3), 736-749, 2009
1552009
ESPDA: energy-efficient and secure pattern-based data aggregation for wireless sensor networks
H Cam, S Ozdemir, P Nair, D Muthuavinashiappan
SENSORS, 2003 IEEE 2, 732-736, 2003
1522003
SRDA: secure reference-based data aggregation protocol for wireless sensor networks
HO Sanli, S Ozdemir, H Cam
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 7, 4650-4654, 2004
1432004
Energy efficient security protocol for wireless sensor networks
H Çam, S Ozdemir, D Muthuavinashiappan, P Nair
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003
1252003
Real‐Time and Secure Wireless Health Monitoring
S Dağtaş, G Pekhteryev, Z Şahinoğlu, H Cam, N Challa
International Journal of Telemedicine and Applications 2008 (1), 135808, 2008
1182008
Top-k interesting subgraph discovery in information networks
M Gupta, J Gao, X Yan, H Cam, J Han
2014 IEEE 30th International Conference on Data Engineering, 820-831, 2014
892014
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis
JH Cho, H Cam, A Oltramari
2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2016
852016
Methods and systems for defending cyber attack in real-time
H Cam
US Patent 10,185,832, 2019
812019
Optimal scheduling of cybersecurity analysts for minimizing risk
R Ganesan, S Jajodia, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (4), 1-32, 2017
632017
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning
R Ganesan, S Jajodia, A Shah, H Cam
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016
632016
Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems
H Cam
Computer Communications 26 (17), 1907-1917, 2003
57*2003
Rearrangeability of (2 n-1)-stage shuffle-exchange networks
H Cam
SIAM Journal on Computing 32 (3), 557-585, 2003
512003
On detecting association-based clique outliers in heterogeneous information networks
M Gupta, J Gao, X Yan, H Cam, J Han
Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013
482013
Fingerprinting for cyber-physical system security: Device physics matters too
Q Gu, D Formby, S Ji, H Cam, R Beyah
IEEE Security & Privacy 16 (5), 49-59, 2018
392018
Examining the characteristics and implications of sensor side channels
V Subramanian, S Uluagac, H Cam, R Beyah
2013 IEEE International Conference on Communications (ICC), 2205-2210, 2013
392013
Method and apparatus for determining a criticality surface of assets to enhance cyber defense
H Cam
US Patent 9,912,683, 2018
382018
Work-efficient routing algorithms for rearrangeable symmetrical networks
H Cam, JAB Fortes
IEEE Transactions on Parallel and Distributed Systems 10 (7), 733-741, 1999
381999
Energy efficient differentiable coverage service protocols for wireless sensor networks
HO Sanli, H Cam
Third IEEE International Conference on Pervasive Computing and …, 2005
362005
Collaborative two-level task scheduling for wireless sensor nodes with multiple sensing units.
HO Sanli, R Poornachandran, H Cam
SECON, 350-361, 2005
352005
系统目前无法执行此操作,请稍后再试。
文章 1–20