Energy-efficient secure pattern based data aggregation for wireless sensor networks H Çam, S Özdemir, P Nair, D Muthuavinashiappan, HO Sanli Computer Communications 29 (4), 446-455, 2006 | 266 | 2006 |
Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks S Ozdemir, H Çam IEEE/ACM Transactions on networking 18 (3), 736-749, 2009 | 155 | 2009 |
ESPDA: energy-efficient and secure pattern-based data aggregation for wireless sensor networks H Cam, S Ozdemir, P Nair, D Muthuavinashiappan SENSORS, 2003 IEEE 2, 732-736, 2003 | 152 | 2003 |
SRDA: secure reference-based data aggregation protocol for wireless sensor networks HO Sanli, S Ozdemir, H Cam IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 7, 4650-4654, 2004 | 143 | 2004 |
Energy efficient security protocol for wireless sensor networks H Çam, S Ozdemir, D Muthuavinashiappan, P Nair 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No …, 2003 | 125 | 2003 |
Real‐Time and Secure Wireless Health Monitoring S Dağtaş, G Pekhteryev, Z Şahinoğlu, H Cam, N Challa International Journal of Telemedicine and Applications 2008 (1), 135808, 2008 | 118 | 2008 |
Top-k interesting subgraph discovery in information networks M Gupta, J Gao, X Yan, H Cam, J Han 2014 IEEE 30th International Conference on Data Engineering, 820-831, 2014 | 89 | 2014 |
Effect of personality traits on trust and risk to phishing vulnerability: Modeling and analysis JH Cho, H Cam, A Oltramari 2016 IEEE International Multi-Disciplinary Conference on Cognitive Methods …, 2016 | 85 | 2016 |
Methods and systems for defending cyber attack in real-time H Cam US Patent 10,185,832, 2019 | 81 | 2019 |
Optimal scheduling of cybersecurity analysts for minimizing risk R Ganesan, S Jajodia, H Cam ACM Transactions on Intelligent Systems and Technology (TIST) 8 (4), 1-32, 2017 | 63 | 2017 |
Dynamic scheduling of cybersecurity analysts for minimizing risk using reinforcement learning R Ganesan, S Jajodia, A Shah, H Cam ACM Transactions on Intelligent Systems and Technology (TIST) 8 (1), 1-21, 2016 | 63 | 2016 |
Non-blocking OVSF codes and enhancing network capacity for 3G wireless and beyond systems H Cam Computer Communications 26 (17), 1907-1917, 2003 | 57* | 2003 |
Rearrangeability of (2 n-1)-stage shuffle-exchange networks H Cam SIAM Journal on Computing 32 (3), 557-585, 2003 | 51 | 2003 |
On detecting association-based clique outliers in heterogeneous information networks M Gupta, J Gao, X Yan, H Cam, J Han Proceedings of the 2013 IEEE/ACM International Conference on Advances in …, 2013 | 48 | 2013 |
Fingerprinting for cyber-physical system security: Device physics matters too Q Gu, D Formby, S Ji, H Cam, R Beyah IEEE Security & Privacy 16 (5), 49-59, 2018 | 39 | 2018 |
Examining the characteristics and implications of sensor side channels V Subramanian, S Uluagac, H Cam, R Beyah 2013 IEEE International Conference on Communications (ICC), 2205-2210, 2013 | 39 | 2013 |
Method and apparatus for determining a criticality surface of assets to enhance cyber defense H Cam US Patent 9,912,683, 2018 | 38 | 2018 |
Work-efficient routing algorithms for rearrangeable symmetrical networks H Cam, JAB Fortes IEEE Transactions on Parallel and Distributed Systems 10 (7), 733-741, 1999 | 38 | 1999 |
Energy efficient differentiable coverage service protocols for wireless sensor networks HO Sanli, H Cam Third IEEE International Conference on Pervasive Computing and …, 2005 | 36 | 2005 |
Collaborative two-level task scheduling for wireless sensor nodes with multiple sensing units. HO Sanli, R Poornachandran, H Cam SECON, 350-361, 2005 | 35 | 2005 |