• 7508 Citations
  • 40 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2015

Evaluating Cybersecurity Education Interventions: Three Case Studies

Mirkovic, J., Dark, M., Du, W., Vigna, G. & Denning, T., May 1 2015, In : IEEE Security and Privacy. 13, 3, p. 63-69 7 p., 7118092.

Research output: Contribution to journalArticle

10 Scopus citations

Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation

Borle, K. M., Chen, B. & Du, W., Oct 1 2015, In : IEEE Transactions on Information Forensics and Security. 10, 10, p. 2225-2235 11 p., 7150393.

Research output: Contribution to journalArticle

15 Scopus citations
2012

Containing bogus packet insertion attacks for broadcast authentication in sensor networks

Xiong, K., Wang, R., Du, W. & Ning, P., Jul 1 2012, In : ACM Transactions on Sensor Networks. 8, 3, 20.

Research output: Contribution to journalArticle

4 Scopus citations

Cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., Sep 3 2012, In : IEEE Journal on Selected Areas in Communications. 30, 8, p. 1578-1588 11 p., 6280261.

Research output: Contribution to journalArticle

73 Scopus citations

Social network based reputation computation and document classification

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H., Wang, L. & Jin, X., Jun 26 2012, In : Journal of Universal Computer Science. 18, 4, p. 532-553 22 p.

Research output: Contribution to journalArticle

7 Scopus citations
2011

SEED: Hands-on lab exercises for computer security education

Du, W., Sep 1 2011, In : IEEE Security and Privacy. 9, 5, p. 70-73 4 p., 6029361.

Research output: Contribution to journalArticle

32 Scopus citations
2010

Private predictions on hidden Markov models

Polat, H., Du, W., Renckes, S. & Oysal, Y., Jun 1 2010, In : Artificial Intelligence Review. 34, 1, p. 53-72 20 p.

Research output: Contribution to journalArticle

7 Scopus citations
2009

A hybrid multi-group approach for privacy-preserving data mining

Teng, Z. & Du, W., May 1 2009, In : Knowledge and Information Systems. 19, 2, p. 133-157 25 p.

Research output: Contribution to journalArticle

16 Scopus citations

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

Wang, R., Du, W., Liu, X. & Ning, P., Dec 1 2009, In : ACM Transactions on Sensor Networks. 6, 1, 9.

Research output: Contribution to journalArticle

24 Scopus citations
2008

Attack-resistant location estimation in wireless sensor networks

Liu, D., Ning, P., Liu, A., Wang, C. & Du, W. K., Jul 1 2008, In : ACM Transactions on Information and System Security. 11, 4, 22.

Research output: Contribution to journalArticle

98 Scopus citations

Group-based key predistribution for wireless sensor networks

Liu, D., Ning, P. & Du, W., Mar 1 2008, In : ACM Transactions on Sensor Networks. 4, 2, 11.

Research output: Contribution to journalArticle

81 Scopus citations

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Ning, P., Liu, A. & Du, W., Jan 1 2008, In : ACM Transactions on Sensor Networks. 4, 1, 1.

Research output: Contribution to journalArticle

122 Scopus citations

Privacy-preserving top-N recommendation on distributed data

Polat, H. & Du, W., May 1 2008, In : Journal of the American Society for Information Science and Technology. 59, 7, p. 1093-1108 16 p.

Research output: Contribution to journalArticle

38 Scopus citations

SEED: A suite of instructional laboratories for computer security education

Du, W. & Wang, R., Mar 1 2008, In : ACM Journal on Educational Resources in Computing. 8, 1, 3.

Research output: Contribution to journalArticle

48 Scopus citations
2007

Stateful DDoS attacks and targeted filtering

Chen, S., Tang, Y. & Du, W., Aug 2007, In : Journal of Network and Computer Applications. 30, 3, p. 823-840 18 p.

Research output: Contribution to journalArticle

16 Scopus citations
2006

A key predistribution scheme for sensor networks using deployment knowledge

Du, W., Deng, J. & Han, Y. S., 2006, In : IEEE Transactions on Dependable and Secure Computing. 3, 1, p. 62-77 16 p.

Research output: Contribution to journalArticle

182 Scopus citations

A novel approach for computer security education using Minix instructional operating system

Du, W., Shang, M. & Xu, H., May 1 2006, In : Computers and Security. 25, 3, p. 190-200 11 p.

Research output: Contribution to journalArticle

7 Scopus citations

LAD: Localization anomaly detection for wireless sensor networks

Du, W., Fang, L. & Peng, N., Jul 2006, In : Journal of Parallel and Distributed Computing. 66, 7, p. 874-886 13 p.

Research output: Contribution to journalArticle

61 Scopus citations
2005

Oblivious signature-based envelope

Li, N., Du, W. & Boneh, D., May 1 2005, In : Distributed Computing. 17, 4, p. 293-302 10 p.

Research output: Contribution to journalArticle

30 Scopus citations

Privacy-preserving collaborative filtering

Polat, H. & Du, W., Jan 1 2005, In : International Journal of Electronic Commerce. 9, 4, p. 9-35 27 p.

Research output: Contribution to journalArticle

65 Scopus citations
2002

Testing for software vulnerability using environment perturbation

Du, W. & Mathur, A. P., May 1 2002, In : Quality and Reliability Engineering International. 18, 3, p. 261-272 12 p.

Research output: Contribution to journalArticle

11 Scopus citations
2001

Privacy-preserving cooperative scientific computations

Du, W. & Atallah, M. J., Jan 1 2001, In : Proceedings of the Computer Security Foundations Workshop. p. 273-282 10 p.

Research output: Contribution to journalArticle

114 Scopus citations