If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

  • 7013 Citations
  • 39 h-Index
  • 69 Conference contribution
  • 24 Article
  • 2 Chapter
Filter
Article
2015
5 Citations (Scopus)

Evaluating Cybersecurity Education Interventions: Three Case Studies

Mirkovic, J., Dark, M., Du, W., Vigna, G. & Denning, T., May 1 2015, In : IEEE Security and Privacy. 13, 3, p. 63-69 7 p., 7118092.

Research output: Contribution to journalArticle

Education
evaluation
education
university
13 Citations (Scopus)

Physical layer spectrum usage authentication in cognitive radio: Analysis and implementation

Borle, K. M., Chen, B. & Du, W., Oct 1 2015, In : IEEE Transactions on Information Forensics and Security. 10, 10, p. 2225-2235 11 p., 7150393.

Research output: Contribution to journalArticle

Cognitive radio
Authentication
Hash functions
Software radio
Degradation
2012
4 Citations (Scopus)

Containing bogus packet insertion attacks for broadcast authentication in sensor networks

Xiong, K., Wang, R., Du, W. & Ning, P., Jul 2012, In : ACM Transactions on Sensor Networks. 8, 3, 20.

Research output: Contribution to journalArticle

Sensor nodes
Authentication
Sensor networks
Public key cryptography
Broadcasting
65 Citations (Scopus)

Cooperative key generation in wireless networks

Lai, L., Liang, Y. & Du, W., 2012, In : IEEE Journal on Selected Areas in Communications. 30, 8, p. 1578-1588 11 p., 6280261.

Research output: Contribution to journalArticle

Multiplexing
Wireless networks
Network protocols
6 Citations (Scopus)

Social network based reputation computation and document classification

Lee, J. Y., Duan, Y., Oh, J. C., Du, W., Blair, H. A., Wang, L. & Jin, X., 2012, In : Journal of Universal Computer Science. 18, 4, p. 532-553 22 p.

Research output: Contribution to journalArticle

Document Classification
Social Networks
Community Detection
Scale-free Networks
Complex networks
2011
22 Citations (Scopus)

SEED: Hands-on lab exercises for computer security education

Du, W., Sep 2011, In : IEEE Security and Privacy. 9, 5, p. 70-73 4 p., 6029361.

Research output: Contribution to journalArticle

Security of data
Education
Network security
Security systems
Access control
2010
7 Citations (Scopus)

Private predictions on hidden Markov models

Polat, H., Du, W., Renckes, S. & Oysal, Y., Jun 2010, In : Artificial Intelligence Review. 34, 1, p. 53-72 20 p.

Research output: Contribution to journalArticle

Hidden Markov models
privacy
Hidden Markov Model
Prediction
Finance
2009
14 Citations (Scopus)

A hybrid multi-group approach for privacy-preserving data mining

Teng, Z. & Du, W., May 2009, In : Knowledge and Information Systems. 19, 2, p. 133-157 25 p.

Research output: Contribution to journalArticle

Data mining
Data privacy
Miners
Association rules
Decision trees
21 Citations (Scopus)

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

Wang, R., Du, W., Liu, X. & Ning, P., Dec 1 2009, In : ACM Transactions on Sensor Networks. 6, 1, 9.

Research output: Contribution to journalArticle

Public key cryptography
Authentication
Sensor networks
Packet loss
Sensor nodes
2008
94 Citations (Scopus)

Attack-resistant location estimation in wireless sensor networks

Liu, D., Ning, P., Liu, A., Wang, C. & Du, W., Jul 1 2008, In : ACM Transactions on Information and System Security. 11, 4, 22.

Research output: Contribution to journalArticle

Wireless sensor networks
Sensor networks
Authentication
Sensors
Network protocols
78 Citations (Scopus)

Group-based key predistribution for wireless sensor networks

Liu, D., Ning, P. & Du, W., Mar 1 2008, In : ACM Transactions on Sensor Networks. 4, 2, 11.

Research output: Contribution to journalArticle

Sensor nodes
Wireless sensor networks
Sensors
Sensor networks
Polynomials
117 Citations (Scopus)

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

Ning, P., Liu, A. & Du, W., Jan 1 2008, In : ACM Transactions on Sensor Networks. 4, 1, 1.

Research output: Contribution to journalArticle

Authentication
Wireless sensor networks
Sensor nodes
Denial-of-service attack
Electronic document identification systems

Privacy-preserving top-N recommendation on distributed data

Polat, H. & Du, W., May 2008, In : Revista Espanola de Cirugia Ortopedica y Traumatologia. 52, 7, p. 1093-1108 16 p.

Research output: Contribution to journalArticle

Privacy
privacy
Data privacy
Collaborative filtering
Industry
38 Citations (Scopus)

SEED: A suite of instructional laboratories for computer security education

Du, W. & Wang, R., Mar 1 2008, In : ACM Journal on Educational Resources in Computing. 8, 1, 3.

Research output: Contribution to journalArticle

Security of data
Education
Computer operating systems
Curricula
Computer science
2007
15 Citations (Scopus)

Stateful DDoS attacks and targeted filtering

Chen, S., Tang, Y. & Du, W., Aug 2007, In : Journal of Network and Computer Applications. 30, 3, p. 823-840 18 p.

Research output: Contribution to journalArticle

Internet
Denial-of-service attack
Linux
2006
177 Citations (Scopus)

A key predistribution scheme for sensor networks using deployment knowledge

Du, W., Deng, J. & Han, Y. S., Jan 2006, In : IEEE Transactions on Dependable and Secure Computing. 3, 1, p. 62-77 16 p.

Research output: Contribution to journalArticle

Sensor networks
Wireless sensor networks
Data storage equipment
Sensor nodes
Cryptography
7 Citations (Scopus)

A novel approach for computer security education using Minix instructional operating system

Du, W., Shang, M. & Xu, H., May 2006, In : Computers and Security. 25, 3, p. 190-200 11 p.

Research output: Contribution to journalArticle

Security of data
Education
Students
Teaching
education
59 Citations (Scopus)

LAD: Localization anomaly detection for wireless sensor networks

Du, W., Fang, L. & Peng, N., Jul 2006, In : Journal of Parallel and Distributed Computing. 66, 7, p. 874-886 13 p.

Research output: Contribution to journalArticle

Anomaly Detection
Wireless Sensor Networks
Wireless sensor networks
Vertex of a graph
Global positioning system
2005
484 Citations (Scopus)

A pairwise key predistribution scheme for wireless sensor networks

Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J. & Khalili, A., May 2005, In : ACM Transactions on Information and System Security. 8, 2, p. 228-258 31 p.

Research output: Contribution to journalArticle

Wireless sensor networks
Sensor nodes
Complex networks
Authentication
Cryptography

Message from the workshop co-chairs

Ning, P. & Du, W., 2005, In : Unknown Journal. 2005

Research output: Contribution to journalArticle

30 Citations (Scopus)

Oblivious signature-based envelope

Li, N., Du, W. & Boneh, D., May 2005, In : Distributed Computing. 17, 4, p. 293-302 10 p.

Research output: Contribution to journalArticle

Envelope
Signature
Access control
Cryptography
Receiver
63 Citations (Scopus)

Privacy-preserving collaborative filtering

Polat, H. & Du, W., Jun 2005, In : International Journal of Electronic Commerce. 9, 4, p. 9-35 27 p.

Research output: Contribution to journalArticle

Privacy preserving
Collaborative filtering
Privacy
Perturbation
Singular value decomposition
2004
11 Citations (Scopus)
Process Control
Flow control
Anomaly
Process control
Attack
2002
10 Citations (Scopus)

Testing for software vulnerability using environment perturbation

Du, W. & Mathur, A. P., May 2002, In : Quality and Reliability Engineering International. 18, 3, p. 261-272 12 p.

Research output: Contribution to journalArticle

Testing
Defects
Windows operating system
Fault tolerance
Perturbation