Classification approach for intrusion detection in vehicle systems A Alshammari, MA Zohdy, D Debnath, G Corser Wireless Engineering and Technology 9 (4), 79-94, 2018 | 108 | 2018 |
Evaluating Location Privacy in Vehicular Communications and Applications GP Corser, H Fu, A Banihani IEEE, 2016 | 74 | 2016 |
Privacy-by-decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services G Corser, H Fu, T Shu, P D'Errico, W Ma, S Leng, Y Zhu 2014 IEEE Intelligent Vehicles Symposium Proceedings, 1030-1036, 2014 | 28 | 2014 |
Endpoint Protection Zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks G Corser, H Fu, T Shu, P D'Errico, W Ma 2013 International Conference on Connected Vehicles and Expo (ICCVE), 369-374, 2013 | 18 | 2013 |
Internet of things security best practices G Corser, G Fink IEEE Internet Technology Policy Community White Paper, 2017 | 17 | 2017 |
Sybil attacks and defenses in internet of things and mobile social networks A Alharbi, M Zohdy, D Debnath, R Olawoyin, G Corser International Journal of Computer Science Issues (IJCSI) 15 (6), 36-41, 2018 | 16 | 2018 |
Blockchain adoption, implementation and integration in healthcare application systems W Bodeis, GP Corser SoutheastCon 2021, 1-3, 2021 | 13 | 2021 |
Effect on vehicle safety of nonexistent or silenced basic safety messages GP Corser, A Arenas, H Fu 2016 international conference on computing, networking and communications …, 2016 | 11 | 2016 |
T-PAAD: Trajectory privacy attack on autonomous driving A Banihani, A Alzahrani, R Alharthi, H Fu, GP Corser 2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018 | 7 | 2018 |
Maps: A multi-dimensional password scheme for mobile authentication J Gurary, Y Zhu, G Corser, J Oluoch, N Alnahash, H Fu Proceedings of the 2015 International Conference on Interactive Tabletops …, 2015 | 7 | 2015 |
CMAPS: a chess-based multi-facet password scheme for mobile devices Y Zhu, J Gurary, G Corser, J Oluoch, N Alnahash, H Fu, J Tang IEEE Access 6, 54795-54810, 2018 | 5 | 2018 |
Internet of Things (IoT) Security Best Practices; IEEE Internet Technology Policy Community; White Paper G Corser, G Fink, J Bielby IEEE: Piscataway, NJ, USA, 2017 | 5 | 2017 |
Location Privacy, Application Overhead and Congestion in VANET Location Based Services GP Corser, A Banihani, J Cox, R Hoque, H Fu, Y Zhu 2017 ieee 3rd international conference on big data security on cloud …, 2017 | 4 | 2017 |
IoT Security Principles and Best Practices G Corser, GA Fink, M Aledhari, J Bielby, R Nighot, S Mandal, N Aneja, ... | 4 | 2017 |
Energy prediction based intrusion detection in wireless sensor networks N Alrajei, G Corser, H Fu, Y Zhu International Journal of Emerging Technology and Advanced Engineering 4 (2), 2014 | 4 | 2014 |
Internet of Things (IOT) Security Best Practices: whitepaper, IEEE, 2017 G Corser, GA Fink, M Aledhari, J Bielby, R Nighot, S Mandal, N Aneja, ... | 3 | |
Classification of Mobile Healthcare App Research NR Senjaliya, GP Corser SoutheastCon 2021, 1-5, 2021 | 2 | 2021 |
Classification of Blockchain Implementation in Mobile Electronic Health Records and Internet of Medical Things Devices Research J Reinert, G Corser SoutheastCon 2021, 01-05, 2021 | 2 | 2021 |
Protecting vehicle privacy using dummy events N Alnahash, G Corser, H Fu, Y Zhu 2014 American Society For Engineering Education North Central Section …, 2014 | 2 | 2014 |
Position Altered Random Repetition of Transportation Signature (PARROTS): a VANET Privacy Model G Corser, H Fu, N Pondicherry, N Alnahash | 2 | 2013 |