Jin-Hee Cho
Jin-Hee Cho
Computer Science Department, Virginia Tech
Verified email at - Homepage
Cited by
Cited by
A survey on trust management for mobile ad hoc networks
JH Cho, A Swami, R Chen
IEEE communications surveys & tutorials 13 (4), 562-583, 2010
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
F Bao, R Chen, MJ Chang, JH Cho
IEEE Transactions on Network and Service Management 9 (2), 169-183, 2012
A survey on trust modeling
JH Cho, K Chan, S Adali
ACM Computing Surveys (CSUR) 48 (2), 1-40, 2015
A Survey on Systems Security Metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys 49 (4), Article 62, 2017
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
Dynamic trust management for delay tolerant networks and its application to secure routing
I Chen, F Bao, M Chang, J Cho
IEEE Transactions on Parallel and Distributed Systems 25 (5), 2014
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
JH Cho, A Swami, R Chen
Journal of Network and Computer Applications 35 (3), 1001-1012, 2012
A Survey on Modeling and Optimizing Multi-Objective Systems
JH Cho, Y Wang, IR Chen, K Chan, A Swami
IEEE Communications Surveys and Tutorials, 2017
Trust-based intrusion detection in wireless sensor networks
F Bao, R Chen, MJ Chang, JH Cho
2011 IEEE international conference on communications (ICC), 1-6, 2011
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
G Choudhary, V Sharma, I You, IR Chen, JH Cho
The 14th International Wireless Communications and Mobile Computing …, 2018
Trust management for encounter-based routing in delay tolerant networks
R Chen, F Bao, M Chang, JH Cho
2010 IEEE global telecommunications conference GLOBECOM 2010, 1-6, 2010
Uncertainty Aware Semi-Supervised Learning on Graph Data
X Zhao, S Hu, F Chen, JH Cho
Thirty-Fourth Annual Conference on Neural Information Processing Systems …, 2020
STRAM: Measuring the trustworthiness of computer-based systems
JH Cho, S Xu, PM Hurley, M Mackay, T Benjamin, M Beaumont
ACM Computing Surveys (CSUR) 51 (6), 1-47, 2019
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
JH Cho, R Chen, PG Feng
IEEE Transactions on Reliability 59 (1), 231-241, 2010
Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis
JH Cho, H Cam, A Oltramari
IEEE International Multi-Disciplinary Conference on Cognitive Methods in …, 2016
Trust management in mobile ad hoc networks for bias minimization and application performance maximization
R Chen, J Guo, F Bao, JH Cho
Ad Hoc Networks 19, 59-74, 2014
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networking
DP Sharma, DS Kim, S Yoon, H Lim, JH Cho, TJ Moore
The 17th IEEE International Conference on Trust, Security and Privacy in …, 2018
BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems
V Sharma, I You, K Yim, R Chen, JH Cho
IEEE Access 7, 118556-118580, 2019
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
JH Cho, A Swami, R Chen
2009 International Conference on Computational Science and Engineering 2 …, 2009
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
JH Cho, IR Chen
IEEE Transactions on Dependable and Secure Computing, 2018
The system can't perform the operation now. Try again later.
Articles 1–20