Follow
Jin-Hee Cho
Jin-Hee Cho
Computer Science Department, Virginia Tech
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
A survey on trust management for mobile ad hoc networks
JH Cho, A Swami, R Chen
IEEE communications surveys & tutorials 13 (4), 562-583, 2010
10312010
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
F Bao, R Chen, MJ Chang, JH Cho
IEEE Transactions on Network and Service Management 9 (2), 169-183, 2012
5992012
A survey on trust modeling
JH Cho, K Chan, S Adali
ACM Computing Surveys (CSUR) 48 (2), 1-40, 2015
4622015
A Survey on Systems Security Metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys 49 (4), Article 62, 2017
3382017
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
3362020
Dynamic trust management for delay tolerant networks and its application to secure routing
I Chen, F Bao, M Chang, J Cho
IEEE Transactions on Parallel and Distributed Systems 25 (5), 2014
2502014
A Survey on Modeling and Optimizing Multi-Objective Systems
JH Cho, Y Wang, IR Chen, K Chan, A Swami
IEEE Communications Surveys and Tutorials, 2017
1672017
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
JH Cho, A Swami, R Chen
Journal of Network and Computer Applications 35 (3), 1001-1012, 2012
1662012
Trust-based intrusion detection in wireless sensor networks
F Bao, R Chen, MJ Chang, JH Cho
2011 IEEE international conference on communications (ICC), 1-6, 2011
1522011
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
G Choudhary, V Sharma, I You, IR Chen, JH Cho
The 14th International Wireless Communications and Mobile Computing …, 2018
1262018
Uncertainty Aware Semi-Supervised Learning on Graph Data
X Zhao, S Hu, F Chen, JH Cho
Thirty-Fourth Annual Conference on Neural Information Processing Systems …, 2020
1232020
STRAM: Measuring the trustworthiness of computer-based systems
JH Cho, S Xu, PM Hurley, M Mackay, T Benjamin, M Beaumont
ACM Computing Surveys (CSUR) 51 (6), 1-47, 2019
1122019
Trust management for encounter-based routing in delay tolerant networks
R Chen, F Bao, M Chang, JH Cho
2010 IEEE global telecommunications conference GLOBECOM 2010, 1-6, 2010
1062010
Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis
JH Cho, H Cam, A Oltramari
IEEE International Multi-Disciplinary Conference on Cognitive Methods in …, 2016
922016
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
JH Cho, R Chen, PG Feng
IEEE Transactions on Reliability 59 (1), 231-241, 2010
922010
Trust management in mobile ad hoc networks for bias minimization and application performance maximization
R Chen, J Guo, F Bao, JH Cho
Ad Hoc Networks 19, 59-74, 2014
872014
A survey of defensive deception: Approaches using game theory and machine learning
M Zhu, AH Anwar, Z Wan, JH Cho, CA Kamhoua, MP Singh
IEEE Communications Surveys & Tutorials 23 (4), 2460-2493, 2021
862021
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networking
DP Sharma, DS Kim, S Yoon, H Lim, JH Cho, TJ Moore
The 17th IEEE International Conference on Trust, Security and Privacy in …, 2018
842018
A survey on centrality metrics and their network resilience analysis
Z Wan, Y Mahajan, BW Kang, TJ Moore, JH Cho
IEEE Access 9, 104773-104819, 2021
812021
BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems
V Sharma, I You, K Yim, R Chen, JH Cho
IEEE Access 7, 118556-118580, 2019
802019
The system can't perform the operation now. Try again later.
Articles 1–20