Jin-Hee Cho
Jin-Hee Cho
Computer Science Department, Virginia Tech
Verified email at - Homepage
Cited by
Cited by
A survey on trust management for mobile ad hoc networks
JH Cho, A Swami, R Chen
IEEE communications surveys & tutorials 13 (4), 562-583, 2010
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
F Bao, R Chen, MJ Chang, JH Cho
IEEE Transactions on Network and Service Management 9 (2), 169-183, 2012
A survey on trust modeling
JH Cho, K Chan, S Adali
ACM Computing Surveys (CSUR) 48 (2), 1-40, 2015
A Survey on Systems Security Metrics
M Pendleton, R Garcia-Lebron, JH Cho, S Xu
ACM Computing Surveys 49 (4), Article 62, 2017
Dynamic trust management for delay tolerant networks and its application to secure routing
I Chen, F Bao, M Chang, J Cho
IEEE Transactions on Parallel and Distributed Systems 25 (5), 2014
Toward proactive, adaptive defense: A survey on moving target defense
JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ...
IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
JH Cho, A Swami, R Chen
Journal of Network and Computer Applications 35 (3), 1001-1012, 2012
Trust-based intrusion detection in wireless sensor networks
F Bao, R Chen, MJ Chang, JH Cho
2011 IEEE international conference on communications (ICC), 1-6, 2011
A Survey on Modeling and Optimizing Multi-Objective Systems
JH Cho, Y Wang, IR Chen, K Chan, A Swami
IEEE Communications Surveys and Tutorials, 2017
Trust management for encounter-based routing in delay tolerant networks
R Chen, F Bao, M Chang, JH Cho
2010 IEEE global telecommunications conference GLOBECOM 2010, 1-6, 2010
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
JH Cho, R Chen, PG Feng
IEEE Transactions on Reliability 59 (1), 231-241, 2010
STRAM: Measuring the trustworthiness of computer-based systems
JH Cho, S Xu, PM Hurley, M Mackay, T Benjamin, M Beaumont
ACM Computing Surveys (CSUR) 51 (6), 1-47, 2019
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey
G Choudhary, V Sharma, I You, IR Chen, JH Cho
The 14th International Wireless Communications and Mobile Computing …, 2018
Trust management in mobile ad hoc networks for bias minimization and application performance maximization
R Chen, J Guo, F Bao, JH Cho
Ad Hoc Networks 19, 59-74, 2014
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
JH Cho, A Swami, R Chen
2009 International Conference on Computational Science and Engineering 2 …, 2009
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networking
DP Sharma, DS Kim, S Yoon, H Lim, JH Cho, TJ Moore
The 17th IEEE International Conference on Trust, Security and Privacy in …, 2018
BRIoT: Behavior rule specification-based misbehavior detection for IoT-embedded cyber-physical systems
V Sharma, I You, K Yim, R Chen, JH Cho
IEEE Access 7, 118556-118580, 2019
Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis
JH Cho, H Cam, A Oltramari
IEEE International Multi-Disciplinary Conference on Cognitive Methods in …, 2016
LogitTrust: A Logit Regression-based Trust Model for Mobile Ad Hoc Networks
Y Wang, YC Lu, R Chen, JH Cho, A Swami, CT Lu
The Sixth ASE International Conference on Privacy, Security, Risk and Trust …, 2014
Uncertainty Aware Semi-Supervised Learning on Graph Data
X Zhao, S Hu, F Chen, JH Cho
Thirty-Fourth Annual Conference on Neural Information Processing Systems …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20