Jerry Park
Cited by
Cited by
An overview of anomaly detection techniques: Existing solutions and latest technological trends
A Patcha, JM Park
Computer networks 51 (12), 3448-3470, 2007
Defense against primary user emulation attacks in cognitive radio networks
R Chen, JM Park, JH Reed
IEEE Journal on selected areas in communications 26 (1), 25-37, 2008
Encyclopedia of cryptography and security
HCA Van Tilborg, S Jajodia
Springer Science & Business Media, 2014
Robust distributed spectrum sensing in cognitive radio networks
R Chen, JM Park, K Bian
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1876-1884, 2008
Toward secure distributed spectrum sensing in cognitive radio networks
R Chen, JM Park, YT Hou, JH Reed
IEEE Communications Magazine 46 (4), 50-55, 2008
Ensuring trustworthy spectrum sensing in cognitive radio networks
R Chen, JM Park
2006 1st IEEE Workshop on Networking Technologies for Software Defined Radio …, 2006
A quorum-based framework for establishing control channels in dynamic spectrum access networks
K Bian, JM Park, R Chen
Proceedings of the 15th annual international conference on Mobile computing …, 2009
Efficient multicast packet authentication using signature amortization
JM Park, EKP Chong, HJ Siegel
Proceedings 2002 IEEE Symposium on Security and Privacy, 227-240, 2002
Control channel establishment in cognitive radio networks using channel hopping
K Bian, JM Park, R Chen
IEEE Journal on Selected Areas in Communications 29 (4), 689-703, 2011
An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research
S Bhattarai, JMJ Park, B Gao, K Bian, W Lehr
IEEE Transactions on Cognitive Communications and Networking 2 (2), 110-128, 2016
Efficient multicast stream authentication using erasure codes
JM Park, EKP Chong, HJ Siegel
ACM Transactions on Information and System Security (TISSEC) 6 (2), 258-285, 2003
Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks
K Bian
IEEE transactions on Mobile Computing 12 (7), 1294-1307, 2012
Injecting RBAC to secure a web-based workflow system
GJ Ahn, R Sandhu, M Kang, J Park
Proceedings of the fifth ACM workshop on Role-based access control, 1-10, 2000
Cognitive radio and networking research at Virginia Tech
AB MacKenzie, JH Reed, P Athanas, CW Bostian, RM Buehrer, ...
Proceedings of the IEEE 97 (4), 660-688, 2009
Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures
JM Park, EKP Chong, HJ Siegel
Proceedings of the twenty-second annual symposium on Principles of …, 2003
Asynchronous channel hopping for establishing rendezvous in cognitive radio networks
K Bian, JM Park
2011 Proceedings IEEE INFOCOM, 236-240, 2011
MAC-layer misbehaviors in multi-hop cognitive radio networks
K Bian, JM Park
2006 US-Korea Conference on Science, Technology, and Entrepreneurship …, 2006
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks.
A Patcha, JM Park
Int. J. Netw. Secur. 2 (2), 131-137, 2006
A game theoretic approach to modeling intrusion detection in mobile ad hoc networks
A Patcha, JM Park
Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004
Protecting the primary users' operational privacy in spectrum sharing
B Bahrak, S Bhattarai, A Ullah, JMJ Park, J Reed, D Gurney
2014 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20