cliff wang
cliff wang
ARO/NCSU
Verified email at ncsu.edu
Title
Cited by
Cited by
Year
Moving Target Defense
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer, 2011
408*2011
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer, 2012
3102012
Secure and Resilient Time Synchronization in Wireless Sensor Networks
K Sun, P Ning, C Wang
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc …, 2007
230*2007
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
K Sun, P Ning, C Wang
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2302006
Review and evaluation of security threats on the communication networks in the smart grid
Z Lu, X Lu, W Wang, C Wang
MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 1830-1835, 2010
1932010
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer, 2010
1472010
Secure and resilient clock synchronization in wireless sensor networks
K Sun, P Ning, C Wang
Selected Areas in Communications, IEEE Journal on 24 (2), 395-408, 2006
1442006
Attack-resistant location estimation in wireless sensor networks
D Liu, P Ning, A Liu, C Wang, WK Du
ACM Transactions on Information and System Security (TISSEC) 11 (4), 22, 2008
1432008
Secure distributed cluster formation in wireless sensor networks
K Sun, P Peng, P Ning, C Wang
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, 131-140, 2006
1322006
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness, 3-13, 2010
1312010
Moving Target Defense II
S Jajodia, AK Ghosh, VS Subrahmanian, V Swarup, C Wang, XS Wang
Springer, 2013
129*2013
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks: For Wireless Sensor and AD Hoc Networks
R Poovendran, C Wang, S Roy
Springer, 2007
98*2007
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
K Sun, P Ning, C Wang
Dependable and Secure Computing, IEEE Transactions on 2 (3), 177-189, 2005
932005
Cyber defense and situational awareness
A Kott, C Wang, RF Erbacher
Springer, 2015
902015
Botnet detection: countering the largest security threat
W Lee, C Wang, D Dagon
Springer, 2007
842007
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications
Z Lu, W Wang, C Wang
IEEE, 2014
752014
Studies on the electrochemical properties of MlNi sub 4. 3-x Co sub x Al sub 0. 7 hydride alloy electrodes
H Pan, J Ma, C Wang, S Chen, X Wang, C Chen, Q Wang
Journal of Alloys and Compounds(Switzerland) 293, 648-652, 1998
74*1998
Performance evaluation of filtered backprojection reconstruction and iterative reconstruction methods for PET images
CX Wang, WE Snyder, G Bilbro, P Santago
Computers in biology and medicine 28 (1), 13-25, 1998
631998
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
Z Lu, W Wang, C Wang
INFOCOM, 2011 Proceedings IEEE, 1871-1879, 2011
602011
Semi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks
J Chen, C Wang, Y Sun, X Shen
Computer Networks 55 (10), 2481-2491, 2011
492011
The system can't perform the operation now. Try again later.
Articles 1–20