cliff wang
cliff wang
ARO/NCSU
Verified email at ncsu.edu
Title
Cited by
Cited by
Year
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
4142011
Introduction to hardware security and trust
M Tehranipoor, C Wang
Springer, 2012
3182012
Secure and Resilient Time Synchronization in Wireless Sensor Networks
K Sun, P Ning, C Wang
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc …, 2007
232*2007
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
K Sun, P Ning, C Wang
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2322006
Review and evaluation of security threats on the communication networks in the smart grid
Z Lu, X Lu, W Wang, C Wang
MILITARY COMMUNICATIONS CONFERENCE, 2010-MILCOM 2010, 1830-1835, 2010
1962010
Cyber situational awareness
S Jajodia, P Liu, V Swarup, C Wang
Springer, 2010
1502010
Attack-resistant location estimation in wireless sensor networks
D Liu, P Ning, A Liu, C Wang, WK Du
ACM Transactions on Information and System Security (TISSEC) 11 (4), 22, 2008
1452008
Secure and resilient clock synchronization in wireless sensor networks
K Sun, P Ning, C Wang
Selected Areas in Communications, IEEE Journal on 24 (2), 395-408, 2006
1452006
Secure distributed cluster formation in wireless sensor networks
K Sun, P Peng, P Ning, C Wang
Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, 131-140, 2006
1352006
Cyber SA: Situational awareness for cyber defense
P Barford, M Dacier, TG Dietterich, M Fredrikson, J Giffin, S Jajodia, S Jha, ...
Cyber Situational Awareness, 3-13, 2010
1342010
Moving Target Defense II
S Jajodia, AK Ghosh, VS Subrahmanian, V Swarup, C Wang, XS Wang
Springer, 2013
131*2013
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks: For Wireless Sensor and AD Hoc Networks
R Poovendran, C Wang, S Roy
Springer, 2007
99*2007
Fault-tolerant cluster-wise clock synchronization for wireless sensor networks
K Sun, P Ning, C Wang
Dependable and Secure Computing, IEEE Transactions on 2 (3), 177-189, 2005
932005
Cyber defense and situational awareness
A Kott, C Wang, RF Erbacher
Springer, 2015
912015
Botnet detection: countering the largest security threat
W Lee, C Wang, D Dagon
Springer, 2007
842007
Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications
Z Lu, W Wang, C Wang
IEEE, 2014
762014
Performance evaluation of filtered backprojection reconstruction and iterative reconstruction methods for PET images
CX Wang, WE Snyder, G Bilbro, P Santago
Computers in biology and medicine 28 (1), 13-25, 1998
631998
From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic
Z Lu, W Wang, C Wang
INFOCOM, 2011 Proceedings IEEE, 1871-1879, 2011
602011
Semi-supervised Laplacian regularized least squares algorithm for localization in wireless sensor networks
J Chen, C Wang, Y Sun, X Shen
Computer Networks 55 (10), 2481-2491, 2011
502011
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
A Liu, P Ning, H Dai, Y Liu, C Wang
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
502010
The system can't perform the operation now. Try again later.
Articles 1–20