Providing robust and ubiquitous security support for mobile ad hoc networks J Kong, P Zerfos, H Luo, S Lu, L Zhang Proceeding of The 9th International Conference on Network Protocols, 2001 | 1308 | 2001 |
The challenges of building mobile underwater wireless networks for aquatic applications JH Cui, J Kong, M Gerla, S Zhou Ieee Network 20 (3), 12-18, 2006 | 1092 | 2006 |
ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks J Kong, X Hong Proceedings of the 4th ACM international symposium on Mobile ad hoc …, 2003 | 699 | 2003 |
Self-securing ad hoc wireless networks. H Luo, P Zerfos, J Kong, S Lu, L Zhang ISCC 2, 548-555, 2002 | 592 | 2002 |
URSA: ubiquitous and robust access control for mobile ad hoc networks H Luo, J Kong, P Zerfos, S Lu, L Zhang IEEE/ACM transactions on networking 12 (6), 1049-1063, 2004 | 435 | 2004 |
Adaptive security for multilevel ad hoc networks J Kong, H Luo, K Xu, DL Gu, M Gerla, S Lu Wireless Communications and Mobile Computing 2 (5), 533-547, 2002 | 267 | 2002 |
Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications J Kong, J Cui, D Wu, M Gerla MILCOM 2005-2005 IEEE Military Communications Conference, 1535-1541, 2005 | 258 | 2005 |
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks J Kong, X Hong, M Gerla IEEE transactions on mobile computing 6 (8), 888-902, 2007 | 160 | 2007 |
Analysis of aloha protocols for underwater acoustic sensor networks LFM Vieira, J Kong, U Lee, M Gerla Extended abstract from WUWNet 6, 2006 | 132 | 2006 |
Visualisation of wormholes in underwater sensor networks: a distributed approach W Wang, J Kong, B Bhargava, M Gerla International Journal of Security and Networks 3 (1), 10-23, 2008 | 98 | 2008 |
A mobile delay-tolerant approach to long-term energy-efficient underwater sensor networking E Magistretti, J Kong, U Lee, M Gerla, P Bellavista, A Corradi 2007 IEEE wireless communications and networking conference, 2866-2871, 2007 | 97 | 2007 |
A secure ad-hoc routing approach using localized self-healing communities J Kong, X Hong, Y Yi, JS Park, J Liu, M Gerla Proceedings of the 6th ACM international symposium on Mobile ad hoc …, 2005 | 95 | 2005 |
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks J Kong, Z Ji, W Wang, M Gerla, R Bagrodia, B Bhargava Proceedings of the 4th ACM workshop on Wireless security, 87-96, 2005 | 89 | 2005 |
A new set of passive routing attacks in mobile ad hoc networks J Kong, X Hong, M Gerla IEEE Military Communications Conference, 2003. MILCOM 2003. 2, 796-801, 2003 | 85 | 2003 |
Effective probabilistic approach protecting sensor traffic X Hong, P Wang, J Kong, Q Zheng MILCOM 2005-2005 IEEE Military Communications Conference, 169-175, 2005 | 71 | 2005 |
Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods U Lee, J Kong, M Gerla, JS Park, E Magistretti Ad Hoc Networks 5 (6), 943-958, 2007 | 66 | 2007 |
Proof-of-relevance: Filtering false data via authentic consensus in vehicle ad-hoc networks Z Cao, J Kong, U Lee, M Gerla, Z Chen IEEE INFOCOM Workshops 2008, 1-6, 2008 | 57 | 2008 |
Random flow network modeling and simulations for DDoS attack mitigation J Kong, M Mirza, J Shu, C Yoedhana, M Gerla, S Lu IEEE International Conference on Communications, 2003. ICC'03. 1, 487-491, 2003 | 46 | 2003 |
Mobility changes anonymity: mobile ad hoc networks need efficient anonymous routing J Kong, X Hong, MY Sanadidi, M Gerla 10th IEEE Symposium on Computers and Communications (ISCC'05), 57-62, 2005 | 44 | 2005 |
Anonymous and untraceable communications in mobile wireless networks J Kong University of California, Los Angeles, 2004 | 37 | 2004 |