Patrick Tague
TitleCited byYear
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1232014
Mitigation of control channel jamming under node capture attacks
P Tague, M Li, R Poovendran
IEEE TRANSACTIONS ON MOBILE COMPUTING, 8 (9), 2008
1122008
Linear programming models for jamming attacks on network traffic flows
P Tague, D Slater, R Poovendran, G Noubir
2008 6th International Symposium on Modeling and Optimization in Mobile, Ad …, 2008
662008
Network Self-Organization in the Internet of Things
AP Athreya, P Tague
IEEE International Workshop on Internet-of-Things Networking and Control …, 2013
652013
Probabilistic mitigation of control channel jamming via random key distribution
P Tague, M Li, R Poovendran
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
612007
Modeling adaptive node capture attacks in multi-hop wireless networks
P Tague, R Poovendran
Ad Hoc Networks 5 (6), 801-814, 2007
602007
Modeling node capture attacks in wireless sensor networks
P Tague, R Poovendran
2008 46th Annual Allerton Conference on Communication, Control, and …, 2008
592008
A coding-theoretic approach for efficient message verification over insecure channels
D Slater, P Tague, R Poovendran, BJ Matt
Proceedings of the second ACM conference on Wireless network security, 151-160, 2009
582009
A5: Automated analysis of adversarial android applications
T Vidas, J Tan, J Nahata, CL Tan, N Christin, P Tague
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
562014
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
P Tague, S Nabar, JA Ritcey, R Poovendran
IEEE/ACM Transactions on Networking (TON) 19 (1), 184-194, 2011
532011
Smartauth: User-centered authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th {USENIX} Security Symposium ({USENIX} Security 17), 361-378, 2017
502017
Is your commute driving you crazy?: a study of misbehavior in vehicular platoons
B DeBruhl, S Weerakkody, B Sinopoli, P Tague
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
432015
Digital filter design for jamming mitigation in 802.15. 4 communication
B DeBruhl, P Tague
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
382011
Evaluating the vulnerability of network traffic using joint security and routing analysis
P Tague, D Slater, J Rogers, R Poovendran
IEEE transactions on dependable and secure computing 6 (2), 111-123, 2008
342008
Recognizing new activities with limited training data
LT Nguyen, M Zeng, P Tague, J Zhang
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 67-74, 2015
332015
Understanding iot security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
312017
A canonical seed assignment model for key predistribution in wireless sensor networks
P Tague, R Poovendran
ACM Transactions on Sensor Networks (TOSN) 3 (4), 19, 2007
312007
Designing for self-configuration and self-adaptation in the internet of things
AP Athreya, B DeBruhl, P Tague
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
302013
Carving Secure Wi-Fi Zones with Defensive Jamming
YS Kim, P Tague, H Lee, H Kim
7th ACM Symposium on Information, Computer, and Communications Security …, 2012
292012
Vulnerability of network traffic under node capture attacks using circuit theoretic analysis
P Tague, D Slater, J Rogers, R Poovendran
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 161-165, 2008
282008
The system can't perform the operation now. Try again later.
Articles 1–20