Using Supplemental Encrypted Signals to Mitigate Man-in-the-Middle Attacks on Teleoperated Systems HJ Chizeck, T Bonaci US Patent App. PCT/US2013/067,528, 2013 | 248* | 2013 |
To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robots T Bonaci, J Herron, T Yusuf, J Yan, T Kohno, HJ Chizeck arXiv preprint arXiv:1504.04339, 2015 | 162 | 2015 |
App Stores for the Brain: Privacy and Security in Brain-Computer Interfaces T Bonaci, R Calo, HJ Chizeck IEEE Technology and Society Magazine 34 (2), 32-39, 2015 | 117 | 2015 |
App Stores for the Brain:Privacy and Security in Brain-Computer Interfaces T Bonaci, R Calo, HJ Chizeck IEEE International Symposium on Ethics in Engineering, Science and Technology, 2014 | 117 | 2014 |
Node capture attacks in wireless sensor networks: A system theoretic approach T Bonaci, L Bushnell, R Poovendran Decision and Control (CDC), 2010 49th IEEE Conference on, 6765-6772, 2010 | 109 | 2010 |
Experimental Analysis of Denial-of-Service Attacks on Teleoperated Robotic Systems T Bonaci, J Yan, J Herron, T Kohno, HJ Chizeck In Proceedings of the ACM/IEEE 6th International Conference on Cyber …, 2015 | 66 | 2015 |
Brain-Computer Interface Anonymizer HJ Chizeck, T Bonaci US Patent App. 14/174,818, 2014 | 63 | 2014 |
Securing the Exocortex: A Twenty-First Century Cybernetics Challenge T Bonaci, J Herron, C Matlack, HJ Chizeck Technology and Society Magazine, IEEE 34 (3), 44-51, 2015 | 45 | 2015 |
Securing the Exocortex: A Twenty-first Century Cybernetics Challenge T Bonaci, J Herron, C Matlack, HJ Chizeck IEEE 2014 Conference on Norbert Wiener in the 21st Century, 2014 | 45 | 2014 |
Enhanced security and safety in telerobotic systems HJ Chizeck, T Bonaci, T Lendvay US Patent 9,148,443, 2015 | 34 | 2015 |
Enhanced Security and Safety in Telerobotic Systems HJ Chizeck, T Bonaci, T Lendvay US Patent App. US 13/935,436, 2014 | 32 | 2014 |
Distributed Clone Detection in Wireless Sensor Networks: An Optimization Approach T Bonaci, P Lee, L Bushnell, R Poovendran | 29 | 2011 |
On Potential Security Threats Against Rescue Robotic Systems T Bonaci, HJ Chizeck IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR), 2012 | 19 | 2012 |
What You Do Not Expect When You Are Expecting: Privacy Analysis of Femtech J Erickson, JY Yuzon, T Bonaci IEEE Transactions on Technology and Society 3 (2), 121-131, 2022 | 17 | 2022 |
Security Analysis of an Automobile Controller Area Network Bus S Hartzell, C Stubel, T Bonaci IEEE Potentials 39 (3), 19-24, 2020 | 16 | 2020 |
Surgical Telerobotics Meets Information Security T Bonaci, HJ Chizeck | 13 | 2012 |
Cyber-security in robotics and autonomous systems V Matellán, T Bonaci, G Sabaliauskaite Robotics and Autonomous Systems 100, 41-42, 2018 | 12 | 2018 |
Probabilistic analysis of covering and compromise in a node capture attack T Bonaci, L Bushnell, R Poovendran Network Security Lab (NSL), Seattle, WA, Techical Report 1, 2010 | 12 | 2010 |
Haptic Passwords J Yan, K Huang, T Bonaci, HJ Chizeck 2015 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2015 | 10 | 2015 |
A convex optimization approach for clone detection in wireless sensor networks T Bonaci, P Lee, L Bushnell, R Poovendran Pervasive and Mobile Computing 9 (4), 528-545, 2013 | 10 | 2013 |