- W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1796 downloads.
- W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1682 downloads.
- W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2967 downloads, 4 citations.
- W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1982 downloads, 7 citations.
- W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2174 downloads, 1 citation.
- S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1780 downloads.
- S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2616 downloads, 1 citation.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3281 downloads, 16 citations.
- A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4068 downloads, 10 citations.
- A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4071 downloads, 5 citations.
- A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7349 downloads, 96 citations.
- O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 6792 downloads, 42 citations.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Towards Distributed Service Discovery in Pervasive Computing Environments", TechReport, Submitted to IEEE TMC Technical Report TR-CS-03-26, June 2003, 3530 downloads.
- A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks
June 14, 2011
- A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems
March 8, 2011
- SMART: A SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks
May 18, 2010
- Security Through Policy and Trust in Mobile Ad Hoc Networks
November 3, 2009
- Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
May 6, 2009
- Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks
October 23, 2008
- Trust-based Data Management in Mobile Ad Hoc Networks
July 8, 2008
- Gossip-based Outlier Detection for Mobile Ad Hoc Networks
May 6, 2008
- Research Topics in MANETs
October 17, 2006
- Cross-layer Analysis for Detecting Wireless Misbehavior
October 19, 2005