Tags: routing

Refereed Publications

2012

  1. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.

2011

  1. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1353 downloads, 1 citation.

2010

  1. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1425 downloads, 1 citation.
  2. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1692 downloads.
  3. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 1740 downloads.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1798 downloads, 1 citation.
  2. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1279 downloads.
  3. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 1863 downloads.

2007

  1. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 2777 downloads, 16 citations.

2006

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3371 downloads, 5 citations.
  2. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2006, 26 citations.

2005

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 2962 downloads, 11 citations.
  2. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 6817 downloads, 96 citations.

2004

  1. D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 3847 downloads, 8 citations.
  2. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 1812 downloads.
  3. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4443 downloads, 15 citations.
  4. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3301 downloads, 9 citations.

2003

  1. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 2893 downloads, 30 citations.
  2. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2213 downloads, 11 citations.

2002

  1. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 2811 downloads, 1 citation.

Non-Refereed Publications

2007

  1. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 1981 downloads.

2001

  1. F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4370 downloads.