Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Thomas M. Chen
@article{DBLP:journals/access/GhanemCFK23, author = {Mohamed Chahine Ghanem and Thomas M. Chen and Mohamed Amine Ferrag and Mohyi E. Kettouche}, title = {{ESASCF:} Expertise Extraction, Generalization and Reply Framework for Optimized Automation of Network Security Compliance}, journal = {{IEEE} Access}, volume = {11}, pages = {129840--129853}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3332834}, doi = {10.1109/ACCESS.2023.3332834}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/GhanemCFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/GhanemCN23, author = {Mohamed Chahine Ghanem and Thomas M. Chen and Erivelton G. Nepomuceno}, title = {Hierarchical reinforcement learning for efficient and effective automated penetration testing of large networks}, journal = {J. Intell. Inf. Syst.}, volume = {60}, number = {2}, pages = {281--303}, year = {2023}, url = {https://doi.org/10.1007/s10844-022-00738-0}, doi = {10.1007/S10844-022-00738-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/GhanemCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/RajaBVCS23, author = {S. Pravinth Raja and Shaleen Bhatnagar and Ruchi Vyas and Thomas M. Chen and Mithileysh Sathiyanarayanan}, editor = {Vikrant Bhateja and Xin{-}She Yang and Marta Campos Ferreira and Sandeep Singh Sengar and Carlos M. Travieso{-}Gonz{\'{a}}lez}, title = {Malicious Bot Detection in Large Scale IoT Network Using Unsupervised Machine Learning Technique}, booktitle = {Evolution in Computational Intelligence - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {370}, pages = {605--614}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6702-5\_49}, doi = {10.1007/978-981-99-6702-5\_49}, timestamp = {Tue, 28 Nov 2023 13:56:20 +0100}, biburl = {https://dblp.org/rec/conf/ficta/RajaBVCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-10967, author = {Mohamed Chahine Ghanem and Thomas M. Chen and Mohamed Amine Ferrag and Mohyi E. Kettouche}, title = {{ESASCF:} Expertise Extraction, Generalization and Reply Framework for an Optimized Automation of Network Security Compliance}, journal = {CoRR}, volume = {abs/2307.10967}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.10967}, doi = {10.48550/ARXIV.2307.10967}, eprinttype = {arXiv}, eprint = {2307.10967}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-10967.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HwaidiC22, author = {Jamal F. Hwaidi and Thomas M. Chen}, title = {Classification of Motor Imagery {EEG} Signals Based on Deep Autoencoder and Convolutional Neural Network Approach}, journal = {{IEEE} Access}, volume = {10}, pages = {48071--48081}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3171906}, doi = {10.1109/ACCESS.2022.3171906}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HwaidiC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mdpinetwork/GongCX22, author = {Pu Gong and Thomas M. Chen and Peng Xu}, title = {Resource-Conserving Protection against Energy Draining {(RCPED)} Routing Protocol for Wireless Sensor Networks}, journal = {Network}, volume = {2}, number = {1}, pages = {83--105}, year = {2022}, url = {https://doi.org/10.3390/network2010007}, doi = {10.3390/NETWORK2010007}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mdpinetwork/GongCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-16914, author = {Riad Ibadulla and Thomas M. Chen and Constantino Carlos Reyes{-}Aldasoro}, title = {FatNet: High Resolution Kernels for Classification Using Fully Convolutional Optical Neural Networks}, journal = {CoRR}, volume = {abs/2210.16914}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.16914}, doi = {10.48550/ARXIV.2210.16914}, eprinttype = {arXiv}, eprint = {2210.16914}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-16914.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocon/HwaidiC21, author = {Jamal F. Hwaidi and Thomas M. Chen}, title = {A Novel {KOSFS} Feature Selection Algorithm for {EEG} Signals}, booktitle = {19th {IEEE} International Conference on Smart Technologies, {EUROCON} 2021, Lviv, Ukraine, July 6 - 8, 2021}, pages = {265--268}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EUROCON52738.2021.9535598}, doi = {10.1109/EUROCON52738.2021.9535598}, timestamp = {Fri, 28 Oct 2022 20:55:35 +0200}, biburl = {https://dblp.org/rec/conf/eurocon/HwaidiC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccae/HwaidiC21, author = {Jamal F. Hwaidi and Thomas M. Chen}, title = {A Noise Removal Approach from {EEG} Recordings Based on Variational Autoencoders}, booktitle = {13th International Conference on Computer and Automation Engineering, {ICCAE} 2021, Melbourne, Australia, March 20-22, 2021}, pages = {19--23}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCAE51876.2021.9426150}, doi = {10.1109/ICCAE51876.2021.9426150}, timestamp = {Mon, 17 May 2021 14:57:00 +0200}, biburl = {https://dblp.org/rec/conf/iccae/HwaidiC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/RaheemRCA21, author = {Ali Hussein Raheem and Rand Raheem and Thomas M. Chen and Ahmed Alkhayyat}, title = {Estimation of Ransomware Payments in Bitcoin Ecosystem}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {1667--1674}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00224}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00224}, timestamp = {Thu, 06 Jan 2022 09:48:16 +0100}, biburl = {https://dblp.org/rec/conf/ispa/RaheemRCA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/GhanemC20, author = {Mohamed Chahine Ghanem and Thomas M. Chen}, title = {Reinforcement Learning for Efficient Network Penetration Testing}, journal = {Inf.}, volume = {11}, number = {1}, pages = {6}, year = {2020}, url = {https://doi.org/10.3390/info11010006}, doi = {10.3390/INFO11010006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/GhanemC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/LiMC19, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Maryam Mehrnezhad and Thyla van der Merwe and Feng Hao}, title = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019}, pages = {35--44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338500.3360331}, doi = {10.1145/3338500.3360331}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/LiMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/BlascoCPW19, author = {Jorge Blasco and Thomas M. Chen and Harsh Kupwade Patil and Daniel Wolff}, editor = {Habib M. Ammari}, title = {Wearables Security and Privacy}, booktitle = {Mission-Oriented Sensor Networks and Systems: Art and Science - Volume 2: Advances}, volume = {164}, pages = {351--380}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-319-92384-0\_11}, doi = {10.1007/978-3-319-92384-0\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/BlascoCPW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/ChenBP19, author = {Thomas M. Chen and Jorge Blasco and Harsh Kupwade Patil}, editor = {Habib M. Ammari}, title = {Cryptography in WSNs}, booktitle = {Mission-Oriented Sensor Networks and Systems: Art and Science - Volume 1: Foundations}, volume = {163}, pages = {783--820}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-319-91146-5\_21}, doi = {10.1007/978-3-319-91146-5\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/ChenBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-08960, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, title = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect}, journal = {CoRR}, volume = {abs/1901.08960}, year = {2019}, url = {http://arxiv.org/abs/1901.08960}, eprinttype = {arXiv}, eprint = {1901.08960}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-08960.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/Martinez-Sandoval18, author = {Ruben Martinez{-}Sandoval and Antonio{-}Javier Garc{\'{\i}}a{-}S{\'{a}}nchez and Joan Garc{\'{\i}}a{-}Haro and Thomas M. Chen}, title = {Optimal Policy Derivation for Transmission Duty-Cycle Constrained {LPWAN}}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {4}, pages = {3114--3125}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2018.2833289}, doi = {10.1109/JIOT.2018.2833289}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/Martinez-Sandoval18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/BlascoCMR18, author = {Jorge Blasco and Thomas M. Chen and Igor Muttik and Markus Roggenbach}, title = {Detection of app collusion potential using logic programming}, journal = {J. Netw. Comput. Appl.}, volume = {105}, pages = {88--104}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2017.12.008}, doi = {10.1016/J.JNCA.2017.12.008}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/BlascoCMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/BlascoC18, author = {Jorge Blasco and Thomas M. Chen}, title = {Automated generation of colluding apps for experimental research}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {14}, number = {2}, pages = {127--138}, year = {2018}, url = {https://doi.org/10.1007/s11416-017-0296-4}, doi = {10.1007/S11416-017-0296-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/BlascoC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LiMC18, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Kieran McLaughlin and Ali A. Ghorbani and Sakir Sezer and Rongxing Lu and Liqun Chen and Robert H. Deng and Paul Miller and Stephen Marsh and Jason R. C. Nurse}, title = {Mitigating {CSRF} attacks on OAuth 2.0 Systems}, booktitle = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/PST.2018.8514180}, doi = {10.1109/PST.2018.8514180}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/LiMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/LiMC18, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {24--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_3}, doi = {10.1007/978-3-030-03251-7\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/LiMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-07983, author = {Wanpeng Li and Chris J. Mitchell and Thomas M. Chen}, title = {Mitigating {CSRF} attacks on OAuth 2.0 and OpenID Connect}, journal = {CoRR}, volume = {abs/1801.07983}, year = {2018}, url = {http://arxiv.org/abs/1801.07983}, eprinttype = {arXiv}, eprint = {1801.07983}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-07983.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IdreesRCCR17, author = {Fauzia Idrees and Muttukrishnan Rajarajan and Mauro Conti and Thomas M. Chen and Yogachandran Rahulamathavan}, title = {PIndroid: {A} novel Android malware detection system using ensemble learning methods}, journal = {Comput. Secur.}, volume = {68}, pages = {36--46}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.03.011}, doi = {10.1016/J.COSE.2017.03.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IdreesRCCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnss/AbroRCR17, author = {Fauzia Idrees Abro and Muttukrishnan Rajarajan and Thomas M. Chen and Yogachandran Rahulamathavan}, editor = {Robin Doss and Selwyn Piramuthu and Wei Zhou}, title = {Android Application Collusion Demystified}, booktitle = {Future Network Systems and Security - Third International Conference, {FNSS} 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings}, series = {Communications in Computer and Information Science}, volume = {759}, pages = {176--187}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65548-2\_14}, doi = {10.1007/978-3-319-65548-2\_14}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnss/AbroRCR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlascoCMR17, author = {Jorge Blasco and Thomas M. Chen and Igor Muttik and Markus Roggenbach}, title = {Detection of App Collusion Potential Using Logic Programming}, journal = {CoRR}, volume = {abs/1706.02387}, year = {2017}, url = {http://arxiv.org/abs/1706.02387}, eprinttype = {arXiv}, eprint = {1706.02387}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlascoCMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/BlascoCTP16, author = {Jorge Blasco and Thomas M. Chen and Juan E. Tapiador and Pedro Peris{-}Lopez}, title = {A Survey of Wearable Biometric Recognition Systems}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {3}, pages = {43:1--43:35}, year = {2016}, url = {https://doi.org/10.1145/2968215}, doi = {10.1145/2968215}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/BlascoCTP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcysa/QadriCB16, author = {Jameel Qadri and Thomas M. Chen and Jorge Blasco}, title = {A Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices}, journal = {Int. J. Cyber Situational Aware.}, volume = {1}, number = {1}, pages = {210--230}, year = {2016}, url = {https://doi.org/10.22619/ijcsa.2016.1001010}, doi = {10.22619/IJCSA.2016.1001010}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcysa/QadriCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/AlzubiCARA16, author = {Omar A. Alzubi and Thomas M. Chen and Jafar Ahmad Abed Alzubi and Hasan Rashaideh and Nijad Al{-}Najdawi}, title = {Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves}, journal = {J. Univers. Comput. Sci.}, volume = {22}, number = {4}, pages = {552--566}, year = {2016}, url = {http://www.jucs.org/jucs\_22\_4/secure\_channel\_coding\_schemes}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/AlzubiCARA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/AsavoaeBCKMNRS16, author = {Irina Mariuca Asavoae and Jorge Blasco and Thomas M. Chen and Harsha Kumara Kalutarage and Igor Muttik and Hoang Nga Nguyen and Markus Roggenbach and Siraj Ahmed Shaikh}, editor = {David Aspinall and Lorenzo Cavallaro and Mohamed Nassim Seghir and Melanie Volkamer}, title = {Towards Automated Android App Collusion Detection}, booktitle = {Proceedings of the 1st International Workshop on Innovations in Mobile Privacy and Security, {IMPS} 2016, co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2016), London, UK, April 6, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1575}, pages = {29--37}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1575/paper\_3.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:23 +0100}, biburl = {https://dblp.org/rec/conf/essos/AsavoaeBCKMNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AsavoaeBCKMNRS16, author = {Irina Mariuca Asavoae and Jorge Blasco and Thomas M. Chen and Harsha Kumara Kalutarage and Igor Muttik and Hoang Nga Nguyen and Markus Roggenbach and Siraj Ahmed Shaikh}, title = {Towards Automated Android App Collusion Detection}, journal = {CoRR}, volume = {abs/1603.02308}, year = {2016}, url = {http://arxiv.org/abs/1603.02308}, eprinttype = {arXiv}, eprint = {1603.02308}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AsavoaeBCKMNRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/GongCX15, author = {Pu Gong and Thomas M. Chen and Quan Xu}, title = {{ETARP:} An Energy Efficient Trust-Aware Routing Protocol for Wireless Sensor Networks}, journal = {J. Sensors}, volume = {2015}, pages = {469793:1--469793:10}, year = {2015}, url = {https://doi.org/10.1155/2015/469793}, doi = {10.1155/2015/469793}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/js/GongCX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/XuCHG14, author = {Quan Xu and Thomas M. Chen and Yupeng Hu and Pu Gong}, title = {Write Pattern Format Algorithm for Reliable NAND-Based SSDs}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {61-II}, number = {7}, pages = {516--520}, year = {2014}, url = {https://doi.org/10.1109/TCSII.2014.2327332}, doi = {10.1109/TCSII.2014.2327332}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcas/XuCHG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LiOTCX14, author = {Shancang Li and George C. Oikonomou and Theo Tryfonas and Thomas M. Chen and Li Da Xu}, title = {A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {10}, number = {2}, pages = {1461--1468}, year = {2014}, url = {https://doi.org/10.1109/TII.2014.2306331}, doi = {10.1109/TII.2014.2306331}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/LiOTCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csndsp/XuGC14, author = {Quan Xu and Pu Gong and Thomas M. Chen}, title = {Concatenated {LDPC-TCM} coding for reliable storage in multi-level flash memories}, booktitle = {9th International Symposium on Communication Systems, Networks {\&} Digital Signal Processing, {CSNDSP} 2014, Manchester, UK, July 23-25, 2014}, pages = {166--170}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CSNDSP.2014.6923818}, doi = {10.1109/CSNDSP.2014.6923818}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csndsp/XuGC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csndsp/GongXC14, author = {Pu Gong and Quan Xu and Thomas M. Chen}, title = {Energy Harvesting Aware routing protocol for wireless sensor networks}, booktitle = {9th International Symposium on Communication Systems, Networks {\&} Digital Signal Processing, {CSNDSP} 2014, Manchester, UK, July 23-25, 2014}, pages = {171--176}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CSNDSP.2014.6923819}, doi = {10.1109/CSNDSP.2014.6923819}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csndsp/GongXC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/GuanHTC13, author = {Wenyang Guan and Jianhua He and Zuoyin Tang and Thomas M. Chen}, title = {Design and Evaluation of a Framework for Cooperative and Adaptive QoS Control of {DSRC} Network for Road Safety Applications}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/946931}, doi = {10.1155/2013/946931}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/GuanHTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OlteanuXLCC13, author = {Alina Olteanu and Yang Xiao and Jing Liu and Thomas M. Chen and C. L. Philip Chen}, title = {Nonintrusive tracing in the Internet}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {833--843}, year = {2013}, url = {https://doi.org/10.1002/sec.616}, doi = {10.1002/SEC.616}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/OlteanuXLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenS12, author = {Thomas M. Chen and Xuemin Shen}, title = {Editor's note}, journal = {{IEEE} Netw.}, volume = {26}, number = {1}, pages = {2}, year = {2012}, url = {https://doi.org/10.1109/MNET.2012.6135848}, doi = {10.1109/MNET.2012.6135848}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/ChenS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenA11, author = {Thomas M. Chen and Saeed Abu{-}Nimeh}, title = {Lessons from Stuxnet}, journal = {Computer}, volume = {44}, number = {4}, pages = {91--93}, year = {2011}, url = {https://doi.org/10.1109/MC.2011.115}, doi = {10.1109/MC.2011.115}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ChenA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Abu-NimehCA11, author = {Saeed Abu{-}Nimeh and Thomas M. Chen and Omar A. Alzubi}, title = {Malicious and Spam Posts in Online Social Networks}, journal = {Computer}, volume = {44}, number = {9}, pages = {23--28}, year = {2011}, url = {https://doi.org/10.1109/MC.2011.222}, doi = {10.1109/MC.2011.222}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/Abu-NimehCA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Chen11c, author = {Thomas M. Chen}, title = {How networks changed the world}, journal = {{IEEE} Netw.}, volume = {25}, number = {6}, pages = {2--3}, year = {2011}, url = {https://doi.org/10.1109/MNET.2011.6085635}, doi = {10.1109/MNET.2011.6085635}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/Chen11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ChenSB11, author = {Thomas M. Chen and Juan Carlos S{\'{a}}nchez{-}Aarnoutse and John F. Buford}, title = {Petri Net Modeling of Cyber-Physical Attacks on Smart Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {2}, number = {4}, pages = {741--749}, year = {2011}, url = {https://doi.org/10.1109/TSG.2011.2160000}, doi = {10.1109/TSG.2011.2160000}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/ChenSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/HeTOC11, author = {Jianhua He and Zuoyin Tang and Timothy O'Farrell and Thomas M. Chen}, title = {Performance analysis of {DSRC} priority mechanism for road safety applications in vehicular networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {11}, number = {7}, pages = {980--990}, year = {2011}, url = {https://doi.org/10.1002/wcm.821}, doi = {10.1002/WCM.821}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/HeTOC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenW10, author = {Thomas M. Chen and Victoria Wang}, title = {Web Filtering and Censoring}, journal = {Computer}, volume = {43}, number = {3}, pages = {94--97}, year = {2010}, url = {https://doi.org/10.1109/MC.2010.84}, doi = {10.1109/MC.2010.84}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computer/ChenW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/HeCCC10, author = {Jianhua He and Hsiao{-}Hwa Chen and Thomas M. Chen and Wenqing Cheng}, title = {Adaptive congestion control for {DSRC} vehicle networks}, journal = {{IEEE} Commun. Lett.}, volume = {14}, number = {2}, pages = {127--129}, year = {2010}, url = {https://doi.org/10.1109/LCOMM.2010.02.092002}, doi = {10.1109/LCOMM.2010.02.092002}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/icl/HeCCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Abu-NimehC10, author = {Saeed Abu{-}Nimeh and Thomas M. Chen}, title = {Proliferation and Detection of Blog Spam}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {5}, pages = {42--47}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.113}, doi = {10.1109/MSP.2010.113}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Abu-NimehC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qshine/OlteanuXLC10, author = {Alina Olteanu and Yang Xiao and Jing Liu and Thomas M. Chen}, editor = {Xi Zhang and Daji Qiao}, title = {Studying Non-intrusive Tracing in the Internet}, booktitle = {Quality, Reliability, Security and Robustness in Heterogeneous Networks - 7th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2010, and Dedicated Short Range Communications Workshop, {DSRC} 2010, Houston, TX, USA, November 17-19, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {74}, pages = {58--74}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-29222-4\_5}, doi = {10.1007/978-3-642-29222-4\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/qshine/OlteanuXLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/forensics/Chen10, author = {Thomas M. Chen}, editor = {Chang{-}Tsun Li}, title = {Identity Theft through the Web}, booktitle = {Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions}, pages = {379--395}, publisher = {{IGI} Global}, year = {2010}, url = {https://doi.org/10.4018/978-1-60566-836-9.ch016}, doi = {10.4018/978-1-60566-836-9.CH016}, timestamp = {Tue, 16 May 2017 14:01:55 +0200}, biburl = {https://dblp.org/rec/reference/forensics/Chen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZengC09, author = {Yi Zeng and Thomas M. Chen}, title = {Classification of Traffic Flows into QoS Classes by Unsupervised Learning and {KNN} Clustering}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {3}, number = {2}, pages = {134--146}, year = {2009}, url = {https://doi.org/10.3837/tiis.2009.02.001}, doi = {10.3837/TIIS.2009.02.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ZengC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenFHS09, author = {Thomas M. Chen and Zhi Fu and Liwen He and Tim Strayer}, title = {Recent developments in network intrusion detection [guest editorial]}, journal = {{IEEE} Netw.}, volume = {23}, number = {1}, pages = {4--5}, year = {2009}, url = {https://doi.org/10.1109/MNET.2009.4804317}, doi = {10.1109/MNET.2009.4804317}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenFHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JamilC09, author = {Nasir Jamil and Thomas M. Chen}, title = {A Mathematical View of Network-Based Suppressions of Worm Epidemics}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5198629}, doi = {10.1109/ICC.2009.5198629}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/JamilC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/ChenB09, author = {Thomas M. Chen and John F. Buford}, title = {Design considerations for a honeypot for {SQL} injection Attacks}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {915--921}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355040}, doi = {10.1109/LCN.2009.5355040}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/ChenB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/tf/ChenN08, author = {Thomas M. Chen and Nhut Nguyen}, title = {Authentication and Privacy}, booktitle = {Encyclopedia of Wireless and Mobile Communications}, year = {2008}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043167}, doi = {10.1081/E-EWMC-120043167}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/tf/ChenN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/JamilC07, author = {Nasir Jamil and Thomas M. Chen}, title = {A Web-Based Network Worm Simulator}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1461--1465}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.245}, doi = {10.1109/ICC.2007.245}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/JamilC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/JamilC06, author = {Nasir Jamil and Thomas M. Chen}, title = {Effectiveness of Rate Control in Slowing Down Worm Epidemics}, booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM} '06, San Francisco, CA, USA, 27 November - 1 December 2006}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/GLOCOM.2006.306}, doi = {10.1109/GLOCOM.2006.306}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/JamilC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KoC06, author = {Jungwon Ko and Thomas M. Chen}, title = {A Decision Theoretic Approach to Measurement-based Admission Control}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {742--747}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.254796}, doi = {10.1109/ICC.2006.254796}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KoC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChenJ06, author = {Thomas M. Chen and Nasir Jamil}, title = {Effectiveness of Quarantine in Worm Epidemics}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2006, Istanbul, Turkey, 11-15 June 2006}, pages = {2142--2147}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICC.2006.255087}, doi = {10.1109/ICC.2006.255087}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChenJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/new2an/RezaulPGC06, author = {Karim Mohammed Rezaul and Algirdas Pakstas and R. Gilchrist and Thomas M. Chen}, editor = {Yevgeni Koucheryavy and Jarmo Harju and Villy B{\ae}k Iversen}, title = {{HEAF:} {A} Novel Estimator for Long-Range Dependent Self-similar Network Traffic}, booktitle = {Next Generation Teletraffic and Wired/Wireless Advanced Networking, 6th International Conference, {NEW2AN} 2006, St. Petersburg, Russia, May 29 - June 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4003}, pages = {34--45}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11759355\_6}, doi = {10.1007/11759355\_6}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/new2an/RezaulPGC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/ChenV05, author = {Thomas M. Chen and Varadharajan Venkataramanan}, title = {Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks}, journal = {{IEEE} Internet Comput.}, volume = {9}, number = {6}, pages = {35--41}, year = {2005}, url = {https://doi.org/10.1109/MIC.2005.123}, doi = {10.1109/MIC.2005.123}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/ChenV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChenR04, author = {Thomas M. Chen and Jean{-}Marc Robert}, title = {Worm Epidemics in High-Speed Networks}, journal = {Computer}, volume = {37}, number = {6}, pages = {48--53}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.36}, doi = {10.1109/MC.2004.36}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChenR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ZengC04, author = {Yi Zeng and Thomas M. Chen}, title = {Measurement-based real-time traffic model classification}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2004, Paris, France, 20-24 June 2004}, pages = {1857--1861}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICC.2004.1312842}, doi = {10.1109/ICC.2004.1312842}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/ZengC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/EladlyC04, author = {Hanem A. ElAdly and Thomas M. Chen}, title = {An overlay algorithm to improve the support of multi-hopping in the {IEEE} 802.11 WLANs}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2004, Paris, France, 20-24 June 2004}, pages = {3817--3821}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICC.2004.1313267}, doi = {10.1109/ICC.2004.1313267}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/EladlyC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/EladlyC04, author = {Hanem A. ElAdly and Thomas M. Chen}, title = {Enhancing the support of multihopping in an {IEEE} 802.11 ad-hoc network}, booktitle = {Proceedings of the 9th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), June 28 - July 1, 2004, Alexandria, Egypt}, pages = {158--163}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ISCC.2004.1358398}, doi = {10.1109/ISCC.2004.1358398}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/EladlyC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/SadekKC03, author = {Nayera M. Sadek and Alireza Khotanzad and Thomas M. Chen}, editor = {Ronald P. Luijten and Luiz A. DaSilva and E. K. Park}, title = {{ATM} dynamic bandwidth allocation using {F-ARIMA} prediction model}, booktitle = {Proceedings of the 12th International Conference on Computer Communications and Networks, {ICCCN} 2003, 20-22 October, 2003, Double Tree Lincoln Centre, Dallas, Texas, {USA}}, pages = {359--363}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICCCN.2003.1284194}, doi = {10.1109/ICCCN.2003.1284194}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccn/SadekKC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Chen02, author = {Thomas M. Chen}, title = {Perspectives - internet computing as a utility}, journal = {{IEEE} Commun. Mag.}, volume = {40}, number = {5}, pages = {10}, year = {2002}, url = {https://doi.org/10.1109/MCOM.2002.1000206}, doi = {10.1109/MCOM.2002.1000206}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cm/Chen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/YamanakaCS02, author = {Naoaki Yamanaka and Thomas M. Chen and Heinrich J. St{\"{u}}ttgen}, title = {Guest editorial - trends in high-performance switching and routing technologies}, journal = {{IEEE} Commun. Mag.}, volume = {40}, number = {11}, pages = {36--37}, year = {2002}, url = {https://doi.org/10.1109/MCOM.2002.1046990}, doi = {10.1109/MCOM.2002.1046990}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/YamanakaCS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChenL02, author = {Thomas M. Chen and Steve S. Liu}, title = {A model and evaluation of distributed network management approaches}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {20}, number = {4}, pages = {850--857}, year = {2002}, url = {https://doi.org/10.1109/JSAC.2002.1003049}, doi = {10.1109/JSAC.2002.1003049}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/ChenL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/ChenH02, author = {Thomas M. Chen and Lucia Hu}, title = {Internet performance monitoring}, journal = {Proc. {IEEE}}, volume = {90}, number = {9}, pages = {1592--1603}, year = {2002}, url = {https://doi.org/10.1109/JPROC.2002.802006}, doi = {10.1109/JPROC.2002.802006}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/ChenH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Chen01, author = {Thomas M. Chen}, title = {Increasing the observability of Internet behavior}, journal = {Commun. {ACM}}, volume = {44}, number = {1}, pages = {93--98}, year = {2001}, url = {https://doi.org/10.1145/357489.357514}, doi = {10.1145/357489.357514}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Chen01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ZhuCL01, author = {Yuhang Zhu and Thomas M. Chen and Steve S. Liu}, editor = {George Pavlou and Nikos Anerousis and Antonio Liotta}, title = {Models and Analysis of Trade-offs in Distributed Network Management Approaches}, booktitle = {2001 {IEEE/IFIP} International Symposium on Integrated Network Management, {IM} 2001, Seattle, USA, May 14-18, 2001. Proceedings}, pages = {391--404}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/INM.2001.918055}, doi = {10.1109/INM.2001.918055}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/ZhuCL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Chen00, author = {Thomas M. Chen}, title = {Evolution to the programmable Internet}, journal = {{IEEE} Commun. Mag.}, volume = {38}, number = {3}, pages = {124--128}, year = {2000}, url = {https://doi.org/10.1109/35.867845}, doi = {10.1109/35.867845}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Chen00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Chen00a, author = {Thomas M. Chen}, title = {Network traffic measurements and experiments [Guest Editorial]}, journal = {{IEEE} Commun. Mag.}, volume = {38}, number = {5}, pages = {120}, year = {2000}, url = {https://doi.org/10.1109/MCOM.2000.841835}, doi = {10.1109/MCOM.2000.841835}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Chen00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChenGY00, author = {Thomas M. Chen and Roch H. Glitho and Makoto Yoshida}, title = {Guest editorial recent advances in network management and operations}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {18}, number = {5}, pages = {641--643}, year = {2000}, url = {https://doi.org/10.1109/JSAC.2000.842980}, doi = {10.1109/JSAC.2000.842980}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/ChenGY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/OhCK00, author = {Tae H. Oh and Thomas M. Chen and Jeffery L. Kennington}, title = {Fault restoration and spare capacity allocation with QoS constraints for {MPLS} networks}, booktitle = {Proceedings of the Global Telecommunications Conference, 2000. {GLOBECOM} 2000, San Francisco, CA, USA, 27 November - 1 December 2000}, pages = {1731--1735}, publisher = {{IEEE}}, year = {2000}, url = {https://doi.org/10.1109/GLOCOM.2000.891932}, doi = {10.1109/GLOCOM.2000.891932}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/OhCK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/StavrakakisC98, author = {Ioannis Stavrakakis and Thomas M. Chen}, title = {Editorial - Wireless LANs}, journal = {Mob. Networks Appl.}, volume = {3}, number = {3}, pages = {235--236}, year = {1998}, url = {https://doi.org/10.1023/A:1019128900071}, doi = {10.1023/A:1019128900071}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/StavrakakisC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenLPWC98, author = {Thomas M. Chen and Steve S. Liu and Michael J. Procanik and David C. Wang and D. Dean Casey}, title = {{INQIRE:} a software approach to monitoring QoS in {ATM} networks}, journal = {{IEEE} Netw.}, volume = {12}, number = {2}, pages = {32--37}, year = {1998}, url = {https://doi.org/10.1109/65.681927}, doi = {10.1109/65.681927}, timestamp = {Mon, 03 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenLPWC98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/Chen97, author = {Tom Chen}, title = {Network And Internet Security (Guest Editorial)}, journal = {{IEEE} Netw.}, volume = {11}, number = {3}, pages = {11}, year = {1997}, url = {https://doi.org/10.1109/MNET.1997.587043}, doi = {10.1109/MNET.1997.587043}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/Chen97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChenLS96, author = {Thomas M. Chen and Steve S. Liu and Vijay K. Samalam}, title = {The available bit rate service for data in {ATM} networks}, journal = {{IEEE} Commun. Mag.}, volume = {34}, number = {5}, pages = {56--58}, year = {1996}, url = {https://doi.org/10.1109/35.492973}, doi = {10.1109/35.492973}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ChenLS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenLWSPK96, author = {Thomas M. Chen and Steven S. Liu and David Wang and Vijay K. Samalam and Michael J. Procanik and Dinyar Kavouspour}, title = {Monitoring and control of {ATM} networks using special cells}, journal = {{IEEE} Netw.}, volume = {10}, number = {5}, pages = {28--38}, year = {1996}, url = {https://doi.org/10.1109/65.539858}, doi = {10.1109/65.539858}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenLWSPK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0017950, author = {Thomas M. Chen and Steve S. Liu}, title = {{ATM} switching systems}, publisher = {Artech House}, year = {1995}, isbn = {978-0-89006-682-9}, timestamp = {Fri, 08 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0017950.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamam/ChenS95, author = {Thomas M. Chen and Vijay K. Samalam}, title = {Time-Dependent Behavior of Fluid Buffer Models with Markov Input and Constant Output Rates}, journal = {{SIAM} J. Appl. Math.}, volume = {55}, number = {3}, pages = {784--799}, year = {1995}, url = {https://doi.org/10.1137/S0036139992240103}, doi = {10.1137/S0036139992240103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamam/ChenS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenL94, author = {Thomas M. Chen and Steven S. Liu}, title = {Management and control functions in {ATM} switching systems}, journal = {{IEEE} Netw.}, volume = {8}, number = {4}, pages = {27--40}, year = {1994}, url = {https://doi.org/10.1109/65.298161}, doi = {10.1109/65.298161}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenL94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ChenWM94, author = {Thomas M. Chen and Jean C. Walrand and David G. Messerschmitt}, title = {Parameter estimation for partially observed queues}, journal = {{IEEE} Trans. Commun.}, volume = {42}, number = {9}, pages = {2730--2739}, year = {1994}, url = {https://doi.org/10.1109/26.317414}, doi = {10.1109/26.317414}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/ChenWM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/ChenWM89, author = {Thomas M. Chen and Jean C. Walrand and David G. Messerschmitt}, title = {Dynamic priority protocols for packet voice}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {7}, number = {5}, pages = {632--643}, year = {1989}, url = {https://doi.org/10.1109/49.32327}, doi = {10.1109/49.32327}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsac/ChenWM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChenM88, author = {Thomas M. Chen and David G. Messerschmitt}, title = {Integrated voice/data switching}, journal = {{IEEE} Commun. Mag.}, volume = {26}, number = {6}, pages = {16--26}, year = {1988}, url = {https://doi.org/10.1109/35.457}, doi = {10.1109/35.457}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ChenM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.