BibTeX records: Thomas M. Chen

download as .bib file

@article{DBLP:journals/access/GhanemCFK23,
  author       = {Mohamed Chahine Ghanem and
                  Thomas M. Chen and
                  Mohamed Amine Ferrag and
                  Mohyi E. Kettouche},
  title        = {{ESASCF:} Expertise Extraction, Generalization and Reply Framework
                  for Optimized Automation of Network Security Compliance},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {129840--129853},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3332834},
  doi          = {10.1109/ACCESS.2023.3332834},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/GhanemCFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/GhanemCN23,
  author       = {Mohamed Chahine Ghanem and
                  Thomas M. Chen and
                  Erivelton G. Nepomuceno},
  title        = {Hierarchical reinforcement learning for efficient and effective automated
                  penetration testing of large networks},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {60},
  number       = {2},
  pages        = {281--303},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10844-022-00738-0},
  doi          = {10.1007/S10844-022-00738-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/GhanemCN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/RajaBVCS23,
  author       = {S. Pravinth Raja and
                  Shaleen Bhatnagar and
                  Ruchi Vyas and
                  Thomas M. Chen and
                  Mithileysh Sathiyanarayanan},
  editor       = {Vikrant Bhateja and
                  Xin{-}She Yang and
                  Marta Campos Ferreira and
                  Sandeep Singh Sengar and
                  Carlos M. Travieso{-}Gonz{\'{a}}lez},
  title        = {Malicious Bot Detection in Large Scale IoT Network Using Unsupervised
                  Machine Learning Technique},
  booktitle    = {Evolution in Computational Intelligence - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April, 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {370},
  pages        = {605--614},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6702-5\_49},
  doi          = {10.1007/978-981-99-6702-5\_49},
  timestamp    = {Tue, 28 Nov 2023 13:56:20 +0100},
  biburl       = {https://dblp.org/rec/conf/ficta/RajaBVCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-10967,
  author       = {Mohamed Chahine Ghanem and
                  Thomas M. Chen and
                  Mohamed Amine Ferrag and
                  Mohyi E. Kettouche},
  title        = {{ESASCF:} Expertise Extraction, Generalization and Reply Framework
                  for an Optimized Automation of Network Security Compliance},
  journal      = {CoRR},
  volume       = {abs/2307.10967},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.10967},
  doi          = {10.48550/ARXIV.2307.10967},
  eprinttype    = {arXiv},
  eprint       = {2307.10967},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-10967.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HwaidiC22,
  author       = {Jamal F. Hwaidi and
                  Thomas M. Chen},
  title        = {Classification of Motor Imagery {EEG} Signals Based on Deep Autoencoder
                  and Convolutional Neural Network Approach},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {48071--48081},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3171906},
  doi          = {10.1109/ACCESS.2022.3171906},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HwaidiC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mdpinetwork/GongCX22,
  author       = {Pu Gong and
                  Thomas M. Chen and
                  Peng Xu},
  title        = {Resource-Conserving Protection against Energy Draining {(RCPED)} Routing
                  Protocol for Wireless Sensor Networks},
  journal      = {Network},
  volume       = {2},
  number       = {1},
  pages        = {83--105},
  year         = {2022},
  url          = {https://doi.org/10.3390/network2010007},
  doi          = {10.3390/NETWORK2010007},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mdpinetwork/GongCX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-16914,
  author       = {Riad Ibadulla and
                  Thomas M. Chen and
                  Constantino Carlos Reyes{-}Aldasoro},
  title        = {FatNet: High Resolution Kernels for Classification Using Fully Convolutional
                  Optical Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2210.16914},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.16914},
  doi          = {10.48550/ARXIV.2210.16914},
  eprinttype    = {arXiv},
  eprint       = {2210.16914},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-16914.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocon/HwaidiC21,
  author       = {Jamal F. Hwaidi and
                  Thomas M. Chen},
  title        = {A Novel {KOSFS} Feature Selection Algorithm for {EEG} Signals},
  booktitle    = {19th {IEEE} International Conference on Smart Technologies, {EUROCON}
                  2021, Lviv, Ukraine, July 6 - 8, 2021},
  pages        = {265--268},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EUROCON52738.2021.9535598},
  doi          = {10.1109/EUROCON52738.2021.9535598},
  timestamp    = {Fri, 28 Oct 2022 20:55:35 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocon/HwaidiC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccae/HwaidiC21,
  author       = {Jamal F. Hwaidi and
                  Thomas M. Chen},
  title        = {A Noise Removal Approach from {EEG} Recordings Based on Variational
                  Autoencoders},
  booktitle    = {13th International Conference on Computer and Automation Engineering,
                  {ICCAE} 2021, Melbourne, Australia, March 20-22, 2021},
  pages        = {19--23},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCAE51876.2021.9426150},
  doi          = {10.1109/ICCAE51876.2021.9426150},
  timestamp    = {Mon, 17 May 2021 14:57:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccae/HwaidiC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/RaheemRCA21,
  author       = {Ali Hussein Raheem and
                  Rand Raheem and
                  Thomas M. Chen and
                  Ahmed Alkhayyat},
  title        = {Estimation of Ransomware Payments in Bitcoin Ecosystem},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {1667--1674},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00224},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00224},
  timestamp    = {Thu, 06 Jan 2022 09:48:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/RaheemRCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/GhanemC20,
  author       = {Mohamed Chahine Ghanem and
                  Thomas M. Chen},
  title        = {Reinforcement Learning for Efficient Network Penetration Testing},
  journal      = {Inf.},
  volume       = {11},
  number       = {1},
  pages        = {6},
  year         = {2020},
  url          = {https://doi.org/10.3390/info11010006},
  doi          = {10.3390/INFO11010006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/GhanemC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/LiMC19,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and
                  OpenID Connect},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {35--44},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360331},
  doi          = {10.1145/3338500.3360331},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/LiMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/BlascoCPW19,
  author       = {Jorge Blasco and
                  Thomas M. Chen and
                  Harsh Kupwade Patil and
                  Daniel Wolff},
  editor       = {Habib M. Ammari},
  title        = {Wearables Security and Privacy},
  booktitle    = {Mission-Oriented Sensor Networks and Systems: Art and Science - Volume
                  2: Advances},
  volume       = {164},
  pages        = {351--380},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-319-92384-0\_11},
  doi          = {10.1007/978-3-319-92384-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/BlascoCPW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/ChenBP19,
  author       = {Thomas M. Chen and
                  Jorge Blasco and
                  Harsh Kupwade Patil},
  editor       = {Habib M. Ammari},
  title        = {Cryptography in WSNs},
  booktitle    = {Mission-Oriented Sensor Networks and Systems: Art and Science - Volume
                  1: Foundations},
  volume       = {163},
  pages        = {783--820},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-319-91146-5\_21},
  doi          = {10.1007/978-3-319-91146-5\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/ChenBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-08960,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  title        = {OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and
                  OpenID Connect},
  journal      = {CoRR},
  volume       = {abs/1901.08960},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.08960},
  eprinttype    = {arXiv},
  eprint       = {1901.08960},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-08960.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/Martinez-Sandoval18,
  author       = {Ruben Martinez{-}Sandoval and
                  Antonio{-}Javier Garc{\'{\i}}a{-}S{\'{a}}nchez and
                  Joan Garc{\'{\i}}a{-}Haro and
                  Thomas M. Chen},
  title        = {Optimal Policy Derivation for Transmission Duty-Cycle Constrained
                  {LPWAN}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {4},
  pages        = {3114--3125},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2833289},
  doi          = {10.1109/JIOT.2018.2833289},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/Martinez-Sandoval18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/BlascoCMR18,
  author       = {Jorge Blasco and
                  Thomas M. Chen and
                  Igor Muttik and
                  Markus Roggenbach},
  title        = {Detection of app collusion potential using logic programming},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {105},
  pages        = {88--104},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2017.12.008},
  doi          = {10.1016/J.JNCA.2017.12.008},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/BlascoCMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/BlascoC18,
  author       = {Jorge Blasco and
                  Thomas M. Chen},
  title        = {Automated generation of colluding apps for experimental research},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {14},
  number       = {2},
  pages        = {127--138},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11416-017-0296-4},
  doi          = {10.1007/S11416-017-0296-4},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/BlascoC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LiMC18,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Mitigating {CSRF} attacks on OAuth 2.0 Systems},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514180},
  doi          = {10.1109/PST.2018.8514180},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/LiMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/LiMC18,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {24--41},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_3},
  doi          = {10.1007/978-3-030-03251-7\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/LiMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-07983,
  author       = {Wanpeng Li and
                  Chris J. Mitchell and
                  Thomas M. Chen},
  title        = {Mitigating {CSRF} attacks on OAuth 2.0 and OpenID Connect},
  journal      = {CoRR},
  volume       = {abs/1801.07983},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.07983},
  eprinttype    = {arXiv},
  eprint       = {1801.07983},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-07983.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IdreesRCCR17,
  author       = {Fauzia Idrees and
                  Muttukrishnan Rajarajan and
                  Mauro Conti and
                  Thomas M. Chen and
                  Yogachandran Rahulamathavan},
  title        = {PIndroid: {A} novel Android malware detection system using ensemble
                  learning methods},
  journal      = {Comput. Secur.},
  volume       = {68},
  pages        = {36--46},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.03.011},
  doi          = {10.1016/J.COSE.2017.03.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IdreesRCCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnss/AbroRCR17,
  author       = {Fauzia Idrees Abro and
                  Muttukrishnan Rajarajan and
                  Thomas M. Chen and
                  Yogachandran Rahulamathavan},
  editor       = {Robin Doss and
                  Selwyn Piramuthu and
                  Wei Zhou},
  title        = {Android Application Collusion Demystified},
  booktitle    = {Future Network Systems and Security - Third International Conference,
                  {FNSS} 2017, Gainesville, FL, USA, August 31 - September 2, 2017,
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {759},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65548-2\_14},
  doi          = {10.1007/978-3-319-65548-2\_14},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnss/AbroRCR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlascoCMR17,
  author       = {Jorge Blasco and
                  Thomas M. Chen and
                  Igor Muttik and
                  Markus Roggenbach},
  title        = {Detection of App Collusion Potential Using Logic Programming},
  journal      = {CoRR},
  volume       = {abs/1706.02387},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.02387},
  eprinttype    = {arXiv},
  eprint       = {1706.02387},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlascoCMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/BlascoCTP16,
  author       = {Jorge Blasco and
                  Thomas M. Chen and
                  Juan E. Tapiador and
                  Pedro Peris{-}Lopez},
  title        = {A Survey of Wearable Biometric Recognition Systems},
  journal      = {{ACM} Comput. Surv.},
  volume       = {49},
  number       = {3},
  pages        = {43:1--43:35},
  year         = {2016},
  url          = {https://doi.org/10.1145/2968215},
  doi          = {10.1145/2968215},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/BlascoCTP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcysa/QadriCB16,
  author       = {Jameel Qadri and
                  Thomas M. Chen and
                  Jorge Blasco},
  title        = {A Review of Significance of Energy-Consumption Anomaly in Malware
                  Detection in Mobile Devices},
  journal      = {Int. J. Cyber Situational Aware.},
  volume       = {1},
  number       = {1},
  pages        = {210--230},
  year         = {2016},
  url          = {https://doi.org/10.22619/ijcsa.2016.1001010},
  doi          = {10.22619/IJCSA.2016.1001010},
  timestamp    = {Tue, 14 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcysa/QadriCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/AlzubiCARA16,
  author       = {Omar A. Alzubi and
                  Thomas M. Chen and
                  Jafar Ahmad Abed Alzubi and
                  Hasan Rashaideh and
                  Nijad Al{-}Najdawi},
  title        = {Secure Channel Coding Schemes based on Algebraic-Geometric Codes over
                  Hermitian Curves},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {22},
  number       = {4},
  pages        = {552--566},
  year         = {2016},
  url          = {http://www.jucs.org/jucs\_22\_4/secure\_channel\_coding\_schemes},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/AlzubiCARA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/AsavoaeBCKMNRS16,
  author       = {Irina Mariuca Asavoae and
                  Jorge Blasco and
                  Thomas M. Chen and
                  Harsha Kumara Kalutarage and
                  Igor Muttik and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Siraj Ahmed Shaikh},
  editor       = {David Aspinall and
                  Lorenzo Cavallaro and
                  Mohamed Nassim Seghir and
                  Melanie Volkamer},
  title        = {Towards Automated Android App Collusion Detection},
  booktitle    = {Proceedings of the 1st International Workshop on Innovations in Mobile
                  Privacy and Security, {IMPS} 2016, co-located with the International
                  Symposium on Engineering Secure Software and Systems (ESSoS 2016),
                  London, UK, April 6, 2016},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1575},
  pages        = {29--37},
  publisher    = {CEUR-WS.org},
  year         = {2016},
  url          = {https://ceur-ws.org/Vol-1575/paper\_3.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:23 +0100},
  biburl       = {https://dblp.org/rec/conf/essos/AsavoaeBCKMNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AsavoaeBCKMNRS16,
  author       = {Irina Mariuca Asavoae and
                  Jorge Blasco and
                  Thomas M. Chen and
                  Harsha Kumara Kalutarage and
                  Igor Muttik and
                  Hoang Nga Nguyen and
                  Markus Roggenbach and
                  Siraj Ahmed Shaikh},
  title        = {Towards Automated Android App Collusion Detection},
  journal      = {CoRR},
  volume       = {abs/1603.02308},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.02308},
  eprinttype    = {arXiv},
  eprint       = {1603.02308},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AsavoaeBCKMNRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/GongCX15,
  author       = {Pu Gong and
                  Thomas M. Chen and
                  Quan Xu},
  title        = {{ETARP:} An Energy Efficient Trust-Aware Routing Protocol for Wireless
                  Sensor Networks},
  journal      = {J. Sensors},
  volume       = {2015},
  pages        = {469793:1--469793:10},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/469793},
  doi          = {10.1155/2015/469793},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/js/GongCX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcas/XuCHG14,
  author       = {Quan Xu and
                  Thomas M. Chen and
                  Yupeng Hu and
                  Pu Gong},
  title        = {Write Pattern Format Algorithm for Reliable NAND-Based SSDs},
  journal      = {{IEEE} Trans. Circuits Syst. {II} Express Briefs},
  volume       = {61-II},
  number       = {7},
  pages        = {516--520},
  year         = {2014},
  url          = {https://doi.org/10.1109/TCSII.2014.2327332},
  doi          = {10.1109/TCSII.2014.2327332},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcas/XuCHG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiOTCX14,
  author       = {Shancang Li and
                  George C. Oikonomou and
                  Theo Tryfonas and
                  Thomas M. Chen and
                  Li Da Xu},
  title        = {A Distributed Consensus Algorithm for Decision Making in Service-Oriented
                  Internet of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {10},
  number       = {2},
  pages        = {1461--1468},
  year         = {2014},
  url          = {https://doi.org/10.1109/TII.2014.2306331},
  doi          = {10.1109/TII.2014.2306331},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/LiOTCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csndsp/XuGC14,
  author       = {Quan Xu and
                  Pu Gong and
                  Thomas M. Chen},
  title        = {Concatenated {LDPC-TCM} coding for reliable storage in multi-level
                  flash memories},
  booktitle    = {9th International Symposium on Communication Systems, Networks {\&}
                  Digital Signal Processing, {CSNDSP} 2014, Manchester, UK, July 23-25,
                  2014},
  pages        = {166--170},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSNDSP.2014.6923818},
  doi          = {10.1109/CSNDSP.2014.6923818},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csndsp/XuGC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csndsp/GongXC14,
  author       = {Pu Gong and
                  Quan Xu and
                  Thomas M. Chen},
  title        = {Energy Harvesting Aware routing protocol for wireless sensor networks},
  booktitle    = {9th International Symposium on Communication Systems, Networks {\&}
                  Digital Signal Processing, {CSNDSP} 2014, Manchester, UK, July 23-25,
                  2014},
  pages        = {171--176},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSNDSP.2014.6923819},
  doi          = {10.1109/CSNDSP.2014.6923819},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csndsp/GongXC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/GuanHTC13,
  author       = {Wenyang Guan and
                  Jianhua He and
                  Zuoyin Tang and
                  Thomas M. Chen},
  title        = {Design and Evaluation of a Framework for Cooperative and Adaptive
                  QoS Control of {DSRC} Network for Road Safety Applications},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/946931},
  doi          = {10.1155/2013/946931},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/GuanHTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OlteanuXLCC13,
  author       = {Alina Olteanu and
                  Yang Xiao and
                  Jing Liu and
                  Thomas M. Chen and
                  C. L. Philip Chen},
  title        = {Nonintrusive tracing in the Internet},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {7},
  pages        = {833--843},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.616},
  doi          = {10.1002/SEC.616},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/OlteanuXLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenS12,
  author       = {Thomas M. Chen and
                  Xuemin Shen},
  title        = {Editor's note},
  journal      = {{IEEE} Netw.},
  volume       = {26},
  number       = {1},
  pages        = {2},
  year         = {2012},
  url          = {https://doi.org/10.1109/MNET.2012.6135848},
  doi          = {10.1109/MNET.2012.6135848},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/ChenS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenA11,
  author       = {Thomas M. Chen and
                  Saeed Abu{-}Nimeh},
  title        = {Lessons from Stuxnet},
  journal      = {Computer},
  volume       = {44},
  number       = {4},
  pages        = {91--93},
  year         = {2011},
  url          = {https://doi.org/10.1109/MC.2011.115},
  doi          = {10.1109/MC.2011.115},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ChenA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Abu-NimehCA11,
  author       = {Saeed Abu{-}Nimeh and
                  Thomas M. Chen and
                  Omar A. Alzubi},
  title        = {Malicious and Spam Posts in Online Social Networks},
  journal      = {Computer},
  volume       = {44},
  number       = {9},
  pages        = {23--28},
  year         = {2011},
  url          = {https://doi.org/10.1109/MC.2011.222},
  doi          = {10.1109/MC.2011.222},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/Abu-NimehCA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/Chen11c,
  author       = {Thomas M. Chen},
  title        = {How networks changed the world},
  journal      = {{IEEE} Netw.},
  volume       = {25},
  number       = {6},
  pages        = {2--3},
  year         = {2011},
  url          = {https://doi.org/10.1109/MNET.2011.6085635},
  doi          = {10.1109/MNET.2011.6085635},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/Chen11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ChenSB11,
  author       = {Thomas M. Chen and
                  Juan Carlos S{\'{a}}nchez{-}Aarnoutse and
                  John F. Buford},
  title        = {Petri Net Modeling of Cyber-Physical Attacks on Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {2},
  number       = {4},
  pages        = {741--749},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSG.2011.2160000},
  doi          = {10.1109/TSG.2011.2160000},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/ChenSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/HeTOC11,
  author       = {Jianhua He and
                  Zuoyin Tang and
                  Timothy O'Farrell and
                  Thomas M. Chen},
  title        = {Performance analysis of {DSRC} priority mechanism for road safety
                  applications in vehicular networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {11},
  number       = {7},
  pages        = {980--990},
  year         = {2011},
  url          = {https://doi.org/10.1002/wcm.821},
  doi          = {10.1002/WCM.821},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/HeTOC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenW10,
  author       = {Thomas M. Chen and
                  Victoria Wang},
  title        = {Web Filtering and Censoring},
  journal      = {Computer},
  volume       = {43},
  number       = {3},
  pages        = {94--97},
  year         = {2010},
  url          = {https://doi.org/10.1109/MC.2010.84},
  doi          = {10.1109/MC.2010.84},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computer/ChenW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/HeCCC10,
  author       = {Jianhua He and
                  Hsiao{-}Hwa Chen and
                  Thomas M. Chen and
                  Wenqing Cheng},
  title        = {Adaptive congestion control for {DSRC} vehicle networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {14},
  number       = {2},
  pages        = {127--129},
  year         = {2010},
  url          = {https://doi.org/10.1109/LCOMM.2010.02.092002},
  doi          = {10.1109/LCOMM.2010.02.092002},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/icl/HeCCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Abu-NimehC10,
  author       = {Saeed Abu{-}Nimeh and
                  Thomas M. Chen},
  title        = {Proliferation and Detection of Blog Spam},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {5},
  pages        = {42--47},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.113},
  doi          = {10.1109/MSP.2010.113},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Abu-NimehC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qshine/OlteanuXLC10,
  author       = {Alina Olteanu and
                  Yang Xiao and
                  Jing Liu and
                  Thomas M. Chen},
  editor       = {Xi Zhang and
                  Daji Qiao},
  title        = {Studying Non-intrusive Tracing in the Internet},
  booktitle    = {Quality, Reliability, Security and Robustness in Heterogeneous Networks
                  - 7th International Conference on Heterogeneous Networking for Quality,
                  Reliability, Security and Robustness, QShine 2010, and Dedicated Short
                  Range Communications Workshop, {DSRC} 2010, Houston, TX, USA, November
                  17-19, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {74},
  pages        = {58--74},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29222-4\_5},
  doi          = {10.1007/978-3-642-29222-4\_5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/qshine/OlteanuXLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/forensics/Chen10,
  author       = {Thomas M. Chen},
  editor       = {Chang{-}Tsun Li},
  title        = {Identity Theft through the Web},
  booktitle    = {Handbook of Research on Computational Forensics, Digital Crime, and
                  Investigation: Methods and Solutions},
  pages        = {379--395},
  publisher    = {{IGI} Global},
  year         = {2010},
  url          = {https://doi.org/10.4018/978-1-60566-836-9.ch016},
  doi          = {10.4018/978-1-60566-836-9.CH016},
  timestamp    = {Tue, 16 May 2017 14:01:55 +0200},
  biburl       = {https://dblp.org/rec/reference/forensics/Chen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZengC09,
  author       = {Yi Zeng and
                  Thomas M. Chen},
  title        = {Classification of Traffic Flows into QoS Classes by Unsupervised Learning
                  and {KNN} Clustering},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {3},
  number       = {2},
  pages        = {134--146},
  year         = {2009},
  url          = {https://doi.org/10.3837/tiis.2009.02.001},
  doi          = {10.3837/TIIS.2009.02.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ZengC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenFHS09,
  author       = {Thomas M. Chen and
                  Zhi Fu and
                  Liwen He and
                  Tim Strayer},
  title        = {Recent developments in network intrusion detection [guest editorial]},
  journal      = {{IEEE} Netw.},
  volume       = {23},
  number       = {1},
  pages        = {4--5},
  year         = {2009},
  url          = {https://doi.org/10.1109/MNET.2009.4804317},
  doi          = {10.1109/MNET.2009.4804317},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenFHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JamilC09,
  author       = {Nasir Jamil and
                  Thomas M. Chen},
  title        = {A Mathematical View of Network-Based Suppressions of Worm Epidemics},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5198629},
  doi          = {10.1109/ICC.2009.5198629},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/JamilC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ChenB09,
  author       = {Thomas M. Chen and
                  John F. Buford},
  title        = {Design considerations for a honeypot for {SQL} injection Attacks},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {915--921},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355040},
  doi          = {10.1109/LCN.2009.5355040},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/ChenB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/tf/ChenN08,
  author       = {Thomas M. Chen and
                  Nhut Nguyen},
  title        = {Authentication and Privacy},
  booktitle    = {Encyclopedia of Wireless and Mobile Communications},
  year         = {2008},
  url          = {http://www.crcnetbase.com/doi/abs/10.1081/E-EWMC-120043167},
  doi          = {10.1081/E-EWMC-120043167},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/tf/ChenN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/JamilC07,
  author       = {Nasir Jamil and
                  Thomas M. Chen},
  title        = {A Web-Based Network Worm Simulator},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {1461--1465},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.245},
  doi          = {10.1109/ICC.2007.245},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/JamilC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/JamilC06,
  author       = {Nasir Jamil and
                  Thomas M. Chen},
  title        = {Effectiveness of Rate Control in Slowing Down Worm Epidemics},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
                  '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/GLOCOM.2006.306},
  doi          = {10.1109/GLOCOM.2006.306},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/JamilC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KoC06,
  author       = {Jungwon Ko and
                  Thomas M. Chen},
  title        = {A Decision Theoretic Approach to Measurement-based Admission Control},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {742--747},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.254796},
  doi          = {10.1109/ICC.2006.254796},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KoC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChenJ06,
  author       = {Thomas M. Chen and
                  Nasir Jamil},
  title        = {Effectiveness of Quarantine in Worm Epidemics},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2006, Istanbul, Turkey, 11-15 June 2006},
  pages        = {2142--2147},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICC.2006.255087},
  doi          = {10.1109/ICC.2006.255087},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChenJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/new2an/RezaulPGC06,
  author       = {Karim Mohammed Rezaul and
                  Algirdas Pakstas and
                  R. Gilchrist and
                  Thomas M. Chen},
  editor       = {Yevgeni Koucheryavy and
                  Jarmo Harju and
                  Villy B{\ae}k Iversen},
  title        = {{HEAF:} {A} Novel Estimator for Long-Range Dependent Self-similar
                  Network Traffic},
  booktitle    = {Next Generation Teletraffic and Wired/Wireless Advanced Networking,
                  6th International Conference, {NEW2AN} 2006, St. Petersburg, Russia,
                  May 29 - June 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4003},
  pages        = {34--45},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11759355\_6},
  doi          = {10.1007/11759355\_6},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/new2an/RezaulPGC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/ChenV05,
  author       = {Thomas M. Chen and
                  Varadharajan Venkataramanan},
  title        = {Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks},
  journal      = {{IEEE} Internet Comput.},
  volume       = {9},
  number       = {6},
  pages        = {35--41},
  year         = {2005},
  url          = {https://doi.org/10.1109/MIC.2005.123},
  doi          = {10.1109/MIC.2005.123},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/ChenV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ChenR04,
  author       = {Thomas M. Chen and
                  Jean{-}Marc Robert},
  title        = {Worm Epidemics in High-Speed Networks},
  journal      = {Computer},
  volume       = {37},
  number       = {6},
  pages        = {48--53},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.36},
  doi          = {10.1109/MC.2004.36},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ChenR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ZengC04,
  author       = {Yi Zeng and
                  Thomas M. Chen},
  title        = {Measurement-based real-time traffic model classification},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2004, Paris, France, 20-24 June 2004},
  pages        = {1857--1861},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICC.2004.1312842},
  doi          = {10.1109/ICC.2004.1312842},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ZengC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/EladlyC04,
  author       = {Hanem A. ElAdly and
                  Thomas M. Chen},
  title        = {An overlay algorithm to improve the support of multi-hopping in the
                  {IEEE} 802.11 WLANs},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2004, Paris, France, 20-24 June 2004},
  pages        = {3817--3821},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICC.2004.1313267},
  doi          = {10.1109/ICC.2004.1313267},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/EladlyC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/EladlyC04,
  author       = {Hanem A. ElAdly and
                  Thomas M. Chen},
  title        = {Enhancing the support of multihopping in an {IEEE} 802.11 ad-hoc network},
  booktitle    = {Proceedings of the 9th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), June 28 - July 1, 2004, Alexandria, Egypt},
  pages        = {158--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISCC.2004.1358398},
  doi          = {10.1109/ISCC.2004.1358398},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/EladlyC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/SadekKC03,
  author       = {Nayera M. Sadek and
                  Alireza Khotanzad and
                  Thomas M. Chen},
  editor       = {Ronald P. Luijten and
                  Luiz A. DaSilva and
                  E. K. Park},
  title        = {{ATM} dynamic bandwidth allocation using {F-ARIMA} prediction model},
  booktitle    = {Proceedings of the 12th International Conference on Computer Communications
                  and Networks, {ICCCN} 2003, 20-22 October, 2003, Double Tree Lincoln
                  Centre, Dallas, Texas, {USA}},
  pages        = {359--363},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICCCN.2003.1284194},
  doi          = {10.1109/ICCCN.2003.1284194},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccn/SadekKC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Chen02,
  author       = {Thomas M. Chen},
  title        = {Perspectives - internet computing as a utility},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {40},
  number       = {5},
  pages        = {10},
  year         = {2002},
  url          = {https://doi.org/10.1109/MCOM.2002.1000206},
  doi          = {10.1109/MCOM.2002.1000206},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/Chen02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/YamanakaCS02,
  author       = {Naoaki Yamanaka and
                  Thomas M. Chen and
                  Heinrich J. St{\"{u}}ttgen},
  title        = {Guest editorial - trends in high-performance switching and routing
                  technologies},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {40},
  number       = {11},
  pages        = {36--37},
  year         = {2002},
  url          = {https://doi.org/10.1109/MCOM.2002.1046990},
  doi          = {10.1109/MCOM.2002.1046990},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/YamanakaCS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ChenL02,
  author       = {Thomas M. Chen and
                  Steve S. Liu},
  title        = {A model and evaluation of distributed network management approaches},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {20},
  number       = {4},
  pages        = {850--857},
  year         = {2002},
  url          = {https://doi.org/10.1109/JSAC.2002.1003049},
  doi          = {10.1109/JSAC.2002.1003049},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/ChenL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/ChenH02,
  author       = {Thomas M. Chen and
                  Lucia Hu},
  title        = {Internet performance monitoring},
  journal      = {Proc. {IEEE}},
  volume       = {90},
  number       = {9},
  pages        = {1592--1603},
  year         = {2002},
  url          = {https://doi.org/10.1109/JPROC.2002.802006},
  doi          = {10.1109/JPROC.2002.802006},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/ChenH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Chen01,
  author       = {Thomas M. Chen},
  title        = {Increasing the observability of Internet behavior},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {1},
  pages        = {93--98},
  year         = {2001},
  url          = {https://doi.org/10.1145/357489.357514},
  doi          = {10.1145/357489.357514},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Chen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ZhuCL01,
  author       = {Yuhang Zhu and
                  Thomas M. Chen and
                  Steve S. Liu},
  editor       = {George Pavlou and
                  Nikos Anerousis and
                  Antonio Liotta},
  title        = {Models and Analysis of Trade-offs in Distributed Network Management
                  Approaches},
  booktitle    = {2001 {IEEE/IFIP} International Symposium on Integrated Network Management,
                  {IM} 2001, Seattle, USA, May 14-18, 2001. Proceedings},
  pages        = {391--404},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/INM.2001.918055},
  doi          = {10.1109/INM.2001.918055},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/ZhuCL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Chen00,
  author       = {Thomas M. Chen},
  title        = {Evolution to the programmable Internet},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {38},
  number       = {3},
  pages        = {124--128},
  year         = {2000},
  url          = {https://doi.org/10.1109/35.867845},
  doi          = {10.1109/35.867845},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/Chen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Chen00a,
  author       = {Thomas M. Chen},
  title        = {Network traffic measurements and experiments [Guest Editorial]},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {38},
  number       = {5},
  pages        = {120},
  year         = {2000},
  url          = {https://doi.org/10.1109/MCOM.2000.841835},
  doi          = {10.1109/MCOM.2000.841835},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/Chen00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ChenGY00,
  author       = {Thomas M. Chen and
                  Roch H. Glitho and
                  Makoto Yoshida},
  title        = {Guest editorial recent advances in network management and operations},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {5},
  pages        = {641--643},
  year         = {2000},
  url          = {https://doi.org/10.1109/JSAC.2000.842980},
  doi          = {10.1109/JSAC.2000.842980},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ChenGY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/OhCK00,
  author       = {Tae H. Oh and
                  Thomas M. Chen and
                  Jeffery L. Kennington},
  title        = {Fault restoration and spare capacity allocation with QoS constraints
                  for {MPLS} networks},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2000. {GLOBECOM}
                  2000, San Francisco, CA, USA, 27 November - 1 December 2000},
  pages        = {1731--1735},
  publisher    = {{IEEE}},
  year         = {2000},
  url          = {https://doi.org/10.1109/GLOCOM.2000.891932},
  doi          = {10.1109/GLOCOM.2000.891932},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/OhCK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/StavrakakisC98,
  author       = {Ioannis Stavrakakis and
                  Thomas M. Chen},
  title        = {Editorial - Wireless LANs},
  journal      = {Mob. Networks Appl.},
  volume       = {3},
  number       = {3},
  pages        = {235--236},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1019128900071},
  doi          = {10.1023/A:1019128900071},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/StavrakakisC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenLPWC98,
  author       = {Thomas M. Chen and
                  Steve S. Liu and
                  Michael J. Procanik and
                  David C. Wang and
                  D. Dean Casey},
  title        = {{INQIRE:} a software approach to monitoring QoS in {ATM} networks},
  journal      = {{IEEE} Netw.},
  volume       = {12},
  number       = {2},
  pages        = {32--37},
  year         = {1998},
  url          = {https://doi.org/10.1109/65.681927},
  doi          = {10.1109/65.681927},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenLPWC98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/Chen97,
  author       = {Tom Chen},
  title        = {Network And Internet Security (Guest Editorial)},
  journal      = {{IEEE} Netw.},
  volume       = {11},
  number       = {3},
  pages        = {11},
  year         = {1997},
  url          = {https://doi.org/10.1109/MNET.1997.587043},
  doi          = {10.1109/MNET.1997.587043},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/Chen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChenLS96,
  author       = {Thomas M. Chen and
                  Steve S. Liu and
                  Vijay K. Samalam},
  title        = {The available bit rate service for data in {ATM} networks},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {34},
  number       = {5},
  pages        = {56--58},
  year         = {1996},
  url          = {https://doi.org/10.1109/35.492973},
  doi          = {10.1109/35.492973},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ChenLS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenLWSPK96,
  author       = {Thomas M. Chen and
                  Steven S. Liu and
                  David Wang and
                  Vijay K. Samalam and
                  Michael J. Procanik and
                  Dinyar Kavouspour},
  title        = {Monitoring and control of {ATM} networks using special cells},
  journal      = {{IEEE} Netw.},
  volume       = {10},
  number       = {5},
  pages        = {28--38},
  year         = {1996},
  url          = {https://doi.org/10.1109/65.539858},
  doi          = {10.1109/65.539858},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenLWSPK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0017950,
  author       = {Thomas M. Chen and
                  Steve S. Liu},
  title        = {{ATM} switching systems},
  publisher    = {Artech House},
  year         = {1995},
  isbn         = {978-0-89006-682-9},
  timestamp    = {Fri, 08 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0017950.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamam/ChenS95,
  author       = {Thomas M. Chen and
                  Vijay K. Samalam},
  title        = {Time-Dependent Behavior of Fluid Buffer Models with Markov Input and
                  Constant Output Rates},
  journal      = {{SIAM} J. Appl. Math.},
  volume       = {55},
  number       = {3},
  pages        = {784--799},
  year         = {1995},
  url          = {https://doi.org/10.1137/S0036139992240103},
  doi          = {10.1137/S0036139992240103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamam/ChenS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenL94,
  author       = {Thomas M. Chen and
                  Steven S. Liu},
  title        = {Management and control functions in {ATM} switching systems},
  journal      = {{IEEE} Netw.},
  volume       = {8},
  number       = {4},
  pages        = {27--40},
  year         = {1994},
  url          = {https://doi.org/10.1109/65.298161},
  doi          = {10.1109/65.298161},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ChenWM94,
  author       = {Thomas M. Chen and
                  Jean C. Walrand and
                  David G. Messerschmitt},
  title        = {Parameter estimation for partially observed queues},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {42},
  number       = {9},
  pages        = {2730--2739},
  year         = {1994},
  url          = {https://doi.org/10.1109/26.317414},
  doi          = {10.1109/26.317414},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/ChenWM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ChenWM89,
  author       = {Thomas M. Chen and
                  Jean C. Walrand and
                  David G. Messerschmitt},
  title        = {Dynamic priority protocols for packet voice},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {7},
  number       = {5},
  pages        = {632--643},
  year         = {1989},
  url          = {https://doi.org/10.1109/49.32327},
  doi          = {10.1109/49.32327},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsac/ChenWM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChenM88,
  author       = {Thomas M. Chen and
                  David G. Messerschmitt},
  title        = {Integrated voice/data switching},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {26},
  number       = {6},
  pages        = {16--26},
  year         = {1988},
  url          = {https://doi.org/10.1109/35.457},
  doi          = {10.1109/35.457},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ChenM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics