In-network outlier detection in wireless sensor networks J Branch, B Szymanski, C Giannella, R Wolff, H Kargupta Distributed Computing Systems, 2006. ICDCS 2006. 26th IEEE International …, 2006 | 591* | 2006 |
SENSE: a wireless sensor network simulator G Chen, J Branch, M Pflug, L Zhu, B Szymanski Advances in Pervasive Computing and Networking, 249-267, 2005 | 216 | 2005 |
Intrusion detection: A bioinformatics approach S Coull, J Branch, B Szymanski, E Breimer Computer Security Applications Conference, 2003. Proceedings. 19th Annual, 24-33, 2003 | 207 | 2003 |
MANAGING EMERGENCY RESPONSE SERVICES USING MOBILE COMMUNICATION DEVICES JA Bivens, JW Branch, R Das, RG Farrell, SF Hobson, DM Sow US Patent 20,120,218,102, 2012 | 118 | 2012 |
Towards QoI and Energy-Efficiency in Internet-of-Things Sensory Environments CH Liu, J Fan, JW Branch, KK Leung IEEE, 0 | 116 | |
Denial of service intrusion detection using time dependent deterministic finite automata J Branch, A Bivens, CY Chan, TK Lee, BK Szymanski Proc. Graduate Research Conference, 45-51, 2002 | 76 | 2002 |
A letter soup for the quality of information in sensor networks C Bisdikian, J Branch, KK Leung, RI Young Pervasive Computing and Communications, 2009. PerCom 2009. IEEE …, 2009 | 64 | 2009 |
Autonomic 802.11 wireless LAN security auditing JW Branch, NL Petroni Jr, L Van Doorn, D Safford Security & Privacy, IEEE 2 (3), 56-65, 2004 | 61 | 2004 |
Autonomic 802.11 Wireless LANSecurity Auditing W Joel, L Nick, L Van, D Safford | 61* | |
Efficient Network Management for Context-Aware Participatory Sensing CH Liu, P Hui, JW Branch, C Bisdikian, B Yang information fusion 6, 3, 0 | 59* | |
PREDICTIVE CONTEXT-BASED VIRTUAL WORKSPACE PLACEMENT JW Branch, DM Freimuth, BJ Ko, V Pappas US Patent 20,120,023,223, 2012 | 55 | 2012 |
Self-selecting reliable paths for wireless sensor network routing TA Babbitt, C Morrell, BK Szymanski, JW Branch Computer Communications 31 (16), 3799-3809, 2008 | 52 | 2008 |
Sentire: A framework for building middleware for sensor and actuator networks JW Branch, JS Davis, DM Sow, C Bisdikian Pervasive Computing and Communications Workshops, 2005. PerCom 2005 …, 2005 | 48 | 2005 |
Host-based intrusion detection using user signatures S Freeman, A Bivens, J Branch, B Szymanski Proceedings of the Research Conference. RPI, Troy, NY, 2002 | 46 | 2002 |
Self-selective routing for wireless ad hoc networks GG Chen, JW Branch, BK Szymanski Wireless And Mobile Computing, Networking And Communications, 2005.(WiMob …, 2005 | 42 | 2005 |
Local leader election, signal strength aware flooding, and routeless routing G Chen, JW Branch, BK Szymanski Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE …, 2005 | 42 | 2005 |
QoI-Aware wireless sensor network management for dynamic multi-task operations CH Liu, C Bisdikian, JW Branch, KK Leung Sensor Mesh and Ad Hoc Communications and Networks (SECON), 2010 7th Annual …, 2010 | 39 | 2010 |
A self-selection technique for flooding and routing in wireless ad-hoc networks GG Chen, JW Branch, BK Szymanski Journal of Network and Systems Management 14 (3), 359-380, 2006 | 35 | 2006 |
Quality of Service Management of End User Devices in an End User Network D Agrawal, J Branch, K Lee, P Zerfos US Patent App. 12/494,824, 2009 | 24* | 2009 |
ESCORT: energy-efficient sensor network communal routing topology using signal quality metrics JW Branch, GG Chen, BK Szymanski Networking-ICN 2005, 438-448, 2005 | 23 | 2005 |