Patrick Tague
Title
Cited by
Cited by
Year
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1572014
Mitigation of control channel jamming under node capture attacks
P Tague, M Li, R Poovendran
IEEE TRANSACTIONS ON MOBILE COMPUTING, 8 (9), 2008
1172008
Smartauth: User-centered authorization for the internet of things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th {USENIX} Security Symposium ({USENIX} Security 17), 361-378, 2017
1122017
Network Self-Organization in the Internet of Things
AP Athreya, P Tague
IEEE International Workshop on Internet-of-Things Networking and Control …, 2013
742013
Linear programming models for jamming attacks on network traffic flows
P Tague, D Slater, R Poovendran, G Noubir
2008 6th International Symposium on Modeling and Optimization in Mobile, Ad …, 2008
702008
Modeling node capture attacks in wireless sensor networks
P Tague, R Poovendran
2008 46th Annual Allerton Conference on Communication, Control, and …, 2008
652008
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
P Tague, S Nabar, JA Ritcey, R Poovendran
IEEE/ACM Transactions On Networking 19 (1), 184-194, 2010
632010
Probabilistic mitigation of control channel jamming via random key distribution
P Tague, M Li, R Poovendran
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
632007
Modeling adaptive node capture attacks in multi-hop wireless networks
P Tague, R Poovendran
Ad Hoc Networks 5 (6), 801-814, 2007
632007
A5: Automated analysis of adversarial android applications
T Vidas, J Tan, J Nahata, CL Tan, N Christin, P Tague
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
602014
Is your commute driving you crazy? A study of misbehavior in vehicular platoons
B DeBruhl, S Weerakkody, B Sinopoli, P Tague
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
582015
A coding-theoretic approach for efficient message verification over insecure channels
D Slater, P Tague, R Poovendran, BJ Matt
Proceedings of the second ACM conference on Wireless network security, 151-160, 2009
582009
Recognizing new activities with limited training data
LT Nguyen, M Zeng, P Tague, J Zhang
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 67-74, 2015
552015
Digital filter design for jamming mitigation in 802.15. 4 communication
B DeBruhl, P Tague
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
492011
Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types
J Han, AJ Chung, MK Sinha, M Harishankar, S Pan, HY Noh, P Zhang, ...
2018 IEEE Symposium on Security and Privacy (SP), 836-852, 2018
412018
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
412017
Designing for self-configuration and self-adaptation in the Internet of Things
AP Athreya, B DeBruhl, P Tague
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
412013
Evaluating the vulnerability of network traffic using joint security and routing analysis
P Tague, D Slater, J Rogers, R Poovendran
IEEE transactions on dependable and secure computing 6 (2), 111-123, 2008
372008
Supporting privacy-conscious app update decisions with user reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
322015
Carving Secure Wi-Fi Zones with Defensive Jamming
YS Kim, P Tague, H Lee, H Kim
7th ACM Symposium on Information, Computer, and Communications Security …, 2012
322012
The system can't perform the operation now. Try again later.
Articles 1–20