Seuraa
Tanya G Roosta
Tanya G Roosta
Applied research scientist
Vahvistettu sähköpostiosoite verkkotunnuksessa mfe.berkeley.edu
Nimike
Viittaukset
Viittaukset
Vuosi
Security and privacy issues with health care information technology
M Meingast, T Roosta, S Sastry
2006 international conference of the IEEE engineering in medicine and …, 2006
4832006
Time synchronization attacks in sensor networks
M Manzo, T Roosta, S Sastry
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
1702005
Taxonomy of security attacks in sensor networks and countermeasures
T Roosta, S Shieh, S Sastry
The first IEEE international conference on system integration and …, 2006
1662006
Key management and secure software updates in wireless process control environments
DK Nilsson, T Roosta, U Lindqvist, A Valdes
Proceedings of the first ACM conference on Wireless network security, 100-108, 2008
1652008
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
AA Cardenas, T Roosta, S Sastry
Ad Hoc Networks 7 (8), 1434-1447, 2009
1422009
Instrumenting wireless sensor networks for real-time surveillance
S Sastry, M Manzo, S Oh, P Chen
Proceedings 2006 IEEE International Conference on Robotics and Automation …, 2006
1282006
A testbed for secure and robust SCADA systems
A Giani, G Karsai, T Roosta, A Shah, B Sinopoli, J Wiley
ACM SIGBED Review 5 (2), 1-4, 2008
1172008
Probabilistic geographic routing protocol for ad hoc and sensor networks
T Roosta, M Menzo, S Sastry
Proceeding (474) wireless networks and emerging technologies, 2005
792005
Transactional confidentiality in sensor networks
S Pai, M Meingast, T Roosta, S Bermudez, SB Wicker, DK Mulligan, ...
IEEE Security & Privacy 6 (4), 28-35, 2008
602008
Convergence analysis of reweighted sum-product algorithms
TG Roosta, MJ Wainwright, SS Sastry
IEEE Transactions on Signal Processing 56 (9), 4293-4305, 2008
572008
An intrusion detection system for wireless process control systems
T Roosta, DK Nilsson, U Lindqvist, A Valdes
2008 5th IEEE international conference on mobile ad hoc and sensor systems …, 2008
522008
Distributed reputation system for tracking applications in sensor networks
T Roosta, M Meingast, S Sastry
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems …, 2006
322006
Attacks and defenses of ubiquitous sensor networks
TG Roosta
University of California, Berkeley, 2008
282008
Inherent security of routing protocols in ad-hoc and sensor networks
T Roosta, S Pai, P Chen, S Sastry, S Wicker
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1273-1278, 2007
202007
Using social network theory towards development of wireless ad hoc network trust
S Pai, T Roosta, S Wicker, S Sastry
21st International Conference on Advanced Information Networking and …, 2007
202007
Confidentiality in sensor networks: Transactional information
S Pai, M Meingast, T Roosta, S Bermudez, S Wicker, DK Mulligan, ...
IEEE Security and Privacy magazine, 2008
192008
Testbed implementation of a secure flooding time synchronization protocol
T Roosta, WC Liao, WC Teng, S Sastry
2008 IEEE Wireless Communications and Networking Conference, 3157-3162, 2008
152008
Integrity checker for wireless sensor networks in health care applications
A Giani, T Roosta, S Sastry
2008 Second International Conference on Pervasive Computing Technologies for …, 2008
152008
Robust estimation and detection in ad hoc and sensor networks
T Roosta, SM Mishra, A Ghazizadeh
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 236-245, 2006
152006
Cyber security basic defenses and attack trends
AA Cárdenas, T Roosta, G Taban, S Sastry
Homeland Security Technology Challenges, 73-101, 2008
132008
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20