Tanya G Roosta
Tanya G Roosta
Applied research scientist
Vahvistettu sähköpostiosoite verkkotunnuksessa
Security and privacy issues with health care information technology
M Meingast, T Roosta, S Sastry
2006 International Conference of the IEEE Engineering in Medicine and …, 2006
Time synchronization attacks in sensor networks
M Manzo, T Roosta, S Sastry
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
Taxonomy of security attacks in sensor networks and countermeasures
T Roosta, S Shieh, S Sastry
The first IEEE international conference on system integration and …, 2006
Key management and secure software updates in wireless process control environments
DK Nilsson, T Roosta, U Lindqvist, A Valdes
Proceedings of the first ACM conference on Wireless network security, 100-108, 2008
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
AA Cardenas, T Roosta, S Sastry
Ad Hoc Networks 7 (8), 1434-1447, 2009
Instrumenting wireless sensor networks for real-time surveillance
S Sastry, D Culler, M Howard, T Roosta, B Zhu, J Taneja, S Kim, ...
Proceedings 2006 IEEE International Conference on Robotics and Automation …, 2006
A testbed for secure and robust SCADA systems
A Giani, G Karsai, T Roosta, A Shah, B Sinopoli, J Wiley
ACM SIGBED Review 5 (2), 1-4, 2008
Probabilistic geographic routing protocol for ad hoc and sensor networks
T Roosta, M Menzo, S Sastry
Proceeding (474) wireless networks and emerging technologies, 2005
Transactional confidentiality in sensor networks
S Pai, M Meingast, T Roosta, S Bermudez, SB Wicker, DK Mulligan, ...
IEEE Security & Privacy 6 (4), 28-35, 2008
Convergence analysis of reweighted sum-product algorithms
TG Roosta, MJ Wainwright, SS Sastry
IEEE Transactions on Signal Processing 56 (9), 4293-4305, 2008
An intrusion detection system for wireless process control systems
T Roosta, DK Nilsson, U Lindqvist, A Valdes
2008 5th IEEE international conference on mobile ad hoc and sensor systems …, 2008
Distributed reputation system for tracking applications in sensor networks
T Roosta, M Meingast, S Sastry
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems …, 2006
Attacks and defenses of ubiquitous sensor networks
TG Roosta
University of California, Berkeley, 2008
Confidentiality in sensor networks: Transactional information
S Pai, M Meingast, T Roosta, S Bermudez, S Wicker, DK Mulligan, ...
IEEE Security and Privacy magazine, 2008
Inherent security of routing protocols in ad-hoc and sensor networks
T Roosta, S Pai, P Chen, S Sastry, S Wicker
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1273-1278, 2007
Using social network theory towards development of wireless ad hoc network trust
S Pai, T Roosta, S Wicker, S Sastry
21st International Conference on Advanced Information Networking and …, 2007
Testbed implementation of a secure flooding time synchronization protocol
T Roosta, WC Liao, WC Teng, S Sastry
2008 IEEE Wireless Communications and Networking Conference, 3157-3162, 2008
Integrity checker for wireless sensor networks in health care applications
A Giani, T Roosta, S Sastry
2008 Second International Conference on Pervasive Computing Technologies for …, 2008
Robust estimation and detection in ad hoc and sensor networks
T Roosta, SM Mishra, A Ghazizadeh
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 236-245, 2006
Cyber security basic defenses and attack trends
AA Cárdenas, T Roosta, G Taban, S Sastry
Homeland Security Technology Challenges, 73-101, 2008
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20