Patrick Tague
Cited by
Cited by
{SmartAuth}:{User-Centered} Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, XF Wang, B Ur, X Guo, P Tague
26th USENIX Security Symposium (USENIX Security 17), 361-378, 2017
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Mitigation of control channel jamming under node capture attacks
P Tague, M Li, R Poovendran
Network Self-Organization in the Internet of Things
AP Athreya, P Tague
IEEE International Workshop on Internet-of-Things Networking and Control …, 2013
Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types
J Han, AJ Chung, MK Sinha, M Harishankar, S Pan, HY Noh, P Zhang, ...
2018 IEEE Symposium on Security and Privacy (SP), 836-852, 2018
Modeling node capture attacks in wireless sensor networks
P Tague, R Poovendran
2008 46th annual allerton conference on communication, control, and …, 2008
Linear programming models for jamming attacks on network traffic flows
P Tague, D Slater, R Poovendran, G Noubir
2008 6th International Symposium on Modeling and Optimization in Mobile, Ad …, 2008
Is your commute driving you crazy? A study of misbehavior in vehicular platoons
B DeBruhl, S Weerakkody, B Sinopoli, P Tague
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and …, 2015
Recognizing new activities with limited training data
LT Nguyen, M Zeng, P Tague, J Zhang
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 67-74, 2015
Modeling adaptive node capture attacks in multi-hop wireless networks
P Tague, R Poovendran
Ad Hoc Networks 5 (6), 801-814, 2007
A5: Automated analysis of adversarial android applications
T Vidas, J Tan, J Nahata, CL Tan, N Christin, P Tague
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones …, 2014
Probabilistic mitigation of control channel jamming via random key distribution
P Tague, M Li, R Poovendran
2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio …, 2007
Jamming-aware traffic allocation for multiple-path routing using portfolio selection
P Tague, S Nabar, JA Ritcey, R Poovendran
IEEE/ACM Transactions On Networking 19 (1), 184-194, 2010
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
A coding-theoretic approach for efficient message verification over insecure channels
D Slater, P Tague, R Poovendran, BJ Matt
Proceedings of the second ACM conference on Wireless network security, 151-160, 2009
Designing for self-configuration and self-adaptation in the Internet of Things
AP Athreya, B DeBruhl, P Tague
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
Digital filter design for jamming mitigation in 802.15. 4 communication
B DeBruhl, P Tague
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
Convoy: Physical context verification for vehicle platoon admission
J Han, M Harishankar, X Wang, AJ Chung, P Tague
Proceedings of the 18th International Workshop on Mobile Computing Systems …, 2017
Evaluating the vulnerability of network traffic using joint security and routing analysis
P Tague, D Slater, J Rogers, R Poovendran
IEEE transactions on dependable and secure computing 6 (2), 111-123, 2008
Supporting privacy-conscious app update decisions with user reviews
Y Tian, B Liu, W Dai, B Ur, P Tague, LF Cranor
Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20