Follow
Paul A Wortman
Paul A Wortman
Verified email at uconn.edu
Title
Cited by
Cited by
Year
Evolving authentication design considerations for the internet of biometric things (IoBT)
N Karimian, PA Wortman, F Tehranipoor
Proceedings of the eleventh IEEE/ACM/IFIP international conference on …, 2016
652016
Low-cost authentication paradigm for consumer electronics within the internet of wearable fitness tracking applications
F Tehranipoor, N Karimian, PA Wortman, JA Chandy
2018 IEEE international conference on consumer electronics (ICCE), 1-6, 2018
292018
Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain
PA Wortman, F Tehranipoor, N Karimian, JA Chandy
2017 IEEE EMBS International Conference on Biomedical & Health Informatics …, 2017
252017
DVFT: A lightweight solution for power-supply noise-based TRNG using dynamic voltage feedback tuning system
F Tehranipoor, P Wortman, N Karimian, W Yan, JA Chandy
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (6 …, 2018
222018
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices
P Wortman, W Yan, J Chandy, F Tehranipoor
IET Computers & Digital Techniques 12 (6), 289-296, 2018
192018
Exploring methods of authentication for the internet of things
F Tehranipoor, N Karimian, PA Wortman, A Haque, J Fahrny, JA Chandy
Internet of Things, 71-90, 2017
192017
An active storage framework for object storage devices
MT Runde, WG Stevens, PA Wortman, JA Chandy
2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-12, 2012
192012
SMART: security model adversarial risk-based tool for systems security design evaluation
PA Wortman, JA Chandy
Journal of Cybersecurity 6 (1), tyaa003, 2020
92020
An adversarial risk-based approach for network architecture security modeling and design
PA Wortman, F Tehranipoor, JA Chandy
2018 International Conference on Cyber Security and Protection of Digital …, 2018
72018
Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk
PA Wortman, J Chandy
Information Security Journal: A Global Perspective 32 (4), 297-313, 2023
52023
A framework for evaluating security risk in system design
PA Wortman, JA Chandy
Discover Internet of Things 2 (1), 7, 2022
52022
Exploring the coverage of existing hardware vulnerabilities in community standards
PA Wortman, F Tehranipoor, JA Chandy
Silicon Valley Cybersecurity Conference, 87-97, 2020
52020
Investigation of the Internet of Things in its application to low-cost authentication within healthcare
F Tehranipoor, N Karimian, PA Wortman, JA Chandy
Proceedings of the IEEE-EMBS International Conference on Biomedical and …, 2017
52017
Discover Internet of Things
PA Wortman, JA Chandy
2022
A trace-based study of SMB network file system workloads in an academic enterprise
P Wortman, J Chandy
2020 International Symposium on Performance Evaluation of Computer and …, 2020
2020
Framework for Design Exploration of Secure Embedded System Development
PA Wortman, JA Chandy
Systems Engineering in Context: Proceedings of the 16th Annual Conference on …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–16