| A survey on trust management for mobile ad hoc networks JH Cho, A Swami, IR Chen IEEE Communications Surveys & Tutorials 13 (4), 562-583, 2011 | 515 | 2011 |
| Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection F Bao, IR Chen, MJ Chang, JH Cho IEEE Transactions on Network and Service Management 9 (2), 169-183, 2012 | 269 | 2012 |
| Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing IR Chen, F Bao, MJ Chang, JH Cho IEEE Transactions on Parallel and Distributed Systems 25 (5), 1200-1210, 2014 | 115 | 2014 |
| A Survey of Intrusion Detection Techniques for Cyber Physical Systems R Mitchell, IR Chen ACM Computing Survey 46 (4), 2014 | 113 | 2014 |
| Effect of intrusion detection and response on reliability of cyber physical systems R Mitchell, IR Chen IEEE Transactions on Reliability 62 (1), 199-210, 2013 | 99 | 2013 |
| Adaptive fault-tolerant QoS control algorithms for maximizing system lifetime of query-based wireless sensor networks IR Chen, AP Speer, M Eltoweissy IEEE Transactions on Dependable and Secure Computing 8 (2), 161-176, 2011 | 95 | 2011 |
| Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks JH Cho, A Swami, R Chen Journal of Network and Computer Applications 35 (3), 1001-1012, 2012 | 89 | 2012 |
| Trust-based intrusion detection in wireless sensor networks F Bao, IR Chen, MJ Chang, JH Cho 2011 IEEE International Conference on Communications (ICC), 1-6, 2011 | 81 | 2011 |
| A Survey of Intrusion Detection in Wireless Network Applications R Mitchell, IR Chen Computer Communications 42, 1-23, 2014 | 78 | 2014 |
| Trust management for encounter-based routing in delay tolerant networks IR Chen, F Bao, M Chang, JH Cho Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE, 1-6, 2010 | 74 | 2010 |
| Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks H Al-Hamadi, IR Chen IEEE Transactions on Network and Service Management 10 (2), 189-203, 2013 | 72 | 2013 |
| Dynamic trust management for internet of things applications F Bao, IR Chen Proceedings of the 2012 international workshop on Self-aware internet of ..., 2012 | 72 | 2012 |
| Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks JH Cho, R Chen, PG Feng IEEE Transactions on Reliability 59 (1), 231-241, 2010 | 69 | 2010 |
| Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications R Mitchell, IR Chen IEEE Transactions on Smart Grid 4 (3), 1254 - 1263, 2013 | 68 | 2013 |
| Threshold-based admission control policies for multimedia servers IR Chen, CM Chen The Computer Journal 39 (9), 757-766, 1996 | 60 | 1996 |
| Trust management for the internet of things and its application to service composition F Bao, R Chen World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012 IEEE ..., 2012 | 58 | 2012 |
| A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges Y Wang, IR Chen, DC Wang Wireless Personal Communications 80 (4), 1607-1623, 2015 | 56 | 2015 |
| Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks JH Cho, A Swami, IR Chen International Conference on Computational Science and Engineering (CSE'09) 2 ..., 2009 | 56 | 2009 |
| Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks Y Li, IR Chen IEEE Transactions on Mobile Computing 10 (3), 349-361, 2011 | 55 | 2011 |
| Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles using Behavior Rule Specifications R Mitchell, IR Chen IEEE Transactions on Systems, Man and Cybernetics 44 (5), 593-604, 2014 | 54 | 2014 |