 | 2010 |
5 |  | Sankardas Roy,
Charles Ellis,
Sajjan Shiva,
Dipankar Dasgupta,
Vivek Shandilya,
Qishi Wu:
A Survey of Game Theory as Applied to Network Security.
HICSS 2010: 1-10 |
| 2009 |
4 |  | Sankardas Roy,
Mauro Conti,
Sanjeev Setia,
Sushil Jajodia:
Secure median computation in wireless sensor networks.
Ad Hoc Networks 7(8): 1448-1462 (2009) |
3 |  | Mauro Conti,
Lei Zhang,
Sankardas Roy,
Roberto Di Pietro,
Sushil Jajodia,
Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks.
Security and Communication Networks 2(2): 195-213 (2009) |
| 2007 |
2 |  | Bo Zhu,
Venkata Gopala Krishna Addada,
Sanjeev Setia,
Sushil Jajodia,
Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.
ACSAC 2007: 257-267 |
| 2006 |
1 |  | Sankardas Roy,
Sanjeev Setia,
Sushil Jajodia:
Attack-resilient hierarchical data aggregation in sensor networks.
SASN 2006: 71-82 |