A survey of edge computing-based designs for IoT security K Sha, TA Yang, W Wei, S Davari Digital Communications and Networks 6 (2), 195-202, 2020 | 298 | 2020 |
On security challenges and open issues in Internet of Things K Sha, W Wei, TA Yang, Z Wang, W Shi Future generation computer systems 83, 326-337, 2018 | 294 | 2018 |
Using wireless sensor networks for fire rescue applications: Requirements and challenges K Sha, W Shi, O Watkins 2006 IEEE International Conference on Electro/Information Technology, 239-244, 2006 | 228 | 2006 |
Multipath routing techniques in wireless sensor networks: A survey K Sha, J Gehlot, R Greve Wireless personal communications 70, 807-829, 2013 | 216 | 2013 |
Modeling the lifetime of wireless sensor networks K Sha, W Shi Sensor Letters 3 (2), 126-135, 2005 | 150 | 2005 |
Enforcing privacy using symmetric random key-set in vehicular networks Y Xi, K Sha, W Shi, L Schwiebert, T Zhang Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07 …, 2007 | 132 | 2007 |
Adaptive privacy-preserving authentication in vehicular networks K Sha, Y Xi, W Shi, L Schwiebert, T Zhang 2006 First International Conference on Communications and Networking in …, 2006 | 112 | 2006 |
A secure and efficient framework to read isolated smart grid devices K Sha, N Alatrash, Z Wang IEEE Transactions on Smart Grid 8 (6), 2519-2531, 2016 | 94 | 2016 |
On sweep coverage with minimum mobile sensors J Du, Y Li, H Liu, K Sha 2010 IEEE 16th International Conference on Parallel and Distributed Systems …, 2010 | 66 | 2010 |
EdgeSec: Design of an edge layer security service to enhance IoT security K Sha, R Errabelly, W Wei, TA Yang, Z Wang 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC), 81-88, 2017 | 63 | 2017 |
WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs K Sha, J Du, W Shi International Journal of Sensor Networks 1 (3-4), 156-168, 2006 | 57 | 2006 |
SPA: A smart phone assisted chronic illness self-management system with participatory sensing K Sha, G Zhan, W Shi, M Lumley, C Wiholm, B Arnetz Proceedings of the 2nd International Workshop on Systems and Networking …, 2008 | 52 | 2008 |
An overview of access control mechanisms for internet of things M Alramadhan, K Sha 2017 26th International Conference on Computer Communication and Networks …, 2017 | 50 | 2017 |
Security in internet of things: Opportunities and challenges W Wei, AT Yang, W Shi, K Sha 2016 International Conference on Identification, Information and Knowledge …, 2016 | 44 | 2016 |
Consistency-driven data quality management of networked sensor systems K Sha, W Shi Journal of parallel and Distributed Computing 68 (9), 1207-1221, 2008 | 41 | 2008 |
Data quality challenges in cyber-physical systems K Sha, S Zeadally Journal of Data and Information Quality (JDIQ) 6 (2-3), 1-4, 2015 | 39 | 2015 |
mVideo: Edge computing based mobile video processing systems H Sun, Y Yu, K Sha, B Lou Ieee Access 8, 11615-11623, 2019 | 34 | 2019 |
Probabilistic adaptive anonymous authentication in vehicular networks Y Xi, KW Sha, WS Shi, L Schwiebert, T Zhang Journal of Computer Science and Technology 23, 916-928, 2008 | 34 | 2008 |
: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs K Sha, S Wang, W Shi IEEE Transactions on Vehicular Technology 59 (3), 1183-1190, 2010 | 33 | 2010 |
Is the nice cybersecurity workforce framework (ncwf) effective for a workforce comprising of interdisciplinary majors? J Jacob, W Wei, K Sha, S Davari, TA Yang Proceedings of the 16th International Conference on Scientific Computing …, 2018 | 28 | 2018 |