SPID PUBLICATIONS
Book
- C.-T. Huang and M. G. Gouda, Hop Integrity in the Internet,
published by
Springer
in 2005.
Book Chapters
- C.-T. Huang, "Hop Integrity in Wireless
Mesh Networks," chapter of Security in Wireless Mesh
Networks, Auerbach
Publications and CRC Press, July 2008.
- R. Falk, C.-T. Huang, F. Kohlmayer, A.-F. Sui, "Security in Wireless
Mesh Networks," chapter of Wireless Mesh Networking:
Architectures, Protocols and Standards, Auerbach
Publications and CRC Press, December 2006.
Journal Articles
-
Y. Xian, C.-T. Huang, J. Cobb, "Look-Ahead Routing and Message
Scheduling in Delay-Tolerant Networks", Computer Communications,
Vol. 34, No. 18, 2011, pp. 2184-2194.
-
Y. Choi, C.-T. Huang, M. Gouda, "Stabilization of Flood Sequencing
Protocols in Sensor Networks", IEEE Transactions on
Parallel and Distributed Systems, Vol. 21, No. 7, 2010, pp. 1042-1055.
-
C.-T. Huang, J. Janies, "An Adaptive Approach to Granular Real-Time
Anomaly Detection", EURASIP Journal on Advances in Signal
Processing, Vol. 2009, 2009.
-
J. Gerdes, Jr., J. Kalvenes, C.-T. Huang, "Multi-Dimensional Credentialing Using Veiled Certificates: Protecting Privacy in the Face of Regulatory Reporting Requirements ", Computers & Security,
Vol. 28, No. 5, 2009, pp. 248-259.
-
Y. Kopylova, D. Buell, C.-T. Huang, J. Janies, "Mutual Information
Applied to Anomaly Detection", Journal of Communications
and Networks, Vol. 10, No. 1, 2008, pp. 89-97.
-
S. Xu, C.-T. Huang, M. Matthews, "Secure Multimast in WiMAX
", Journal of Networks
, Vol. 3, No. 2, 2008, pp. 48-57.
-
C.-T. Huang, S. Thareja, Y.-J. Shin, "Wavelet-based
Real Time Detection of Network Traffic Anomalies",
International Journal of Network Security, Vol. 6, No. 3, 2008, pp.
309-320.
-
C.-T. Huang, M. Matthews, M. Ginley, X. Zheng, C. Chen, M. Chang,
"Efficient and Secure Multicast in
WirelessMAN: A Cross-layer
Design", Journal of Communications Software and Systems, Vol.
3, No. 3, 2007, pp. 199-206.
-
J. Janies, C.-T. Huang, N. L. Johnson, T. Richardson, "SUMP: A Secure Unicast
Messaging Protocol for Wireless Ad Hoc Sensor Networks", International Journal of Sensor Networks,
Vol. 2, Issue 5/6, 2007.
- C.-T.
Huang, M. G. Gouda, and E. N. Elnozahy, "Convergence of IPsec in
Presence of Resets", Journal of High Speed Networks, Vol.
15, No. 2, 2006.
Refereed Conference Articles and Presentations
- J. Huang, C.-T. Huang, "Secure Mutual Authentication Protocols for Mobile
Multi-hop Relay WiMAX Networks", Proceedings
of IEEE International Conference on Communications
2011 (ICC 2011).
- Y. Xian, C.-T. Huang, J. Cobb, "Look-Ahead Routing and Message
Scheduling in Delay-Tolerant Networks", Proceedings of 35th IEEE International Conference on
Local Computer Networks (LCN 2010), October 2010.
- J. Gerdes, Jr., C.-T. Huang, "Incorporating Biometrics into Veiled
Certificates", accepted by Identity in the Information Society
Workshop 2010 (IDIS 2010).
- C.-T. Huang, D. Chuck, J. Chang, "Analysis and Enhancement of
Bandwidth Request Strategies in IEEE 802.16 Networks", Proceedings
of IEEE International Conference on Communications
2010 (ICC 2010).
- P. Kalakota, C.-T. Huang, "On the Benefits of Early Filtering of
Botnet Unwanted Traffic", Proceedings of 18th IEEE International
Conference on Computer Communications and Networks (ICCCN 2009), August
2009.
- M. Jafari-Lafti, C.-T. Huang, C. Farkas, "P2F: A
User-Centric Privacy Protection Framework", Proceedings of the
Fourth International Conference on Availability, Reliability and Security
(ARES 2009), March 2009.
- S. Xu, C.-T. Huang, M. M. Matthews, "Modeling and Analysis of
IEEE 802.16 PKM Protocols using CasperFDR", Proceedings of the 5th IEEE
International Symposium on Wireless Communication Systems (ISWCS 2008),
October 2008.
- C.-T. Huang, "LOFT: Low-Overhead Freshness Transmission in Sensor
Networks", Proceedings of 2008 IEEE International Conference on
Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2008), June
2008.
- C.-T. Huang, P. Kalakota, A. B. Alexandrov, "Improving Availability
with Adaptive Roaming Replicas in Presence of Determined DoS Attacks",
Proceedings of 50th Annual IEEE Global Telecommunications Conference
(GLOBECOM
2007), November 2007.
- Y. Xian, C.-T. Huang, "Securing VoIP Services in Multi-Hop Wireless
Mesh Networks", Proceedings of 4th IEEE International Symposium on
Wireless Communication Systems (ISWCS 2007), October 2007.
- J. Janies, C.-T. Huang, "Fates: A Granular Approach to Real-Time
Anomaly Detection", Proceedings of 16th IEEE International Conference
on Computer and Communications and Networks (ICCCN 2007), August 2007.
- T. Richardson, C.-T. Huang, "Containing
Hitlist-Based Worms with
Polymorphic Signatures", Proceedings of 16th IEEE International Conference
on Computer and Communications and Networks (ICCCN 2007), August 2007.
- X. Zheng, M. M. Matthews, C.-T. Huang, "Hierarchical Scalable Group
Key Management Based on Chinese Remainder Theorem", Proceedings of
the 6th Annual Security Conference, April 2007.
- S. Xu, C.-T. Huang, M. M. Matthews, "Secure Multicast in Various
Scenarios of WirelessMAN", to appear in the 2007 IEEE Southeast
Conference.
- X. Zheng, C.-T. Huang, M. M. Matthews, "Chinese Remainder Theorem
Based Group Key Management", to appear in the 45th ACM Southeast
Conference (ACMSE 2007).
- M. Ginley, S. Xu, C.-T. Huang, M. M. Matthews, "Efficient and Secure
Multicast in WirelessMAN", accepted by International Symposium on
Wireless Pervasive Computing 2007 (ISWPC2007).
- M. G. Gouda, J. Cobb, C.-T. Huang, "Fault Masking in Tri-Redundant Systems",
Proceedings of the 8th International Symposium on Stabilization, Safety, and
Security of Distributed Systems (SSS 2006).
- C.-T. Huang, A. B. Alexandrov, P. Kalakota,
"Roaming Data Redundancy for Assurance in Critical Data Services",
Proceedings of 2006 High
Availability and Performance Computing Workshop (HAPCW 2006).
- S. Xu, C.-T. Huang, "Attacks on PKM Protocols of IEEE 802.16 and Its
Later Versions", Proceedings of 3rd International Symposium on Wireless Communication Systems
(ISWCS 2006).
- J. Janies, N. L. Johnson, C.-T. Huang, "SUMP: A Secure Unicast
Messaging Protocol for Wireless Ad Hoc Sensor Networks",
Proceedings of
2006 IEEE
International Conference on Communications (ICC 2006).
- C.-T. Huang, N. L. Johnson, J. Janies, and A. X. Liu, "On
Capturing and Containing E-mail Worms", Proceedings
of the 25th IEEE International Performance Computing and Communications
Conference (IPCCC 2006).
- S. Xu, M. M. Matthews, C.-T. Huang, "Security Issues in
Privacy and Key Management Protocols of IEEE 802.16", Proceedings
of the 44th ACM
Southeast Conference (ACMSE 2006).
- X. Zheng, C. Chen, C.-T. Huang, M. M. Matthews, and N. Santhapuri, "A Dual Authentication Protocol for IEEE 802.11
Wireless LANs", Proceedings of the 2nd International Symposium on Wireless Communication Systems
(ISWCS
2005).
- C.-T. Huang and M. G. Gouda, "State Checksum and Its Role in
System Stabilization", Proceedings of the 4th International Workshop on
Assurance in Distributed Systems and Networks (ADSN 2005).
Posters
- S. Chaturvedi, P. Kalakota, C.-T. Huang, "Improving
Delay-Tolerant Network Performance Using Forward Routing Information",
accepted by 14th IEEE International Conference on Network Protocols (ICNP
2006).