Evolving authentication design considerations for the internet of biometric things (IoBT) N Karimian, PA Wortman, F Tehranipoor Proceedings of the eleventh IEEE/ACM/IFIP international conference on …, 2016 | 65 | 2016 |
Low-cost authentication paradigm for consumer electronics within the internet of wearable fitness tracking applications F Tehranipoor, N Karimian, PA Wortman, JA Chandy 2018 IEEE international conference on consumer electronics (ICCE), 1-6, 2018 | 29 | 2018 |
Proposing a modeling framework for minimizing security vulnerabilities in IoT systems in the healthcare domain PA Wortman, F Tehranipoor, N Karimian, JA Chandy 2017 IEEE EMBS International Conference on Biomedical & Health Informatics …, 2017 | 25 | 2017 |
DVFT: A lightweight solution for power-supply noise-based TRNG using dynamic voltage feedback tuning system F Tehranipoor, P Wortman, N Karimian, W Yan, JA Chandy IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26 (6 …, 2018 | 22 | 2018 |
P2M‐based security model: security enhancement using combined PUF and PRNG models for authenticating consumer electronic devices P Wortman, W Yan, J Chandy, F Tehranipoor IET Computers & Digital Techniques 12 (6), 289-296, 2018 | 19 | 2018 |
Exploring methods of authentication for the internet of things F Tehranipoor, N Karimian, PA Wortman, A Haque, J Fahrny, JA Chandy Internet of Things, 71-90, 2017 | 19 | 2017 |
An active storage framework for object storage devices MT Runde, WG Stevens, PA Wortman, JA Chandy 2012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST), 1-12, 2012 | 19 | 2012 |
SMART: security model adversarial risk-based tool for systems security design evaluation PA Wortman, JA Chandy Journal of Cybersecurity 6 (1), tyaa003, 2020 | 9 | 2020 |
An adversarial risk-based approach for network architecture security modeling and design PA Wortman, F Tehranipoor, JA Chandy 2018 International Conference on Cyber Security and Protection of Digital …, 2018 | 7 | 2018 |
Translation of AADL model to security attack tree (TAMSAT) to SMART evaluation of monetary security risk PA Wortman, J Chandy Information Security Journal: A Global Perspective 32 (4), 297-313, 2023 | 5 | 2023 |
A framework for evaluating security risk in system design PA Wortman, JA Chandy Discover Internet of Things 2 (1), 7, 2022 | 5 | 2022 |
Exploring the coverage of existing hardware vulnerabilities in community standards PA Wortman, F Tehranipoor, JA Chandy Silicon Valley Cybersecurity Conference, 87-97, 2020 | 5 | 2020 |
Investigation of the Internet of Things in its application to low-cost authentication within healthcare F Tehranipoor, N Karimian, PA Wortman, JA Chandy Proceedings of the IEEE-EMBS International Conference on Biomedical and …, 2017 | 5 | 2017 |
Discover Internet of Things PA Wortman, JA Chandy | | 2022 |
A trace-based study of SMB network file system workloads in an academic enterprise P Wortman, J Chandy 2020 International Symposium on Performance Evaluation of Computer and …, 2020 | | 2020 |
Framework for Design Exploration of Secure Embedded System Development PA Wortman, JA Chandy Systems Engineering in Context: Proceedings of the 16th Annual Conference on …, 2019 | | 2019 |