ORCID as entered in ROS

Select Publications
Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162
Ali ST; Sivaraman V; Radford A; Jha S, 2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731
Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002
Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816
Misra P; Kanhere S; Jha S; Hu W, 2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542
Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162
Ali ST; Sivaraman V; Ostry D; Tsudik G; Jha S, 2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
Ni W; Liu RP; Biswas J; Wang X; Collings IB; Jha SK, 2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973
Javali C; Revadigar G; Libman L; Jha S, 2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5
Mehmood T; Libman L; Dehkordi HR; Jha SK, 2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004
Misra P; Kottege N; Kusy B; Ostry D; Jha S, 2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, 10, http://dx.doi.org/10.1145/2529981
Ahmed N; Kanhere SS; Jha S, 2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum
Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825
Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432
Misra P; Ahmed N; Jha SK, 2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290
Tu W; Sreenan C; Chou CT; Misra A; Jha SK, 2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103
Ahmed N; Kanhere SS; Jha S, 2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913
Sivaraman V; Ostry D; Shaheen J; Hianto AJ; Jha SK, 2011, 'Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks', EURASIP Journal onWireless Communications and Networking, 2011, pp. 1 - 12, http://dx.doi.org/10.1155/2011/695171
Tan H; Zic J; Jha SK; Ostry D, 2011, 'Secure multi-hop network programming with multiple one-way key chains', IEEE Transactions on Mobile Computing, 10, pp. 16 - 31, http://dx.doi.org/10.1109/TMC.2010.140
Hu W; Bulusu N; Dang T; Taylor A; Chou CT; Jha S; Tran VN, 2010, 'Cane toad monitoring: Data reduction in a high rate application', , pp. 193 - 222, http://dx.doi.org/10.1007/978-1-4419-5834-1_7
Ahmed N; Kanhere S; Jha SK, 2010, 'A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.002/wcm.913
Ahmed N; Rutten M; Bessell T; Kanhere S; Gordon N; Jha SK, 2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83
Tan H; Hu W; Corke P; SHIH W; Jha SK, 2010, 'Toward trusted wireless sensor networks', ACM Transactions on Sensor Networks, 7, pp. 5:2 - 5:25, http://dx.doi.org/10.1145/1806895.1806900
Tan H; Ostry D; Zic J; Jha S, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09, pp. 245 - 252, http://dx.doi.org/10.1145/1514274.1514308
Hu W; Bulusu N; Chou CT; Jha SK; Tran VN; Taylor AJ, 2009, 'Design and evaluation of a hybrid sensor network for cane toad monitoring', ACM Transactions on Sensor Networks, 5
Srivastava MB; Bagchi S; Corner M; Jha SK; Krishnamachari B; Martonosi M; Poovendran R; Raghunathan A; Ramanathan R; Santi P; Rosing TS; Snoeren AC; Trappe W; Venkatasubramanian N, 2008, 'EIC Editorial', IEEE Transactions on Mobile Computing, 7, pp. 529 - 532, http://dx.doi.org/10.1109/TMC.2008.45
Hota C; Jha S; Raghurama G, 2008, 'ADAPTIVE BANDWIDTH MANAGEMENT AND QoS PROVISIONING IN IPVPNs', International Journal of Computers and Applications, 30, http://dx.doi.org/10.2316/journal.202.2008.2.202-2223
Hassan M; Das S; Mohapatra P; Perkins C, 2007, 'Wireless mesh networks', IEEE Communications Magazine, 45, pp. 62 - 63, http://dx.doi.org/10.1109/MCOM.2007.4378322
Hu W; Chou CT; Jha SK; Bulusu N, 2006, 'Deploying long-lived and cost-effective hybrid sensor networks', Ad Hoc Networks, 4, pp. 749 - 767
Sohail S; Jha SK; Kanhere S; Chou CT, 2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144
Hu W; Bulusu N; Jha SK, 2005, 'A communication paradigm for hybrid sensor/actuator networks', International Journal of Wireless Information Networks, 12, pp. 47 - 59
Moors T; Jha SK, 2005, 'Advances and directions in quality of service management.', Journal of Computer Communications, 28, pp. 1701 - 1702
Pathirana PN; Bulusu N; Savkin AV; Jha SK, 2005, 'Node localization using mobile robots in delay-tolerant sensor networks', IEEE Transactions on Mobile Computing, 4, pp. 285 - 296
Sabrina F; Nguyen C; Jha SK; Platt D; Safaei F, 2005, 'Processing resource scheduling in programmable networks', Computer Communications, 28, pp. 676 - 687
Ahmed N; Kanhere S; Jha SK, 2005, 'The holes problem in wireless sensor networks', ACM Sigmobile Mobile Computing and Communications Review, 9, pp. 4 - 18, http://dx.doi.org/10.1145/1072989.1072992
Jha SK; Fry M, 2005, 'Video decompression estimation and playout scheme over the Internet', Multimedia Tools and Applications, 25, pp. 305 - 321
Lau W; Jha S, 2004, 'Failure-Oriented Path Restoration Algorithm for Survivable Networks', IEEE Transactions on Network and Service Management, 1, pp. 11 - 20, http://dx.doi.org/10.1109/TNSM.2004.4623690
Al-Ali R; Sohail S; Rana O; Hafid A; Von Laszewski G; Amin K; Jha S; Walker D, 2004, 'Network QoS provision for distributed grid applications', International Journal of Simulation: Systems, Science and Technology, 5, pp. 13 - 28
Jha SK; Mukherjee A, 2004, 'Advances in future mobile/wireless networks and services', Computer Communications, 27, pp. 695 - 696
Hassan J; Jha SK, 2004, 'Design and Analysis of Location Management Schemes for a New light-weight Wireless Network', Computer Communications, 27(8), pp. 743 - 750
Lau CW; Jha SK, 2004, 'Failure Oriented Path Restoration Algorithm for Survivable Networks', Etransactions on Network Service and Management, 1, pp. 2 - 10
Pathirana PN; Savkin AV; Jha SK, 2004, 'Location Estimation and Trajectory Prediction for Cellular Networks with Mobile Base Stations', IEEE Transactions on Vehicular Technology, 53, pp. 1903 - 1913
Pathirana PN; Savkin AV; Jha SK, 2004, 'Robust Extended Kalman Filter Based Technique for Location Management in PCS Networks', Computer Communications, 27(5), pp. 502 - 512
Sabrina F; Jha SK, 2003, 'An Adaptive Resource Management Architecture for Active Networks', Telecommunication Systems, 24:, pp. 139 - 166
Sohail S; Jha SK, 2003, 'Bandwidth broker extension optimal resource management', Journal of Telecommunications and Information Technology, 3, pp. 77 - 82
Hassan J; Jha SK, 2003, 'Cell Hoping: A Lightweight Architecture for Wireless Communications', IEEE Wireless Communications, 10, pp. 16 - 21
Rosenbaum GF; Jha SK; Hassan M, 2003, 'Empirical Study of Traffic Trunking in Linux-Based MPLS Test-Bed', International Journal of Network Management, 13, pp. 277 - 288
Jha SK; Hassan M, 2003, 'Java Implementation of Policy-Based Bandwidth Management', International Journal of Network Management, 13, pp. 249 - 258