The following papers have been provided as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders. These works may not be reposted without the explicit permission of the copyright holder.

 

Journal Papers
  • K. Bian, J. Park, L. Chen, and X. Li, "Addressing the hidden terminal problem for heterogeneous coexistence between TDM and CSMA networks in white space," IEEE Transactions on Vehicular Technology , to appear. (PDF)
  • B. Gao, J. Park, and Y. Yang, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks," IEEE Transactions on Mobile Computing, to appear. (PDF)
  • J. Park, J. Reed, L. Beex, T.C. Clancy, V. Kumar, and B. Bahrak, "Security and Enforcement in Spectrum Sharing (invited paper)," Proceedings of the IEEE, vol. 102, issue 3, 2014, pp. 270-281. (PDF)
  • B. Bahrak and J. Park, "Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems," IEEE Transactions on Wireless Communication, vol. 13, issue 3, 2014, pp. 1298-1307. (PDF)
  • F. Belanger, R. E. Crossler, J. S. Hiller, J. Park, and M. Hsiao, "POCKET: A Tool for Protecting Children’s Privacy Online," Elsevier Decision Support Systems, vol. 54, issue 2, 2013, pp. 1161-1173. (PDF)
  • K. Bian and J. Park, "Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks," IEEE Transactions on Mobile Computing, vol. 12, no. 7, July 2013, pp. 1294-1307. (PDF)
  • K. Bian, J. Park, X. Du, and X. Li, "Enabling fair spectrum sharing: Mitigating selfish misbehaviors in spectrum contention," IEEE Network, May/June 2013, pp. 16-21. (PDF)
  • B. Bahrak and J. Park, "Security of spectrum learning in cognitive radios," SK Telecom Telecommunications Review, Vol. 22, Issue 6, Dec. 2012, pp. 850-864. (PDF)
  • B. Gao, J. Park, Y. Yang, and S. Roy, "A taxonomy of coexistence mechanisms for heterogeneous cognitive radio networks operating in TV white spaces," IEEE Wireless Communications, Vol. 19, Issue 4, 2012, pp. 41-48. (PDF)
  • R. Chen, J. Park, and K. Bian, "Robustness against Byzantine failures in distributed spectrum sensing," Elsevier Computer Communications, Vol. 35, Issue 17, Oct 2012, pp. 2115-2124. (PDF)
  • B. Bahrak, A. Deshpande, and J. Park, "Spectrum access policy reasoning for policy-based cognitive radios," Computer Networks, Vol. 56, Issue 11, July 2012, pp. 2649-2663. (PDF)
  • J. H. Reed, J. T. Bernhard, and J. Park, "Spectrum Access Technologies: The Past, the Present, and the Future," Proceedings of the IEEE, Vol. 100, Special Centennial Issue, May 2012, pp. 1676-1684. (PDF)
  • K. Bian, J. Park, and R. Chen, "Control channel establishment in cognitive radio networks using channel hopping," IEEE Journal on Selected Areas in Communications, Vol. 29, No. 4, April, 2011. (PDF)
  • A. B. MacKenzie, J. H. Reed, P. Athanas, C. W. Bostian, R. M. Buehrer, L. A. DaSilva, S. Ellingson, Y. T. Hou, M. Hsiao, J. Park, C. Patterson, S. Raman, and C. da Silva, "Cognitive Radio and Networking Research at Virginia Tech," Proc. of the IEEE, Vol. 97, No. 4, Apr. 2009, pp. 660-688, Apr. 2009. (PDF)
  • J. Hiller, F. Belanger, M. Hsiao, and J. Park, "POCKET Protection," American Business Law Journal, Vol. 45, Issue 3, 2008, pp. 417-453.
  • R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine Special Issue on Cognitive Radio Communications, Apr. 2008. (PDF)
  • R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications, Vol. 26, No. 1, Jan. 2008. (PDF)
  • A. Patcha and J.-M. Park, “Network Anomaly Detection with Incomplete Audit Data,” Elsevier Computer Networks, Vol. 51, Issue 13, 2007, pp. 3935–3955. (PDF)
  • A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: existing solutions and latest technological trends,” Elsevier Computer Networks, Vol. 51, Issue 12, 2007, pp. 3448–3470. (PDF)
  • M. Chorzempa, J.-M. Park, and M. Eltoweissy, "Key management for long lived sensor networks in hostile environments," Elsevier Computer Communications, Vol. 30, Issue 9, June 2007, pp. 1964–1979. (PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "A divide-and-conquer strategy for thwarting distributed denial-of-service attacks," IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 5, May 2007, pp. 577--588. (PDF)
  • A. Patcha and J.-M. Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," International Journal of Network Security, Vol. 2, No. 2, Mar. 2006, pp. 146--152. (PDF)
  • J.-M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Transactions on Information and System Security, Vol. 6, No. 2, May. 2003, pp. 258--285. (PDF)

Papers in Conference/Workshop Proceedings
  • B. Bahrak, S. Bhattarai, A. Ullah, J. Park, J. Reed, and D. Gurney, "Protecting the primary users' operational privacy in spectrum sharing," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), April 2014. This paper was awarded the Best Paper Award. (PDF)
  • B. Gao, J. Park, and Y. Yang, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks," IEEE Transactions on Mobile Computing, to appear. (PDF)
  • J. Park, J. Reed, L. Beex, T.C. Clancy, V. Kumar, and B. Bahrak, "Security and Enforcement in Spectrum Sharing (invited paper)," Proceedings of the IEEE, vol. 102, issue 3, 2014, pp. 270-281. (PDF)
  • B. Bahrak and J. Park, "Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems," IEEE Transactions on Wireless Communication, vol. 13, issue 3, 2014, pp. 1298-1307. (PDF)
  • B. Gao, Y. Yang, and J. Park, "A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks," 2014 IEEE Int’l Conference on Computer Communications (INFOCOM), April-May, 2014. (PDF)
  • V. Kumar, J. Park, T. C. Clancy, K. Bian, "PHY-layer authentication using hierarchical modulation and duobinary signaling," 2014 International Conference on Computing, Networking, and Communications (ICNC), Feb. 2014. (PDF)
  • J. Thakkar, D. Ali, J. Park, and S. Moon, "Securing a distributed policy-based cognitive radio," 2014 ACM Int’l Conference on Ubiquitous Information Management and Communication (IMCOM), Jan. 2014. (PDF)
  • K. Bian, J. Park, X. Du, and X. Li, "Ecology-inspired coexistence of heterogeneous wireless networks," 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, USA, Dec. 2013. (PDF)
  • V. Kumar, J. Park, T. C. Clancy, and K. Bian, "PHY-Layer authentication by introducing controlled inter symbol interference," IEEE Conference on Communications and Network Security (CNS), Washington, D.C., Oct., 2013. (PDF)
  • B. Bahrak, J. Park, and H. Wu, "Ontology-based spectrum access policies for policy-based cognitive radios," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Oct. 2012. (PDF)
  • D. Ali, J. Park, and A. Amanna, "A feature partitioning approach to case-based reasoning in cognitive radios," International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), July 2013. (PDF)
  • B. Gao, Y. Yang, and J. Park, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum," 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), Mar. 2012. (PDF)
  • B. Gao, Y. Yang, and J. Park, "Channel aggregation in cognitive radio networks with practical considerations,"IEEE International Conference on Communications (ICC), June. 2011. (PDF)
  • K. Bian and J. Park, "Asynchronous channel hopping for establishing rendezvous in cognitive radio networks,"IEEE INFOCOM Mini-Conference, Apr. 2011. (PDF)
  • B. Bahrak, A. Deshpande, M. Whitaker, and J. Park, "BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams," IEEE Int'l Dynamic Spectrum Access Networks Symposium (DySPAN), Apr. 2010. (PDF)
  • K. Bian and J. Park, "Addressing the hidden incumbent problem in 802.22 networks," SDR '09 Technical Conference, Dec. 2009. (PDF)
  • B. Bahrak, A. Deshpande, and J. Park, "A policy reasoner for policy-based dynamic spectrum access," SDR '09 Technical Conference, Dec. 2009. (PDF)
  • K. Bian, J. Park and R. Chen, "A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks," The 15th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2009), September 2009. (PDF)
  • K. Bian and J. Park, "A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs," The 18th IEEE International Conference on Computer Communications and Networks (ICCCN 2009), August 2009. (PDF)
  • S. Xiao, J. Park, and Y, Ye, "Tamper Resistance for Software Defined Radio Software," The 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), July 2009. (PDF)
  • K. Bian, J. Park, M. Hsiao, F. Belanger, and J. Hiller, "Evaluation of Online Resources in Assisting Phishing Detection," The 9th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2009), July 2009. (PDF)
  • K. Bian and J.-M. Park, "Security Vulnerabilities in IEEE 802.22," The Fourth International Wireless Internet Conference (WICON 2008), Nov. 2008. (PDF)
  • R. Chen, J.-M. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," IEEE Infocom 2008 mini-conference, Apr. 2008. (PDF)
  • K. Bian and J.-M. Park, "Segment-Based Channel Assignment in Cognitive Radio Ad Hoc Networks," ICST Second International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), August 2007. (PDF)
  • M. Snow and J.-M. Park, Link Layer Traceback in Ethernet Networks," Proc. of the IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), June 2007. (PDF)
  • R. Chen, J.-M. Park, and M. Snow, "CARE: Enhancing denial-of-service resilience in mobile ad hoc networks," Proc. of the International Conference on Computer Communications and Networks (ICCCN '06), Oct. 2006.(PDF)
  • A. Patcha and J.-M. Park, "An adaptive sampling algorithm with applications to denial-of-service attack detection," Proc. of the International Conference on Computer Communications and Networks (ICCCN '06), Oct. 2006. (PDF)
  • K. Bian, J.-M. Park, and R. Chen, "Stasis trap: Cross-layer stealthy attacks in wireless ad hoc networks," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006.(PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "RIM: Router interface marking for IP traceback," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006.(PDF)
  • R. Chen, M. Snow, J.-M. Park, M.T. Refaei, and M. Eltoweissy, "Defending against routing disruption attacks in mobile ad hoc networks," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006.(PDF)
  • R. Chen and J.-M. Park, "Ensuring trustworthy spectrum sensing in cognitive radio networks," IEEE Workshop on Networking Technologies for Software Defined Radio Networks (held in conjunction with IEEE SECON 2006), Sep. 2006. (PDF)
  • K. Bian and J.-M. Park, "MAC-layer misbehaviors in multi-hop cognitive radio networks," 2006 US - Korea Conference on Science, Technology, and Entrepreneurship (UKC2006), Aug. 2006. (PDF)
  • R. Chen and J.-M. Park, "Attack Diagnosis: Throttling distributed denial-of-service attacks close to the attack sources," IEEE Int'l Conference on Computer Communications and Networks (ICCCN'05), Oct. 2005 (PDF)
  • A. Patcha and J.-M. Park, "Detecting denial-of-service attacks with incomplete audit data," IEEE Int'l Conference on Computer Communications and Networks (ICCCN'05), Oct. 2005. (PDF)
  • T. McNevin, J-M Park, and R Marchany, "Chained Puzzles: A novel framework for IP-layer client puzzles," IEEE International Conference on Wireless Networks, Communications, and Mobile Computing (WirelessCom), June 2005.
  • C. Hager, S. Midkiff, J-M Park, and T. Martin, "Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants," 3rd Annual IEEE International Conference on Pervasive Computing and Comunications (PerCom 2005), Mar. 2005. (PDF)
  • M. Chorzempa, J.-M. Park,, and M. Eltoweissy, "SECK: Survivable and efficient clustered keying for wireless sensor networks," IEEE Workshop on Information Assurance in Wireless Sensor Networks (WSNIA 2005), Apr. 2005. (PDF)
  • A. Patcha and J.-M. Park,"A game theoretic approach to modeling intrusion detection in mobile ad hoc networks," 2004 IEEE Workshop on Information Assurance and Security, June 2004. (PDF)
  • J.-M. Park, E. K. P. Chong, H. J. Siegel, and I. Ray, "Constructing fair-exchange protocols for e-commerce via distributed computation of RSA signatures," 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), July 2003. (PDF)
  • J.-M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast packet authentication using signature amortization," IEEE Symposium on Security and Privacy, May 2002, pp. 227--240. (PDF)

Book/Book Chapters
  • J. Park and K. Bian, "Security of Cognitive Radios," in Encyclopedia of Cryptography and Security, Second Edition, Henk C. A. van Tilborg and Sushil Jajodia (Eds.), Springer, 2011.
  • J. Park, K. Bian, and R. Chen, "Cognitive Radio Network Security," in Cognitive Radio Communications and Networks: Principles and Practice, A. Wyglinski, M. Nekovee, and T. Hou (Eds.), Elsevier, Dec. 2009.
  • F. Belanger, R. Crossler, J. Hiller, J. Park, and M. Hsiao, "Children online privacy: Issues with parental awareness and control," in Annals of Emerging Research in Information Assurance, Security and Privacy Services, H.R. Rao and S. Upadhyaya (Eds.), Vol. 4, Emerald Group Publishing, 2009, pp. 311-333.
  • M. Chorzempa, J.-M. Park, M. Eltoweissy and T. Hou, "Key management for wireless sensor networks in hostile environments" in Security in Sensor Networks, Yang Xiao, Ed., CRC Press, 2006

Technical Reports
  • B. Bahrak and J.-M. Park, "Coexistence decision making for spectrum sharing among heterogeneous wireless systems in TV whitespace," Technical Report TR-ECE-13-12, Dept. of Electrical and Computer Engineering, Virginia Tech, December 2013. (PDF)
  • B. Bahrak and J.-M. Park, "Location privacy of primary users in geolocation database-driven spectrum sharing," Technical Report TR-ECE-13-11, Dept. of Electrical and Computer Engineering, Virginia Tech, November 2013. (PDF)
  • R. Chen, J.-M. Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Technical Report TR-ECE-06-07, Dept. of Electrical and Computer Engineering, Virginia Tech, July 2006. (PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "TRACK: A novel approach for defending against distributed denial-of-service attacks," Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech, Feb. 2006. (PDF)
  • R. Chen, M. Snow, J.-M. Park, M. T. Refaei, M. Eltoweissy, "Defense against Routing Disruption Denial-of-Service Attacks in Mobile Ad Hoc Networks," Technical Report TR-ECE-05-11, Dept. of Electrical and Computer Engineering, Virginia Tech, Nov. 2005. (PDF)
  • T. J. McNevin, J.-M. Park, and R. Marchany,"pTCP: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks," Technical Report TR-ECE-04-10, Dept. of Electrical and Computer Engineering, Virginia Tech, Oct. 2004. (PDF)



2014
  • K. Bian, J. Park, L. Chen, and X. Li, "Addressing the hidden terminal problem for heterogeneous coexistence between TDM and CSMA networks in white space," IEEE Transactions on Vehicular Technology , to appear. (PDF)
  • B. Bahrak, S. Bhattarai, A. Ullah, J. Park, J. Reed, and D. Gurney, "Protecting the primary users' operational privacy in spectrum sharing," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), April 2014. This paper was awarded the Best Paper Award. (PDF)
  • B. Gao, J. Park, and Y. Yang, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks," IEEE Transactions on Mobile Computing, to appear. (PDF)
  • J. Park, J. Reed, L. Beex, T.C. Clancy, V. Kumar, and B. Bahrak, "Security and Enforcement in Spectrum Sharing (invited paper)," Proceedings of the IEEE, vol. 102, issue 3, 2014, pp. 270-281. (PDF)
  • B. Bahrak and J. Park, "Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems," IEEE Transactions on Wireless Communication, vol. 13, issue 3, 2014, pp. 1298-1307. (PDF)
  • B. Gao, Y. Yang, and J. Park, "A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks," 2014 IEEE Int’l Conference on Computer Communications (INFOCOM), April-May, 2014. (PDF)
  • V. Kumar, J. Park, T. C. Clancy, K. Bian, "PHY-layer authentication using hierarchical modulation and duobinary signaling," 2014 International Conference on Computing, Networking, and Communications (ICNC), Feb. 2014. (PDF)
  • J. Thakkar, D. Ali, J. Park, and S. Moon, "Securing a distributed policy-based cognitive radio," 2014 ACM Int’l Conference on Ubiquitous Information Management and Communication (IMCOM), Jan. 2014. (PDF)
2013
  • V. Kumar, J. Park, T. C. Clancy, and K. Bian, "PHY-Layer authentication by introducing controlled inter symbol interference," IEEE Conference on Communications and Network Security (CNS), Washington, D.C., Oct., 2013. (PDF)
  • K. Bian, J. Park, X. Du, and X. Li, "Ecology-inspired coexistence of heterogeneous wireless networks," 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, USA, Dec. 2013. (PDF)
  • D. Ali, J. Park, and A. Amanna, "A feature partitioning approach to case-based reasoning in cognitive radios," International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), July 2013. (PDF)
  • F. Belanger, R. E. Crossler, J. S. Hiller, J. Park, and M. Hsiao, "POCKET: A Tool for Protecting Children’s Privacy Online," Elsevier Decision Support Systems, vol. 54, issue 2, 2013, pp. 1161-1173. (PDF)
  • K. Bian and J. Park, "Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks," IEEE Transactions on Mobile Computing, vol. 12, no. 7, July 2013, pp. 1294-1307. (PDF)
  • K. Bian, J. Park, X. Du, and X. Li, "Enabling fair spectrum sharing: Mitigating selfish misbehaviors in spectrum contention," IEEE Network, May/June 2013, pp. 16-21. (PDF)
2012
  • B. Bahrak, J. Park, and H. Wu, "Ontology-based spectrum access policies for policy-based cognitive radios," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Oct. 2012. (PDF)
  • B. Bahrak and J. Park, "Security of spectrum learning in cognitive radios," SK Telecom Telecommunications Review, Vol. 22, Issue 6, Dec. 2012, pp. 850-864. (PDF)
  • B. Gao, J. Park, Y. Yang, and S. Roy, "A taxonomy of coexistence mechanisms for heterogeneous cognitive radio networks operating in TV white spaces," IEEE Wireless Communications, Vol. 19, Issue 4, 2012, pp. 41-48. (PDF)
  • R. Chen, J. Park, and K. Bian, "Robustness against Byzantine failures in distributed spectrum sensing," Elsevier Computer Communications, Vol. 35, Issue 17, Oct 2012, pp. 2115-2124. (PDF)
  • B. Bahrak, A. Deshpande, and J. Park, "Spectrum access policy reasoning for policy-based cognitive radios," Computer Networks, Vol. 56, Issue 11, July 2012, pp. 2649-2663. (PDF)
  • J. H. Reed, J. T. Bernhard, and J. Park, "Spectrum Access Technologies: The Past, the Present, and the Future," Proceedings of the IEEE, Vol. 100, Special Centennial Issue, May 2012, pp. 1676-1684. (PDF)
  • B. Gao, Y. Yang, and J. Park, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum," 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), Mar. 2012. (PDF)

2011
  • B. Gao, Y. Yang, and J. Park, "Channel aggregation in cognitive radio networks with practical considerations,"IEEE International Conference on Communications (ICC), June. 2011. (PDF)
  • K. Bian and J. Park, "Asynchronous channel hopping for establishing rendezvous in cognitive radio networks,"IEEE INFOCOM Mini-Conference, Apr. 2011. (PDF)
  • K. Bian, J. Park, and R. Chen, "Control channel establishment in cognitive radio networks using channel hopping," IEEE Journal on Selected Areas in Communications, Vol. 29, No. 4, April, 2011. (PDF)
  • J. Park and K. Bian, "Security of Cognitive Radios," in Encyclopedia of Cryptography and Security, Second Edition, Henk C. A. van Tilborg and Sushil Jajodia (Eds.), Springer, 2011.

2010
  • B. Bahrak, A. Deshpande, M. Whitaker, and J. Park, "BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams," IEEE Int'l Dynamic Spectrum Access Networks Symposium (DySPAN), Apr. 2010. (PDF)

2009
  • F. Belanger, R. Crossler, J. Hiller, J. Park, and M. Hsiao, "Children online privacy: Issues with parental awareness and control," in Annals of Emerging Research in Information Assurance, Security and Privacy Services, H.R. Rao and S. Upadhyaya (Eds.), Vol. 4, Emerald Group Publishing, 2009, pp. 311-333.
  • J. Park, K. Bian, and R. Chen, "Cognitive Radio Network Security," in Cognitive Radio Communications and Networks: Principles and Practice, A. Wyglinski, M. Nekovee, and T. Hou (Eds.), Elsevier, Dec. 2009.
  • K. Bian and J. Park, "Addressing the hidden incumbent problem in 802.22 networks," SDR '09 Technical Conference, Dec. 2009. (PDF)
  • B. Bahrak, A. Deshpande, and J. Park, "A policy reasoner for policy-based dynamic spectrum access," SDR '09 Technical Conference, Dec. 2009. (PDF)
  • K. Bian, J. Park and R. Chen, "A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks," The 15th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2009), September 2009. (PDF)
  • K. Bian and J. Park, "A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs," The 18th IEEE International Conference on Computer Communications and Networks (ICCCN 2009), August 2009. (PDF)
  • S. Xiao, J. Park, and Y, Ye, "Tamper Resistance for Software Defined Radio Software," The 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), July 2009. (PDF)
  • K. Bian, J. Park, M. Hsiao, F. Belanger, and J. Hiller, "Evaluation of Online Resources in Assisting Phishing Detection," The 9th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2009), July 2009. (PDF)
  • A. B. MacKenzie, J. H. Reed, P. Athanas, C. W. Bostian, R. M. Buehrer, L. A. DaSilva, S. Ellingson, Y. T. Hou, M. Hsiao, J. Park, C. Patterson, S. Raman, and C. da Silva, "Cognitive Radio and Networking Research at Virginia Tech," Proc. of the IEEE, Vol. 97, No. 4, Apr. 2009, pp. 660-688, Apr. 2009. (PDF)

2008
  • J. Hiller, F. Belanger, M. Hsiao, and J. Park, "POCKET Protection," American Business Law Journal, Vol. 45, Issue 3, 2008, pp. 417-453.
  • K. Bian and J.-M. Park, "Security Vulnerabilities in IEEE 802.22," The Fourth International Wireless Internet Conference (WICON 2008), Nov. 2008. (PDF)
  • R. Chen, J.-M. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," IEEE Infocom 2008 mini-conference, Apr. 2008. (PDF)
  • R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine Special Issue on Cognitive Radio Communications, Apr. 2008. (PDF)
  • R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications, Vol. 26, No. 1, Jan. 2008. (PDF)

2007
  • K. Bian and J.-M. Park, "Segment-Based Channel Assignment in Cognitive Radio Ad Hoc Networks," ICST Second International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), August 2007. (PDF)
  • M. Snow and J.-M. Park, Link Layer Traceback in Ethernet Networks," Proc. of the IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), June 2007. (PDF)
  • A. Patcha and J.-M. Park, “Network Anomaly Detection with Incomplete Audit Data,” Elsevier Computer Networks, Vol. 51, Issue 13, 2007, pp. 3935–3955. (PDF)
  • A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: existing solutions and latest technological trends,” Elsevier Computer Networks, Vol. 51, Issue 12, 2007, pp. 3448–3470. (PDF)
  • M. Chorzempa, J.-M. Park, and M. Eltoweissy, "Key management for long lived sensor networks in hostile environments," Elsevier Computer Communications, Vol. 30, Issue 9, June 2007, pp. 1964–1979. (PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "A divide-and-conquer strategy for thwarting distributed denial-of-service attacks," IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 5, May 2007, pp. 577--588. (PDF)

2006
  • R. Chen, J.-M. Park, and M. Snow, "CARE: Enhancing denial-of-service resilience in mobile ad hoc networks," Proc. of the International Conference on Computer Communications and Networks (ICCCN '06), Oct. 2006. (PDF)
  • A. Patcha and J.-M. Park, "An adaptive sampling algorithm with applications to denial-of-service attack detection," Proc. of the International Conference on Computer Communications and Networks (ICCCN '06), Oct. 2006. (PDF)
  • K. Bian, J.-M. Park, and R. Chen, "Stasis trap: Cross-layer stealthy attacks in wireless ad hoc networks," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006. (PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "RIM: Router interface marking for IP traceback," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006. (PDF)
  • R. Chen, M. Snow, J.-M. Park, M.T. Refaei, and M. Eltoweissy, "Defending against routing disruption attacks in mobile ad hoc networks," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006. (PDF)
  • R. Chen and J.-M. Park, "Ensuring trustworthy spectrum sensing in cognitive radio networks," IEEE Workshop on Networking Technologies for Software Defined Radio Networks (held in conjunction with IEEE SECON 2006), Sep. 2006. (PDF)
  • K. Bian and J.-M. Park, "MAC-layer misbehaviors in multi-hop cognitive radio networks," 2006 US - Korea Conference on Science, Technology, and Entrepreneurship (UKC2006), Aug. 2006. (PDF)
  • A. Patcha and J.-M. Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," International Journal of Network Security, Vol. 2, No. 2, Mar. 2006, pp. 146--152. (PDF)
  • M. Chorzempa, J.-M. Park, M. Eltoweissy and T. Hou, "Key management for wireless sensor networks in hostile environments" in Security in Sensor Networks, Yang Xiao, Ed., CRC Press, 2006

2005
  • R. Chen, M. Snow, J.-M. Park, M. T. Refaei, M. Eltoweissy, "Defense against Routing Disruption Denial-of-Service Attacks in Mobile Ad Hoc Networks," Technical Report TR-ECE-05-11, Dept. of Electrical and Computer Engineering, Virginia Tech, Nov. 2005. (PDF)
  • R. Chen and J.-M. Park, "Attack Diagnosis: Throttling distributed denial-of-service attacks close to the attack sources," IEEE Int'l Conference on Computer Communications and Networks (ICCCN'05), Oct. 2005 (PDF)
  • A. Patcha and J.-M. Park, "Detecting denial-of-service attacks with incomplete audit data," IEEE Int'l Conference on Computer Communications and Networks (ICCCN'05), Oct. 2005. (PDF)
  • T. McNevin, J.-M. Park, and R Marchany, "Chained Puzzles: A novel framework for IP-layer client puzzles," IEEE International Conference on Wireless Networks, Communications, and Mobile Computing (WirelessCom), June 2005.
  • C. Hager, S. Midkiff, J.-M. Park, and T. Martin, "Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants," 3rd Annual IEEE International Conference on Pervasive Computing and Comunications (PerCom 2005), Mar. 2005. (PDF)
  • M. Chorzempa, J.-M. Park,, and M. Eltoweissy, "SECK: Survivable and efficient clustered keying for wireless sensor networks," IEEE Workshop on Information Assurance in Wireless Sensor Networks (WSNIA 2005), Apr. 2005. (PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "TRACK: A novel approach for defending against distributed denial-of-service attacks," Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech, Feb. 2006. (PDF)

2004
  • A. Patcha and J.-M. Park,"A game theoretic approach to modeling intrusion detection in mobile ad hoc networks," 2004 IEEE Workshop on Information Assurance and Security, June 2004. (PDF)
  • T. J. McNevin, J.-M. Park, and R. Marchany,"pTCP: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks," Technical Report TR-ECE-04-10, Dept. of Electrical and Computer Engineering, Virginia Tech, Oct. 2004. (PDF)

2003
  • J.-M. Park, E. K. P. Chong, H. J. Siegel, and I. Ray, "Constructing fair-exchange protocols for e-commerce via distributed computation of RSA signatures," 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), July 2003. (PDF)
  • J.-M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Transactions on Information and System Security, Vol. 6, No. 2, May. 2003, pp. 258--285. (PDF)

2002
  • J.-M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast packet authentication using signature amortization," IEEE Symposium on Security and Privacy, May 2002, pp. 227--240. (PDF)


Applied Cryptography
  • C. Hager, S. Midkiff, J.-M. Park, and T. Martin, "Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants," 3rd Annual IEEE International Conference on Pervasive Computing and Comunications (PerCom 2005), Mar. 2005. (PDF)
  • J.-M. Park, E. K. P. Chong, H. J. Siegel, and I. Ray, "Constructing fair-exchange protocols for e-commerce via distributed computation of RSA signatures," 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), July 2003. (PDF)

Authentication Algorithms and Protocols
  • V. Kumar, J. Park, T. C. Clancy, and K. Bian, "PHY-Layer authentication by introducing controlled inter symbol interference," IEEE Conference on Communications and Network Security (CNS), Washington, D.C., Oct., 2013. (PDF)
  • V. Kumar, J. Park, T. C. Clancy, K. Bian, "PHY-layer authentication using hierarchical modulation and duobinary signaling," 2014 International Conference on Computing, Networking, and Communications (ICNC), Feb. 2014. (PDF)
  • J.-M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Transactions on Information and System Security, Vol. 6, No. 2, May. 2003, pp. 258--285. (PDF)
  • J.-M. Park, E. K. P. Chong, and H. J. Siegel, "Efficient multicast packet authentication using signature amortization," IEEE Symposium on Security and Privacy, May 2002, pp. 227--240. (PDF)

DDoS Attack Mitigation
  • R. Chen, J.-M. Park, and R. Marchany, "A divide-and-conquer strategy for thwarting distributed denial-of-service attacks," IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 5, May 2007, pp. 577--588. (PDF)
  • R. Chen and J.-M. Park, "Attack Diagnosis: Throttling distributed denial-of-service attacks close to the attack sources," IEEE Int'l Conference on Computer Communications and Networks (ICCCN'05), Oct. 2005 (PDF)
  • T. McNevin, J.-M. Park, and R Marchany, "Chained Puzzles: A novel framework for IP-layer client puzzles," IEEE International Conference on Wireless Networks, Communications, and Mobile Computing (WirelessCom), June 2005.
  • T. J. McNevin, J-M Park, and R. Marchany,"pTCP: A Client Puzzle Protocol For Defending Against Resource Exhaustion Denial of Service Attacks," Technical Report TR-ECE-04-10, Dept. of Electrical and Computer Engineering, Virginia Tech, Oct. 2004. (PDF)

Intrusion Detection
  • A. Patcha and J.-M. Park, “Network Anomaly Detection with Incomplete Audit Data,” Elsevier Computer Networks, Vol. 51, Issue 13, 2007, pp. 3935–3955. (PDF)
  • A. Patcha and J.-M. Park, “An overview of anomaly detection techniques: existing solutions and latest technological trends,” Elsevier Computer Networks, Vol. 51, Issue 12, 2007, pp. 3448–3470. (PDF)
  • A. Patcha and J.-M. Park, "An adaptive sampling algorithm with applications to denial-of-service attack detection," Proc. of the International Conference on Computer Communications and Networks (ICCCN '06), Oct. 2006. (PDF)
  • A. Patcha and J.-M. Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," International Journal of Network Security, Vol. 2, No. 2, Mar. 2006, pp. 146--152. (PDF)
  • A. Patcha and J.-M. Park, "Detecting denial-of-service attacks with incomplete audit data," IEEE Int'l Conference on Computer Communications and Networks (ICCCN'05), Oct. 2005. (PDF)
  • A. Patcha and J.-M. Park,"A game theoretic approach to modeling intrusion detection in mobile ad hoc networks," 2004 IEEE Workshop on Information Assurance and Security, June 2004. (PDF)

Network Attack Traceback
  • M. Snow and J.-M. Park, Link Layer Traceback in Ethernet Networks," Proc. of the IEEE Workshop on Local and Metropolitan Area Networks (LANMAN), June 2007. (PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "RIM: Router interface marking for IP traceback," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006.(PDF)
  • R. Chen, J.-M. Park, and R. Marchany, "TRACK: A novel approach for defending against distributed denial-of-service attacks," Technical Report TR-ECE-06-02, Dept. of Electrical and Computer Engineering, Virginia Tech, Feb. 2006. (PDF)

Sensor Network Security
  • M. Chorzempa, J.-M. Park, and M. Eltoweissy, "Key management for long lived sensor networks in hostile environments," Elsevier Computer Communications, Vol. 30, Issue 9, June 2007, pp. 1964–1979. (PDF)
  • M. Chorzempa, J.-M. Park, and M. Eltoweissy, "SECK: Survivable and efficient clustered keying for wireless sensor networks," IEEE Workshop on Information Assurance in Wireless Sensor Networks (WSNIA 2005), Apr. 2005. (PDF)
  • M. Chorzempa, J.-M. Park, M. Eltoweissy and T. Hou, "Key management for wireless sensor networks in hostile environments" in Security in Sensor Networks, Yang Xiao, Ed., CRC Press, 2006

Ad hoc Network Security
  • R. Chen, J.-M. Park, and M. Snow, "CARE: Enhancing denial-of-service resilience in mobile ad hoc networks," Proc. of the International Conference on Computer Communications and Networks (ICCCN '06), Oct. 2006. (PDF)
  • K. Bian, J.-M. Park, and R. Chen, "Stasis trap: Cross-layer stealthy attacks in wireless ad hoc networks," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006. (PDF)
  • R. Chen, M. Snow, J.-M. Park, M.T. Refaei, and M. Eltoweissy, "Defending against routing disruption attacks in mobile ad hoc networks," IEEE Global Telecommunications Conference (GLOBECOM '06), Nov.-Dec. 2006.(PDF)
  • R. Chen, M. Snow, J.-M. Park, M. T. Refaei, M. Eltoweissy, "Defense against Routing Disruption Denial-of-Service Attacks in Mobile Ad Hoc Networks," Technical Report TR-ECE-05-11, Dept. of Electrical and Computer Engineering, Virginia Tech, Nov. 2005. (PDF)

Cognitive Radio Networks and Dynamic Spectrum Access Technologies
  • K. Bian, J. Park, L. Chen, and X. Li, "Addressing the hidden terminal problem for heterogeneous coexistence between TDM and CSMA networks in white space," IEEE Transactions on Vehicular Technology , to appear. (PDF)
  • B. Bahrak, S. Bhattarai, A. Ullah, J. Park, J. Reed, and D. Gurney, "Protecting the primary users' operational privacy in spectrum sharing," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), April 2014. This paper was awarded the Best Paper Award. (PDF)
  • B. Bahrak and J. Park, "Coexistence decision making for spectrum sharing among heterogeneous wireless systems," IEEE Transactions on Wireless Communications, to appear. (PDF)
  • B. Gao, J. Park, and Y. Yang, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks," IEEE Transactions on Mobile Computing, to appear. (PDF)
  • J. Park, J. Reed, L. Beex, T.C. Clancy, V. Kumar, and B. Bahrak, "Security and Enforcement in Spectrum Sharing (invited paper)," Proceedings of the IEEE, vol. 102, issue 3, 2014, pp. 270-281. (PDF)
  • B. Bahrak and J. Park, "Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems," IEEE Transactions on Wireless Communication, vol. 13, issue 3, 2014, pp. 1298-1307. (PDF)
  • B. Gao, Y. Yang, and J. Park, "A credit-token-based spectrum etiquette framework for coexistence of heterogeneous cognitive radio networks," 2014 IEEE Int’l Conference on Computer Communications (INFOCOM), April-May, 2014. (PDF)
  • J. Thakkar, D. Ali, J. Park, and S. Moon, "Securing a distributed policy-based cognitive radio," 2014 ACM Int’l Conference on Ubiquitous Information Management and Communication (IMCOM), Jan. 2014. (PDF)
  • K. Bian, J. Park, X. Du, and X. Li, "Ecology-inspired coexistence of heterogeneous wireless networks," 2013 IEEE Global Communications Conference (GLOBECOM), Atlanta, USA, Dec. 2013. (PDF)
  • D. Ali, J. Park, and A. Amanna, "A feature partitioning approach to case-based reasoning in cognitive radios," International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM), July 2013. (PDF)
  • K. Bian and J. Park, "Maximizing rendezvous diversity in rendezvous protocols for decentralized cognitive radio networks," IEEE Transactions on Mobile Computing, vol. 12, no. 7, July 2013, pp. 1294-1307. (PDF)
  • K. Bian, J. Park, X. Du, and X. Li, "Enabling fair spectrum sharing: Mitigating selfish misbehaviors in spectrum contention," IEEE Network, May/June 2013, pp. 16-21. (PDF)
  • B. Bahrak and J. Park, "Security of spectrum learning in cognitive radios," SK Telecom Telecommunications Review, Vol. 22, Issue 6, Dec. 2012, pp. 850-864. (PDF)
  • B. Bahrak, J. Park, and H. Wu, "Ontology-based spectrum access policies for policy-based cognitive radios," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), Oct. 2012. (PDF)
  • B. Gao, J. Park, Y. Yang, and S. Roy, "A taxonomy of coexistence mechanisms for heterogeneous cognitive radio networks operating in TV white spaces," IEEE Wireless Communications, Vol. 19, Issue 4, 2012, pp. 41-48. (PDF)
  • R. Chen, J. Park, and K. Bian, "Robustness against Byzantine failures in distributed spectrum sensing," Elsevier Computer Communications, Vol. 35, Issue 17, Oct 2012, pp. 2115-2124. (PDF)
  • B. Bahrak, A. Deshpande, and J. Park, "Spectrum access policy reasoning for policy-based cognitive radios," Computer Networks, Vol. 56, Issue 11, July 2012, pp. 2649-2663. (PDF)
  • J. H. Reed, J. T. Bernhard, and J. Park, "Spectrum Access Technologies: The Past, the Present, and the Future," Proceedings of the IEEE, Vol. 100, Special Centennial Issue, May 2012, pp. 1676-1684. (PDF)
  • B. Gao, Y. Yang, and J. Park, "Uplink soft frequency reuse for self-coexistence of cognitive radio networks operating in white-space spectrum," 31st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2012), Mar. 2012. (PDF)
  • J. Park and K. Bian, "Security of Cognitive Radios," in Encyclopedia of Cryptography and Security, Second Edition, Henk C. A. van Tilborg and Sushil Jajodia (Eds.), Springer, 2011.
  • B. Gao, Y. Yang, and J. Park, "Channel aggregation in cognitive radio networks with practical considerations,"IEEE International Conference on Communications (ICC), June. 2011. (PDF)
  • K. Bian and J. Park, "Asynchronous channel hopping for establishing rendezvous in cognitive radio networks,"IEEE INFOCOM Mini-Conference, Apr. 2011. (PDF)
  • K. Bian, J. Park, and R. Chen, "Control channel establishment in cognitive radio networks using channel hopping," IEEE Journal on Selected Areas in Communications, Vol. 29, No. 4, April, 2011. (PDF)
  • B. Bahrak, A. Deshpande, M. Whitaker, and J. Park, "BRESAP: A policy reasoner for processing spectrum access policies represented by binary decision diagrams," IEEE Int'l Dynamic Spectrum Access Networks Symposium (DySPAN), Apr. 2010. (PDF)
  • J. Park, K. Bian, and R. Chen, "Cognitive Radio Network Security," in Cognitive Radio Communications and Networks: Principles and Practice, A. Wyglinski, M. Nekovee, and T. Hou (Eds.), Elsevier, Dec. 2009.
  • K. Bian and J. Park, "Addressing the hidden incumbent problem in 802.22 networks," SDR '09 Technical Conference, Dec. 2009. (PDF)
  • B. Bahrak, A. Deshpande, and J. Park, "A policy reasoner for policy-based dynamic spectrum access," SDR '09 Technical Conference, Dec. 2009. (PDF)
  • K. Bian, J. Park and R. Chen, "A Quorum-based Framework for Establishing Control Channels in Dynamic Spectrum Access Networks," The 15th ACM Annual International Conference on Mobile Computing and Networking (ACM MobiCom 2009), September 2009. (PDF)
  • K. Bian and J. Park, "A Coexistence-Aware Spectrum Sharing Protocol for 802.22 WRANs," The 18th IEEE International Conference on Computer Communications and Networks (ICCCN 2009), August 2009. (PDF)
  • S. Xiao, J. Park, and Y, Ye, "Tamper Resistance for Software Defined Radio Software," The 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC 2009), July 2009. (PDF)
  • A. B. MacKenzie, J. H. Reed, P. Athanas, C. W. Bostian, R. M. Buehrer, L. A. DaSilva, S. Ellingson, Y. T. Hou, M. Hsiao, J. Park, C. Patterson, S. Raman, and C. da Silva, "Cognitive Radio and Networking Research at Virginia Tech," Proc. of the IEEE, Vol. 97, No. 4, Apr. 2009, pp. 660-688, Apr. 2009. (PDF)
  • K. Bian and J.-M. Park, "Security Vulnerabilities in IEEE 802.22," The Fourth International Wireless Internet Conference (WICON 2008), Nov. 2008. (PDF)
  • R. Chen, J.-M. Park, and K. Bian, "Robust distributed spectrum sensing in cognitive radio networks," IEEE Infocom 2008 mini-conference, Apr. 2008. (PDF)
  • R. Chen, J.-M. Park, Y. T. Hou, and J. H. Reed, "Toward secure distributed spectrum sensing in cognitive radio networks," IEEE Communications Magazine Special Issue on Cognitive Radio Communications, Apr. 2008. (PDF)
  • R. Chen, J.-M. Park, and J. H. Reed, "Defense against primary user emulation attacks in cognitive radio networks," IEEE Journal on Selected Areas in Communcations Special Issue on Cognitive Radio Theory and Applications, Vol. 26, No. 1, Jan. 2008. (PDF)
  • K. Bian and J.-M. Park, "Segment-Based Channel Assignment in Cognitive Radio Ad Hoc Networks," ICST Second International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom), August 2007. (PDF)
  • R. Chen, J.-M. Park, and K. Bian, "Robust Distributed Spectrum Sensing in Cognitive Radio Networks," Technical Report TR-ECE-06-07, Dept. of Electrical and Computer Engineering, Virginia Tech, July 2006. (PDF)
  • R. Chen and J.-M. Park, "Ensuring trustworthy spectrum sensing in cognitive radio networks," IEEE Workshop on Networking Technologies for Software Defined Radio Networks (held in conjunction with IEEE SECON 2006), Sep. 2006. (PDF)
  • K. Bian and J.-M. Park, "MAC-layer misbehaviors in multi-hop cognitive radio networks," 2006 US - Korea Conference on Science, Technology, and Entrepreneurship (UKC2006), Aug. 2006. (PDF)

Online Privacy
  • B. Bahrak, S. Bhattarai, A. Ullah, J. Park, J. Reed, and D. Gurney, "Protecting the primary users' operational privacy in spectrum sharing," IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), April 2014. This paper was awarded the Best Paper Award. (PDF)
  • F. Belanger, R. E. Crossler, J. S. Hiller, J. Park, and M. Hsiao, "POCKET: A Tool for Protecting Children’s Privacy Online," Elsevier Decision Support Systems, vol. 54, issue 2, 2013, pp. 1161-1173. (PDF)
  • F. Belanger, R. Crossler, J. Hiller, J. Park, and M. Hsiao, "Children online privacy: Issues with parental awareness and control," in Annals of Emerging Research in Information Assurance, Security and Privacy Services, H.R. Rao and S. Upadhyaya (Eds.), Vol. 4, Emerald Group Publishing, 2009, pp. 311-333.
  • K. Bian, J. Park, M. Hsiao, F. Belanger, and J. Hiller, "Evaluation of Online Resources in Assisting Phishing Detection," The 9th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2009), July 2009. (PDF)
  • J. Hiller, F. Belanger, M. Hsiao, and J. Park, "POCKET Protection," American Business Law Journal, Vol. 45, Issue 3, 2008, pp. 417-453.