Research Publications @ tClab

2023,2022,2021, 2020, 2019,2018, 2017, 2016,2015,2014,2013,2012,2011,2010,2009,2008,2006,2005,2004

Google Scholar

(Virginia Tech's student's name (mentee) is underlined; * indicates a mentee affiliated with non-VT; IF: Impact Factor; AR: Acceptance Rate)

2023

    Journal Papers

  1. H. Kim, D. Kim, J.H. Cho, T. Moore, F. Nelson, and H. Lim, ``Time-Based Moving Target Defense Using Bayesian Attack Graph Analysis,'' accepted to IEEE Access, April 2023.
  2. Z. Wan, J.H. Cho, M. Zhu*, M. Singh, A. H. Anwar*, and C. Kamhoua, ``Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception,'' accepted to IEEE Transactions on Network and Service Management, Jan. 2023 (2022 JCR IF 4.758).
  3. J. Valinejad, Z. Guo, J.H. Cho, and I.R. Chen, ``Measuring Community Resilience During the COVID-19 based on Community Wellbeing and Resource Distribution,'' accepted to Journal of Social Computing, Jan. 2023. (SciOpen)
  4. D. H. Jeong, J.H. Cho, F. Chen, L. Kaplan, A. Josang, and S.Y. Ji, ``Interactive Web-based Visual Analysis on Network Traffic Data,'' accepted to Information, Jan. 2023.
  5. J. Mendonca*, J.H. Cho, T. J. Moore, F. F. Nelson, H. Lim, and D. Kim, ``Performance Impact Analysis on Services under a Time-based Moving Target Defense Mechanism,'' The Journal of Defense Modeling and Simulation, vol. 20, no. 1, pp. 41-56, 2023.

  6. Conferences, Workshops, and/or Symposia Papers

  7. S. Matsumoto, J. F. Ferrari, H. J. Yoon, A. R. Thukkaraju, D. Lee, M. K. Ahn, J.H. Cho, and P. Costa, ``Software-Friendly Subjective Bayesian Networks: Reasoning within a Software-Centric Mission Impact Assessment Framework,'' IEEE FUSION 2023.
  8. B. Yao, A. Shah, L. Sun, J.H. Cho, and L. Huang, ``End-to-End Multimodal Fact-Checking and Explanation Generation: A Challenging Dataset and Models,'' The 46th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'2023) (AR: ~20%)
  9. R. Ning, J. Li, C. Xin, C. Wang, X. Li, J.H. Cho, and H. Wu, “ScanFed: Scalable and Plug-and-Play Backdoor Detection in Federated Learning,” IEEE 43rd IEEE International Conference on Distributed Computing Systems (ICDCS-23). (AR: ~19%)
  10. Q. Zhang, J.H. Cho, T. J. Moore, D. Kim, H. Lim, and F. F. Nelson, “EVADE: Efficient Moving Target Defense for Autonomous Network,” The 21st International Conference on Applied Cryptography and Network Security (ACNS), Springer, 19-22 June 2023. (AR: ~20%)
  11. Z. Guo, P. Wang, J.H. Cho, and L. Huang, “Text Mining-based Social-Psychological Vulnerability Analysis of Potential Victims To Cybergrooming: Insights and Lessons Learned,” 2023 International Workshop on Cyber Social Threats (CySoc), co-located with the ACM Web Conference Apr. 2023
  12. D. H. Jeong, J.H. Cho, F. Chen, A. Josang, L. M. Kaplan, and S.Y. Ji, ``Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation," 2023 IEEE Integrated STEM Education Conference (ISEC), Mar. 2023.
  13. Z. Zhao, X. Zhang, C. Zhao, J.H. Cho, K. Lance, D. Jeong, A. Josang, H. Chen, and F. Chen, ``Multi-Label Temporal Evidential Neural Networks for Early Event Detection,'' The 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), June 2023.
  14. Z. Guo, Qi Zhang, Q. Zhang, L. Kaplan, A. Josang, F. Chen, D. Jeong, and J.H. Cho, ``Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information,'' The 1st AAAI Workshop on Uncertainty Reasoning and Quantification in Decision Making (UDM-AAAI-23), co-located with Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23), Washington D.C., Feb. 2023.
  15. Q. Zhang, Z. Guo, L. Kaplan, A. Josang, F. Chen, D. Jeong, and J.H. Cho, ``PPO-UE: Proximal Policy Optimization via Uncertainty-Aware Exploration,'' The 1st AAAI Workshop on Uncertainty Reasoning and Quantification in Decision Making (UDM-AAAI-23), co-located with Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23), Washington D.C., Feb. 2023.

  16. Extended Abstract

  17. P. Wang, Z. Guo, L. Huang, and J.H. Cho, “Authentic Dialogue Generation to Improve Youth’s Awareness of Cybergrooming for Online Safety,” The 10th Mid-Atlantic Student Colloquium on Speech, Language, and Learning (MASC-SLL 2023)
  18. 2022

      Journal Papers

    1. N. Sahani, R. Zhu, J.H. Cho, and C. Liu, ``Machine Learning-based Intrusion Detection for Smart Grid Computing: A Survey,'' accepted to ACM Transactions on Cyber-Physical Systems, Dec. 2022 (2021 Scopus Impact Factor 3.083).
    2. Z. Guo, J.H. Cho, and C.T. Lu, ``Mitigating Influence of Disinformation Propagation Using Uncertainty-based Opinion Interactions,'' accepted to {\em IEEE Transactions on Computational Social Systems}, Dec. 2022. (2022 JCR IF 4.747)
    3. Z. Guo, J. Valinejad, and J.H. Cho, ``Effect of Disinformation Propagation on Opinion Dynamics: Game Theoretic Approach,'' vol. 9, no. 5. pp. 3775 -- 3790, IEEE Transactions on Network Science and Engineering, Sep.-Oct. 2022 (2021 JCR IF 5.033).
    4. S. Jang*, S. Park*, J.H. Cho, and D. Lee, ``CARES: Context-Aware Trust Estimation System for Realtime Crowdsensing Services in Vehicular Edge Networks,'' accepted to ACM Transactions on Internet Technology, Jan. 2022 (2021 JCR IF 1.6).
    5. S. Kim, S. Yoon*, J.H. Cho, D. Kim, T. J. Moore, F. F. Nelson, and H. Lim, ``DIVERGENCE: Deep Reinforcement Learning-based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework,'' accepted to IEEE Transactions on Network and Service Management, Jan. 2022 (2021 JCR IF 4.195)

    6. Conferences, Workshops, and/or Symposia Papers

    7. T. Moghaddam, M. Kim, J.H. Cho, H. Lim, T. J. Moore, F. F. Nelson and D. Kim, ``A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks,'' The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Workshops (DSN - W), Jun. 2022.
    8. M. Kim, J.H. Cho, H. Lim, T. J. Moore, F. F. Nelson, R. K. L. Ko and D. Kim, ``Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN environments, The 22nd IEEE International Conference on Software Quality, Reliability, and Security, 2022. (AR 27.47%)
    9. M. Kim, J.H. Cho, H. Lim, T. J. Moore, F. F. Nelson and D. Kim, ``Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment,'' The 27th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'2022), 2022. (AR: 38%)
    10. A. Josang, J.H. Cho, and F. Chen, ``Calibration of Uninformative Prior Weights,'' 2022 IEEE International Conference on Multisensor Fusion and Integration (MFI), Cranfield, UK.
    11. H. Ali, M. Ameedi, A. Swami, R. Ning, J. Li, H. Wu, and J.H. Cho, ``ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning,'' IEEE Conference on Communications and Network Security (CNS), Oct. 2022, Austin, TX, USA. (AR: 35%)
    12. A. H. Anwar*, M. Zhu*, Z. Wan, J.H. Cho, M. Singh, and C. Kamhoua, ``Honeypot-based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory,'' IEEE GLOBECOM, Dec. 2022. (AR: 38%)
    13. Q. Zhang, Y. Mahajan, I.R. Chen, D. Ha, and J.H. Cho, ``An Attack-Resilient and Energy-Adaptive Monitoring System for Smart Farms,'' IEEE GLOBECOM, Dec. 2022. (AR: 38%)
    14. Z. Guo, J.H. Cho, I. Chen, S. Sengupta, T. Mitra, and M. Hong, ``Modeling and Analysis of Social Capital-based Deception-Resistant Friending Decision Framework in Online Social Networks,'' The International AAAI Conference on Web and Social Media (ICWSM 2022), 2022. (AR~20%)

    15. Extended Abstract


    16. H. Kim, D. Kim, J.H. Cho, T. Moore, F. Nelson, and H. Lim, ``Continual Learning with Network Intrusion Dataset,'' a poster paper, The 2022 IEEE International Conference on Big Data.

    2021

      Journal Papers

    1. Z. Wan, J.H. Cho, M. Zhu, A. H. Anwar, C. Kamhoua, and M. Singh ``Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats,'' accepted to IEEE Transactions on Network and Service Management, Sep. 2021 (2020 JCR IF 4.195)
    2. M. Zhu, A. H. Anwar, Z. Wan, J.H. Cho, M. Singh, and C. Kamhoua, ``A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning," accepted to IEEE Communications Surveys & Tutorials, Aug. 2021 (2021 JCR IF 23.7)
    3. Z. Wan, Y. Mahajan, and B. Kang, T. J. Moore, J.H. Cho, ``A Survey on Centrality Metrics and Their Network Resilience Analysis," IEEE Access, vol. 9, pp. 104773--104819 (47 pages), July 2021. (2021 JCR IF 3.75) -- Source code of all centrality metrics available at here.
    4. Q. Zhang, A. Z. Mohammed, Z. Wan, J.H. Cho, and T. J. Moore, ``Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey," accepted to IEEE Transactions on Network and Service Management, 25 pages, June 2021. (2020 JCR IF 4.195)
    5. M. Ge, J.H. Cho, D. Kim, G. Dixit, and I.R. Chen, ``Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception,'' accepted to ACM Transactions on Internet Technology, May 2021. (2020 IF 1.598)
    6. S. Yoon, J.H. Cho, D. Kim, T. J. Moore, F. F. Nelson, and H. Lim, ``DESOLATER: Deep Reinforcement Learning-based Resource Allocation and Moving Target Defense Deployment Framework,'' IEEE Access, vol. 9, pp. 70700-70714, May 2021. (2020 IF 3.75)
    7. Q. Zhang, J.H. Cho, T. J. Moore, and I. Chen, ``Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation," accepted to IEEE Transactions on Network Service and Management, 2021. (2020 JCR IF 4.195)

    8. Conferences, Workshops, and/or Symposia Papers

    9. P. Wang, Z. Guo, L. Huang, and J.H. Cho ``SERI: Generative Chatbot Framework for Cybergrooming Prevention,'' The First Workshop on Evaluations and Assessments of Neural Conversation Systems (EANCS) in EMNLP2021, Nov. 2021. -- slides, presentation (mp4)
    10. Z. Guo and J.H. Cho, ``Comparative Analysis of Game Theoretic Opinion Models and Their Applications in Processing Disinformation,'' The 2021 IEEE Global Communications Conference (GLOBECOM), Dec. 2021. -- slides, presentation (mp4)
    11. Q. Zhang, J.H. Cho, and T. J. Moore, ``Analysis of Network Resilience Under Epidemic Attacks: Deep Reinforcement Learning-based Network Topology Adaptations,'' The 2021 IEEE Global Communications Conference (GLOBECOM), Dec. 2021. -- slides, presentation (mp4)
    12. Q. Zhang, J.H. Cho, T. J. Moore, and F. F. Nelson, ``DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks,'' The 2021 IEEE Conference on Communications and Network Security (CNS 2021), 17 June 2021. (AR~28%) -- slides, presentation (mp4)
    13. P. Villiers, G. Pavlin, J. Ziegler, A. Jousselme, P. Costa, E. Blasch, K. Laskey, C. Laudy, A. Waal and J.H. Cho, ``Uncertainty Evaluation of Temporal Trust in a Fusion System Using the URREF Ontology,'' IEEE FUSION 2021.
    14. Y. Mahajan and J.H. Cho, ``Privacy-Diversity-Aware Online Team Formation,'' The IEEE International Conference on Web Services (ICWS'2021), Jul. 2021. (AR~23%) -- slides, presentation (mp4)
    15. J. Lee, W. Kim, J.H. Cho, D. Kim, T. J. Moore, F. F. Nelson, and H. Lim, "Deep Learning Approach for Attack Detection in Controller Area Networks," SPIE DCS Conference on Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II, 2021.
    16. Y. Hu, Y. Ou, X. Zhao, F. Chen, and J.H. Cho, "Multidimensional Uncertainty-Aware Evidential Neural Networks," Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI-21). (AR~21%)

    2020

      Journal Papers

    1. Z. Guo, J.H. Cho, I. Chen, S. Sengupta, M. Hong, and T. Mitra, ``Online Social Deception and Its Countermeasures: A Survey," IEEE Access, vol. 9, pp. 1770 - 1806, Dec. 2020. (2020 IF 4.64)
    2. A. Alim, J.H. Cho, and F. Chen,``CSL^+: Scalable Collective Subjective Logic under Multidimensional Uncertainty,'' accepted to ACM Transactions on Intelligent Systems and Technology, Sept. 2020. (2018 5-year IF: 3.971)
    3. P. Xu, J.H. Cho, and A. Salado, ``Expert Opinion Fusion Framework using Subjective Logic for Fault Diagnosis,'' accepted to IEEE Transactions on Cybernetics, Sept. 2020. (2020 IF 11.47)
    4. D. Sharma, S. Y. Enoch, J.H. Cho, T. J. Moore, F. F. Nelson, H. Lim, and D. Kim, ``Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense,'' Journal of Network and Computer Applications, Elsevier, vol. 170, no. 102805, pp. 1--19, 2020 (2019 IF 5.273).
    5. G. Choudhary, P. Astillo, I. You, K. Yim, I.R. Chen, and J.H. Cho, ``Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems,'' accepted to IEEE Transactions on Network and Service Management, July 2020. (2020 IF 5.930)
    6. S. Yoon, J.H. Cho, D. Kim, T. Moore, F. Nelson, and H. Lim, ``Attack Graph-based Moving Target Defense in Software-Defined Networks,'' IEEE Transactions on Network and Service Management, vol. 7, no. 3, pp. 1653--1668, Sept. 2020. (2020 IF 5.930)
    7. H. Al-Hamadi, M. Saoud, I.R. Chen, and J.H. Cho,, ``Optimizing the Lifetime of IoT-Based LPWAN and Mesh Networks,'' IEEE Access, vol. 8, no. 1, pp. 63090--63105, Mar. 2020 (2018 IF 4.098).
    8. J.H. Cho, D. P. Sharma, H. Alavizadeh, S. H. Yoon, N. Ben-Asher, T. J. Moore, D. S. Kim, H. Lim, and F. F. Nelson, ``Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense,'' IEEE Communications Surveys and Tutorials, vol. 22, no. 1, pp. 709--745, Mar. 2020. (2019 IF 22.973)

    9. Conferences, Workshops, and/or Symposia Papers

    10. X. Zhao, S. Hu, F. Chen, and J.H. Cho, "Uncertainty Aware Semi-Supervised Learning on Graph Data," Thirty-Fourth Annual Conference on Neural Information Processing Systems (NIPS'2020).
    11. S. Yoon, J.H. Cho, D. S. Kim, T. J. Moore, F. F. Nelson, H. Lim, N. Leslie, and C. Kamhoua, ``Moving Target Defense in In-Vehicle Software Defined Networks: IP Shuffling using Network Slicing with Multiagent Deep Reinforcement Learning,'' SPIE DCS Conference on Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II, Anaheim, Convention Center, Anaheim CA, April 2020.
    12. J. Mendonca, J.H. Cho, T. J. Moore, F. F. Nelson, H. Lim, A. Zimmermann, and D. Kim, ``Performability Analysis of Services in a Software-Defined Networking Adopting Time-Based Moving Target Defense Mechanisms,'' The 35th ACM/SIGAPP Symposium On Applied Computing (ACM SAC 2020)
    13. H. Yang, J.H. Cho, H. Son, and D. Lee, ``Context-Aware Trust Estimation for Realtime Crowdsensing Services in Vehicular Networks,'' IEEE Consumer Communications and Networking Conference (CCNC 2020), July 2020.

    14. Book Chapters

    15. S. Yoon, J.H. Cho, G. Dixit, and I.R. Chen, ``Resource-Aware Intrusion Response based on Deep Reinforcement Learning for Software-Defined Internet-of-Battle-Things," accepted to IEEE Press as a book chapter in the book entitled `Game Theory and Machine Learning for Cyber Security', Feb. 2020.
    16. M. Ge, J.H. Cho, B. Ishfaq, and D. S. Kim, “Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things,” Modeling and Design of Secure Internet of Things (Editors: Kamhoua et al.), 2020, IEEE Press.

    17. Extended Abstract


    18. D. Kim, M. Kim, J.H. Cho, H. Lim, T. Moore, and F. Nelson, ``Design and Performance Analysis of Software Defined Networking based Web Services Adopting Moving Target Defense,'' The 50th IEEE/IFIP Int'l Conf. on Dependable Systems and Networks (DSN 2020).

    2019

      Journal Papers

    1. J.H. Cho, H. Al-Hamadi, and I.R. Chen, "COSTA: Composite Trust-based Asset-Task Assignment in Mobile Ad Hoc Networks," vol. 7, no. 1, pp. 92296-92313, IEEE Access, July 2019 (2018 IF 4.098).
    2. T. J. Moore, J.H. Cho, and I.R. Chen, "Network Adaptations under Cascading Failures for Mission-Oriented Networks," IEEE Transactions on Network and Service Management, vol. 16, no. 3, pp. 1184--1198. Sept. 2019. (2019 IF 4.682)
    3. I. You, V. Sharma, K. Yim, I.R Chen, and J.H. Cho, “BRIoT: Behavior Rule Specification-based Misbehavior Detection for IoT-Embedded Cyber-Physical Systems,” IEEE Access, vol. 7, no. 1, pp. 118556--118580, May 2019. (2018 IF 4.098)
    4. J. D. Mireles, E. Ficke, J.H. Cho, P. Hurley, and S. Xu, “Metrics Towards Measuring Cyber Agility,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 12, pp. 3217--3232, 2019. (2019 IF 6.211)
    5. H. Al-Hamadi, M. Saoud, I.R. Chen, and J.H. Cho, “Trust Management of Smart Service Communities,” IEEE Access, vol. 7, pp. 26362 -- 26378, Feb. 2019 (2018 IF 4.098).
    6. J.H. Cho, S. Ranger, J. O'Donovan, S. Adali, and B. Horne, “Uncertainty-based False Information Propagation in Social Networks,” ACM Transactions on Social Computing, vol. 2, no. 2, article no. 5, June 2019 .
    7. J.H. Cho, S. Xu, P. Hurley, M. Mackay, T. Benjamin, and M. Beaumont, “STRAM: Measuring the Trustworthiness of Computer-based Systems,” ACM Computing Surveys, vol. 51, no. 6, article no. 128, 2019 (2018 IF 6.131).

    8. Conferences, Workshops, and/or Symposia Papers

    9. A. Alim, X. Zhao, J.H. Cho, and F. Chen, ``Uncertainty-Aware Opinion Inference Under Adversarial Attacks,'' The 2019 IEEE International Conference on Big Data (BigData 2019).
    10. X. Zhao, Y. Ou, L. Kaplan, F. Chen, and J.H. Cho, ``Quantifying Classification Uncertainty using Regularized Evidential Neural Networks,'' AAAI 2019 Fall Symposium Series, Artificial Intelligence in Government and Public Sector.
    11. A. K. Kalia, N. Ajmeri, K. S. Chan, J.H. Cho, S. Adali, and M. Singh, "Incorporating an Emotional Basis of Norms in Multiagent Systems," 28th International Joint Conference on Artificial Intelligence (IJCAI), 2019.
    12. X. Zhao, S. Hu, J.H. Cho, and F. Chen, “Uncertainty-based Decision Making using Deep Reinforcement Learning,” 22nd International Conference on Information Fusion (FUSION 2019), July 2019.
    13. C. Dishington, D. Sharma, D. S. Kim, J.H. Cho, T. Moore, and F. Nelson, “Security and Performance Assessment of IP Multiplexing Moving Target Defense in Software Defined Networks,” IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2019), Aug. 2019.
    14. B. Horne, D. Nevo, J. O’Donovan, J. H. Cho, and S. Adali, “Rating Reliability and Bias in News Articles: Does AI Assistance Help Everyone?,” The 13th International AAAI Conference on Web and Social Media (ICWSM-2019), June 2019.
    15. D. P. Sharma, J. H. Cho, H. Lim, T. J. Moore, F. F. Nelson, and D. S. Kim, “Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks,” The 53rd IEEE International Conference on Communications (ICC 2019).

    16. Book Chapters

    17. J.H. Cho and T. J. Moore, “Software Diversity for Cyber Resilience: Percolation Theoretic Approach,” Nature-Inspired Cyber Security and Resilience: Fundamentals, Technology and Applications, 2019, Editors (E. M. El-Alfy, et al.), IET.
    18. J.H. Cho, M. Zhu, and M. Singh, “Modeling and Analysis of Deception Games based on Hypergame Theory,” Automated Cyber Deception, Springer Nature Switzerland, 2019.

    19. Extended Abstract

    20. G. Dixit, J.H. Cho, I.R. Chen, M. Zhu, M. Singh, and C. Kamhoua, ``Defensive Deception in a Hypergame,'' IEEE SecDev 2019, Sept. 2019.
    21. S. Yoon, J.H. Cho, D. Kim, T. J. Moore, F. Nelson, H. Lim, "Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks," ACM MobiCom, 2019.
    22. Hamid Al-Hamadi, Mohammad Saoud, Ing-Ray Chen and J.H. Cho, "Optimizing the Lifetime of Emerging Low Power Wide-Area Networks," 2019 ACM International Conference on Emerging Networks Technologies (ICENT 2019).
    23. J. Narantuya, S. Yoon, H. Lim, J.H. Cho, D. Kim, T. J. Moore, and F. F. Nelson, “SDN-based IP Shuffling Moving Target Defense with Multiple SDN Controllers,” The 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2019.

    2018

      Journal Papers

    1. M. Errapotu, Y. Gong, Y. Guo, J.H. Cho, M. Pan, and Z. Han, “SAFE: Secure Appliance Scheduling for Flexible and Efficient Energy Consumption for Smart Home IoT,” IEEE Internet of Things Journal, vol. 5, no. 6, pp. 4380 - 4391 Dec. 2018.
    2. Y. Wang, I.R. Chen, J.H. Cho, A. Swami, Y.C. Lu, C.T. Lu, and J. Tsai “CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks,” IEEE Transactions on Services Computing, vol. 11, no. 6, Nov.-Dec. 2018.
    3. J.H. Cho, “Dynamics of Uncertain and Conflicting Opinions in Social Networks,” IEEE Transactions on Computational Social Systems, vo. 5, no. 2, pp. 518-531, June 2018.
    4. P. Du, Z. Sun, H. Chen, J.H. Cho, and S. Xu, “Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 12, pp. 2965-2980, May 2018.
    5. J.H. Cho and N. Ben-Asher, “Cyber Defense in Breadth: Modeling and Analysis of an Integrated Defense Mechanism,” The Journal of Defense Modeling and Simulation, vol. 15, no. 2, April 2018.
    6. J.H. Cho and I.R. Chen, “PROVEST: Provenance-based Trust Model for Delay Tolerant Networks,” IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 1, Jan./Feb. 2018

    7. Conferences, Workshops, and/or Symposia Papers

    8. I. You, K. Yim, V. Sharma, G. Choudhary, I.-R. Chen and J.H. Cho, “On IoT Misbehavior Detection in Cyber Physical Systems,” The 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), Taipei, Taiwan, Dec. 2018.
    9. X. Zhao, F. Chen, and J.H. Cho, “Deep Learning-based Prediction of Dynamic, Uncertain Opinions in Network Data,” The IEEE International Conference on Big Data (IEEE BigData 2018), Dec. 2018.
    10. X. Zhao, F. Chen, and J.H. Cho, “A Deep-Learning based Scalable Inference of Uncertain Opinions,” accepted to The IEEE International Conference on Data Mining (ICDM 2018), Nov. 2018.
    11. X. Zhao, F. Chen, and J.H. Cho, “Uncertainty-Based Opinion Inference on Network Data using Graph Convolutional Neural Networks,” IEEE MILCOM 2018, Oct. 2018.
    12. J. Charlton, P. Du, J.H. Cho, and S. Xu, “Measuring the Relative Accuracy of Malware Detectors in the Absence of Ground Truths,” IEEE MILCOM 2018, Oct. 2018.
    13. M. Ge, J.H. Cho, C. Kamhoua, and D. S. Kim, “Optimal Deployments of Defense Mechanisms for Internet of Things,” accepted to The International Workshop on Secure Internet of Things 2018 (SIoT 2018), in conjunction with the European Symposium on Research in Computer Security (ESORICS 2018), Sept. 2018.
    14. I. You, K. Yim, V. Sharma, G. Choudhary, I. R. Chen, and J.H. Cho, “Misbehavior Detection of Embedded IoT Devices in Medical Cyber Physical Systems,” The Third International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2018), Sept. 2018.
    15. B. Gwak, J.H. Cho, D. Lee, and H. Son, “TARAS: Trust-Aware Role-based Access Control System in the Public Internet-of-Things,” The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018), Aug. 2018.
    16. D. P. Sharma, D. S. Kim, S. Yoon, H. Lim, J.H. Cho, and T. Moore, “FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networking,” The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018), Aug. 2018. (Highlighted at EurekAlert)
    17. A. Josang, J.H. Cho, and F. Chen, “Uncertainty Characteristics of Subjective Opinions,” 21st International Conference on Information Fusion (FUSION 2018), July 2018.
    18. Y. Wu, N. Dhakal, D. Xu, and J.H. Cho, “Analysis and Prediction of Endorsement-based Skill Assessment in LinkedIn,” IEEE COMPSAC 2018 DSAT: Data Sciences, Analytics & Technologies, July 2018.
    19. N. Ben-Asher, J.H. Cho, and S. Adali, “Adaptive Situational Leadership Framework,” 2018 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA 2018), June 2018.(Best Paper Award; highlghted at EurekAlert)
    20. G. Choudhary, V. Sharma, I. You, I. R. Chen, and J.H. Cho, “Intrusion Detection Systems for Networked UAVs: A Survey,” The 14th International Wireless Communications and Mobile Computing Conference (IWCMC 2018), June 2018.
    21. H. Chen, J.H. Cho, and S. Xu, “Quantifying the Security Effectiveness of Firewalls and DMZs,” Hot Topics in the Science of Security (HotSoS’2018), April 2018.
    22. J.H. Cho and S. Adali, “Is Uncertainty Always Bad?: Effect of Topic Competence on Uncertain Opinions,” IEEE International Conference on Communications (ICC 2018), May 2018. (Highlighted at EurekAlert!)
    23. J.H. Cho and T. Moore, “Percolation-based Network Adaptability under Cascading Failures,” IEEE INFOCOM 2018, April 2018. (Best-in-Session Presentation Award)

    24. Book Chapters

    25. T. Moore and J.H. Cho, “Chapter 6: Applying Percolation Theory,” an invited book chapter to the book entitled Cyber Resilience: Cyber Resilience of Systems and Networks (Editors: A. Kott and I. Linkov), pp. 107-133, June 2018, Springer Nature.

    26. Extended Abstracts for Presentations

    27. J.H. Cho and T. J. Moore, “Designing Resilient Networks Using Software Diversity,” Army Science Conference, 2018.
    28. H. Chen, J.H. Cho, and S. Xu, “Quantifying the Security Effectiveness of Network Diversity,” an abstract for poster presentation, Hot Topics in the Science of Security (HotSoS’2018).

    2017

      Journal Papers

    1. J.H. Cho, Y. Wang, I.R. Chen, K. Chan, and A. Swami, “A Survey on Modeling and Optimizing Multi-Objective Systems,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, Third Quarter, May 2017.
    2. Y. Wang, I.R. Chen, J.H. Cho, and J. Tsai, “Trust-Based Task Assignment with Multi-Objective Optimization in Service-Oriented Ad Hoc Networks,” IEEE Transactions on Network and Service Management, vol. 14, no. 1, pp. 217-232, Mar. 2017.
    3. M. Pendleton, R. Garcia-Lebron, J.H. Cho, and S. Xu, “A Survey on Systems Security Metrics,” ACM Computing Surveys, vol. 49, no. 4, Article No. 62, Jan. 2017.

    4. Conferences, Workshops, and/or Symposia Papers

    5. F. Chen, C. Wang, and J.H. Cho, “Collective Subjective Logic: Scalable Uncertainty-based Opinion Inference,” 2017 IEEE International Conference on Big Data (BigData 2017), Dec. 2017.
    6. J.H. Cho, T. Cook, S. Rager, J. O’Donovan, and S. Adali, “Modeling and Analysis of Uncertainty-based False Information Propagation in Social Networks,” IEEE Global Communications Conference (GLOBECOM 2017), Dec. 2017. (Best Paper Award; Highlighted at EurekAlert!)
    7. J. Anderson and J.H. Cho, “Software Defined Network based Virtual Machine Placement in Cloud Systems,” IEEE Military Communications Conference (MILCOM 2017), Oct. 2017.
    8. L. Wang, J.H. Cho, I.R. Chen, and J. Chen, “PDGM: Percolation-based Directed Graph Matching in Social Networks,” IEEE International Conference on Communications (ICC 2017), May 2017.
    9. Y. Wang, I.R. Chen, J.H. Cho, and J. Tsai, “A Comparative Analysis of Trust-based Service Composition Algorithms in Mobile Ad Hoc Networks,” 2017 International Conference on Information System & Data Mining (ICISDM 2017)

    2016

      Journal Papers

    1. J.H. Cho, I.R. Chen, and K. Chan, “Trust Threshold based Public Key Management in Mobile Ad Hoc Networks,” Ad Hoc Networks, vol. 44, pp. 58-75, July 2016
    2. J.H. Cho and J. Gao, “Cyber War Game in Temporal Networks,” vol. 11, no. 2, PLoS One, Feb. 2016
    3. Y. Wang, I.R. Chen, J.H. Cho, A. Swami, and K. S. Chan, “Trust-based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks,” IEEE Transactions on Services Computing, 2016

    4. Conferences, Workshops, and/or Symposia Papers

    5. J.H. Cho, I. Alsmadi, and D. Xu, “Privacy and Social Capital in Online Social Networks,” IEEE Global Communications Conference (GLOBECOM 2016), Dec. 2016
    6. J.H. Cho, P. Hurley, and S. Xu, “Metrics and Measurement of Trustworthy Systems,” IEEE Military Communications Conference (MILCOM 2016), Nov. 2016
    7. J. D. Mireles, J.H. Cho, and S. Xu, “Extracting Attack Narratives from Traffic Datasets,” International Conference on Cyber Conflict (CyCon 2016), Oct. 2016
    8. J.H. Cho, H. Cam, and A. Oltramari, “Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis,” IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA 2016)
    9. I. Alsmadi, D. Xu, and J.H. Cho, “An Interaction-based Reputation Model in Online Social Networks,” 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016)

    10. Extended Abstracts for Presentations

    11. J.H. Cho and J. Gao, “Cyber War Game in Temporal Networks,” a poster presentation at the International School and Conference on Network Science (NetSci 2016).
    12. J.H. Cho and A. Swami, “Dynamics of Uncertain and Conflicting Opinions in Social Networks”, a poster presentation at the International School and Conference on Network Science (NetSci 2016)
    13. J.H. Cho, I. Alsmadi, and D. Xu, “Privacy and Social Capital in Online Social Networks,” a poster presentation at the International School and Conference on Network Science (NetSci 2016)

    2015

      Journal Papers

    1. J.H. Cho, K. Chan, and S. Adali, “A Survey on Trust Modeling,” ACM Computing Surveys (CSUR), vol. 48, no.2, Article No. 28, Oct. 2015
    2. S. Adali, K. Chan, and J.H. Cho, “TANDEM: A Trust-based Agent Framework for Networked Decision Making,” Computational and Mathematical Organization Theory (CMOT), vol. 21, no. 4, Springer, Dec. 2015, pp. 461-490.
    3. J.H. Cho, “Tradeoffs between Trust and Survivability for Mission Effectiveness in Tactical Networks,” IEEE Transactions on Cybernetics, vol. 45, no. 5, pp. 754-766, April 2015.

    4. Conferences, Workshops, and/or Symposia Papers

    5. K. Chan, J.H. Cho, T. Trout, J. Wampler, A. Toth, and B. Rivera, “trustd: Trust Daemon Experimental Testbed for Network Emulation,” IEEE Military Communications (MILCOM 2015).
    6. I.R. Chen, R. Mitchell, and J.H. Cho, “On Modeling of Adversary Behavior and Defense for Survivability of Military MANET Applications, IEEE Military Communications (MILCOM 2015).
    7. Y. Wang, I.R. Chen, and J.H. Cho, “Trust-based Service Management of Mobile Devices in Ad Hoc Networks,” The 8th International Conference on Dependability (DEPEND 2015)
    8. A. Oltramari and J.H. Cho, “ComTrustO: Composite Trust-based Ontology Framework for Information and Decision Fusion,” 18th Int’l Conf. on Information Fusion (FUSION 2015)
    9. N. Ben-Asher, J.H. Cho and S. Adali, “Cognitive Leadership Framework using Instance-based Learning,” 24th Conference on Behavior Representation in Modeling and Simulation (BRIMS 2015)
    10. D. Hughes, S. Adali, J.H. Cho, and J. Mangels, “Individual Differences in Information Processing in Networked Decision Making,” 24th Conference on Behavior Representation in Modeling and Simulation (BRIMS 2015)
    11. Y. Wang, I.R. Chen, and J.H. Cho, “Trust-Based Task Assignment with Multi-Objective Optimization in Service-Oriented Ad Hoc Networks,” 12th Int’l Symposium on Autonomous Decentralized System (ISADS 2015)

    12. Extended Abstracts for Presentations

    13. J.H. Cho, H. Cam, and A. Oltramari, “Effect of Personality Traits on Trust and Risk to Phishing Vulnerability: Modeling and Analysis,” an oral presentation at the 2015 ICF International CyberSci Summit Workshop on Resilience: Survival and Recovery in an Age of Cyber Weapons, 2015

    2014

      Journal Papers

    1. I. R. Chen, J. Guo, F. Bao, and J.H. Cho, “Trust Management in Mobile Ad Hoc Networks for Bias Minimization and Application Performance Maximization,” vo. 19, pp. 59-74, Ad Hoc Networks (Elsevier), Aug. 2014.
    2. I.R. Chen, F. Bao, M. Chang, and J.H. Cho, “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 5, pp. 1200-1210, 2014.

    3. Conferences, Workshops, and/or Symposia Papers

    4. Y. Wang, Y.C. Lu, I.R. Chen, J.H. Cho, A. Swami, and C.T. Lu, “LogitTrust: A Logit Regression-based Trust Model for Mobile Ad Hoc Networks,” The 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT 2014)
    5. J.H. Cho and A. Swami, “Dynamics of Uncertain Opinions in Social Networks,” IEEE Military Communications Conference (MILCOM 2014)
    6. J.H. Cho, K. Chan, and D. Mikulski, “Trust-based Information and Decision Fusion for Military Convoy Operations,” IEEE Military Communications (MILCOM 2014).
    7. S. Sikdar, S. Adalı, M. Amin, T. Abdelzaher, K. Chan, J.H. Cho, B. Kang, J. O'Donovan, “Finding true and credible information on Twitter,” 17th Int’l Conf. on Information Fusion (FUSION 2014)
    8. A. Kalia, N. Ajmeri, K. Chan, J.H. Cho, S. Adali, and M. Singh, “A Model of Trust, Moods, and Emotions in Multiagent Systems and its Empirical Evaluation,” 17th AAMAS Workshop on Trust in Agent Societies. May 2014. Paris.
    9. K. Chan, J.H. Cho, S. Adali, J, Mangels, O. Hoxha, K. Lila, and D. Abraham, “Providing Agility in C2 Environments Through Networked Information Processing: A Model of Expertise,” 19th Int’l Command and Control Research and Technology Symposium (ICCRTS’ 2014)
    10. X. Chen, J.H. Cho, and S. Zhu “GlobalTrust: An Attack-Resilient Reputation System for Tactical Networks,” IEEE International Conference on Sensing, Communication, and Networking (SECON 2014).

    2013

      Journal Papers

    1. J.H. Cho, and I.R. Chen, “On the Tradeoff between Altruism and Selfishness in MANET Trust Management”, Ad Hoc Networks (Elsevier), vol. 11, no. 8, pp. 2217–2234, Nov. 2013.
    2. J.H. Cho and K. Chan, “Building Trust-based Sustainable Networks,” vol. 32, no. 2, pp. 32-38, IEEE Society and Technology Magazine, Summer 2013.

    3. Conferences, Workshops, and/or Symposia Papers

    4. J.H. Cho, I.R. Chen, Y. Wang, and K. Chan, “Trust-based Multi-Objective Optimization for Resource Assignment in Coalition Networks,” IEEE 19th Int’l Conf. on Parallel and Distributed Systems (ICPADS 2013)
    5. I. R. Chen, F. Bao, J. Guo, and J.H. Cho, “Integrated Social and QoS Trust Management of Mobile Groups in Ad Hoc Networks,” IEEE 9th Int’l Conf. on Information, Communications and Signal Processing (ICICS 2013)
    6. Y. Wang, I.R. Chen, J.H. Cho, K. Chan, A. Swami, “Trust-based Multi-Objective Service Composition in Military Tactical Networks,” IEEE Military Communications Conference (MILCOM 2013)
    7. J.H. Cho, I.R. Chen, Y. Wang, K. Chan, and A. Swami, “Multi-Objective Optimization for Trustworthy Tactical Networks: A Survey and Insights,” 18th Int’l Command and Control Research and Technology Symposium (ICCRTS 2013)
    8. K. Chan, J.H. Cho, and A. Swami, “Impact of Trust on Security and Performance in Tactical Networks,” 18th Int’l Command and Control Research and Technology Symposium (ICCRTS 2013)
    9. K. Chan, J.H. Cho, and S. Adali, “A Trust-based Framework for Information Sharing Behavior in Command and Control Environments,” 22nd Annual Conf. on Behavior Representation in Modeling and Simulation (BRIMS 2013) (Best Paper Award)
    10. O. X. Wang, J.H. Cho, K. Chan, M. Chang, A. Swami, and P. Mohapatra, “Trust and Independence Aware Decision Fusion in Distributed Networks,” IEEE Int’l Conf. on Pervasive Computing and Communications Workshops, PERCOM 2013 Workshops
    11. J.H. Cho, K. Chan, and I.R. Chen, “A Composite Trust based Public Key Management in MANETs,” ACM 28th Symposium on Applied Computing (SAC 2013), Trust, Reputation, Evidence and other Collaboration Know-how (TRECK).

    2012

      Journal Papers

    1. I.R. Chen, F. Bao, M. Chang, and J.H. Cho, “Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks,” Wireless Personal Communications (Springer), vol. 66, no. 2, pp. 443-459, 2012.
    2. F. Bao , I.R. Chen, M. Chang, and J.H. Cho, “Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-based Routing and Intrusion Detection,” IEEE Transactions on Network and Service Management, vol. 9, no. 2, pp. 169-183, March 2012. (Selected for The 2015 IEEE Communications Society William R. Bennett Prize in the Field of Communications Networking)
    3. J.H. Cho, A. Swami, and I.R. Chen, “Modeling and Analysis of Trust Management with Trust Chain Optimization in Mobile Ad Hoc Networks,” Journal of Network and Computer Applications (Elsevier), vol. 35, no. 3, pp. 1001-1012, May 2012. (Invited Paper)

    4. Conferences, Workshops, and/or Symposia Papers

    5. K. S. Chan, J.H. Cho, and S. Adalı, “Multi-aspect Trust in Information Sharing Scenarios,” Workshop on Information in Networks (WIN 2012).
    6. J.H. Cho, J. George, B. Szymanski, A. Preece, P. Zerfos, “Trust-based Dynamic Service Composition in Tactical Networks,” 2012 Annual Conference of Int’l Technology Alliance (ACITA 2012).
    7. K. Chan, J.H. Cho, and S. Adali, “Composite Trust Model for an Information Sharing Scenario,” 9th IEEE Int’ Conf. on Autonomic and Trusted Computing (ATC 2012)
    8. M. Chang, J.H. Cho, I.R. Chen, K. Chan, and A. Swami, “Trust-based Task Assignment in Military Tactical Networks,” 17th Int’l Command and Control Research and Technology Symposium (ICCRTS 2012)
    9. J.H. Cho and K. Chan, “A Composite Trust based Public Key Management in MANETs,” 6th USMA Annual Network Science Workshop, 2012.
    10. J.H. Cho, M. Chang, I.R. Chen, and A. Swami, “A Provenance-based Trust Model of Delay Tolerant Networks,” Trust Management VI, IFIP Advances in Information and Communication Technology (AICT, Springer, Editors: Dimitrackos et al.), vol. 374, pp. 52-67, 2012, 6th IFIP Trust Management (IFIPTM 2012).

    2011

      Journal Papers

    1. J.H. Cho and I.R. Chen, “Performance Analysis of Hierarchical Group Key Management Integrated with Adaptive Intrusion Detection in Mobile Ad Hoc Networks,” vol. 68, no. 1, pp. 58-75, Performance Evaluation (Elsevier), Jan. 2011.
    2. J.H. Cho, A. Swami, and I.R. Chen, “A Survey of Trust Management in Mobile Ad Hoc Networks,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562-583, 2011. (Selected for 2016 ARL Publication Award)
    3. J.H. Cho and I.R. Chen, “Model-based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems,” Wireless Personal Communications (Springer), vol. 60, no. 4, 2011, pp. 725-750.

    4. Conferences, Workshops, and/or Symposia Papers

    5. J.H. Cho and A. Swami, and T. Cook, “Combinatorial Auction-based Dynamic Multiple Mission Assignment,” IEEE Military Communications (MILCOM 2011).
    6. G. Dogan, T. Brown, K. Govindan, M. Khan, T. Abdelzaher, P. Mohapatra, and J.H. Cho, “Evaluation of Trust Using Provenance Based on Distributed Local Intelligence,” IEEE Military Communications (MILCOM 2011).
    7. I.R. Chen, F. Bao, M. Chang, and J.H. Cho, “Trust-Based Intrusion Detection in Wireless Sensor Networks,” IEEE International Conference on Communications (ICC 2011)
    8. I.R. Chen, F. Bao, M. Chang, and J.H. Cho, “Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing,” ACM Symposium on Applied Computing (SAC 2011), Trust, Reputation, Evidence and other Collaboration Know-how (TRECK).
    9. M. Chang, I.R. Chen, F. Bao, and J.H. Cho, “Trust-Threshold Based Routing in Delay Tolerant Networks,” Trust Management V, IFIP Advances in Information and Communication Technology (AICT, Springer, Editors: Wakeman et al.), vol. 358, pp. 265-276, 2011, 5th IFIP Trust Management (IFIPTM 2011).
    10. J.H. Cho and A. Swami, “On Tradeoffs between Trust and Survivability using a Game Theoretic Approach,” Trust Management V, IFIP Advances in Information and Communication Technology (AICT, Springer, Editors: Wakeman et al.), vol. 358, pp. 190-205, 2011, 5th IFIP Trust Management (IFIPTM 2011).

    2010

      Journal Papers

    1. J.H. Cho, I.R. Chen, and P.G. Feng, “Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks,” IEEE Transactions on Reliability, vol. 59, no. 1, pp. 231-241, March, 2010.
    2. J.H. Cho and I.R. Chen, “Modeling and Analysis of Intrusion Detection Integrated with Batch Rekeying for Dynamic Group Communication Systems in Mobile Ad Hoc Networks,” ACM/Springer Wireless Networks, vo. 16, no. 4, May 2010, pp. 1157-1173.

    3. Conferences, Workshops, and/or Symposia Papers

    4. I.R. Chen, F. Bao, M. Chang, and J.H. Cho, “Trust Management for Encounter-based Routing in Delay Tolerant Networks,” IEEE Global Communications Conference (GLOBECOM 2010)
    5. J.H. Cho, K. Chan, A. Swami, and B. Rivera, “On Tradeoffs between Trust Accuracy and Resource Consumption in Communications and Social Networks,” Army Science Conference, 2010.
    6. J.H. Cho and A. Swami, “Economic Modeling of a Trust Network via Positive Collusion and Aspiration Adaptation,” 5th USMA Network Science Workshop (2010)
    7. J.H. Cho, A. Swami, and I.R. Chen, “Mission-dependent Trust Management for Highly Heterogeneous Military MANETs,” 15th Int’l Command and Control Research and Technology Symposium (ICCRTS 2010) (Best Paper Finalist)
    8. J.H. Cho, A. Swami and I. R. Chen, “Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs,” Trust Management IV, IFIP Advances in Information and Communication Technology (AICT, Springer, Editors: M. Nishigaki et al.), 2010, vol. 321, pp. 141-15. IFIP Trust Management (IFIPTM 2010).

    2009

      Conferences, Workshops, and/or Symposia Papers

    1. J.H. Cho, A. Swami, and I. R. Chen, “Modeling and Analysis of Trust Management for Cognitive Mission-driven Group Communication Systems in Mobile Ad Hoc Networks,” IEEE/IFIP Int’l Symposium on Trusted Computing and Communications (TrustCom 2009), (Best Paper Award).
    2. J.H. Cho and A. Swami, “Towards Trust-based Cognitive Networks: A Survey on Trust Management for Mobile Ad Hoc Networks,” 14th Int’l Command and Control Research and Technology Symposium (ICCRTS 2009) (Best Paper Finalist)
    3. J.H. Cho and I.R. Chen, “Performance Analysis of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems,” IEEE Int’l Symposium on Parallel and Distributed Processing (IPDPS 2009)-Workshop

    2008

      PhD Dissertation

    1. J.H. Cho, Design and Analysis of QoS-Aware Key Management and Intrusion Detection Protocols for Secure Mobile Group Communications in Wireless Networks, Department of Computer Science, Virginia Tech, Dec. 2018.

    2. Journal Papers

    3. J.H. Cho, I.R. Chen and M. Eltoweissy, “On Optimal Batch Rekeying for Secure Group Communications in Wireless Networks,” ACM/Springer Wireless Networks, vol. 14, no. 6, Dec. 2008, pp. 915-927.
    4. J.H. Cho, I.R. Chen, and D.C. Wang, “Performance Optimization of Region-based Group Key Management in Mobile Ad Hoc Networks,” Performance Evaluation (Elsevier), vol. 65, no. 5, May 2008, pp. 319-344.

    5. Conferences, Workshops, and/or Symposia Papers

    6. J.H. Cho, I.R. Chen, and P.G. Feng, “Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks,” 14th IEEE Pacific Rim Int’l Symposium on Dependable Computing (PRDC 2008)
    7. J.H. Cho and I.R. Chen, “Effect of Intrusion Detection on Secure Group Communication in Hierarchically Structured Group Architectures,” 4th IEEE Int’l Workshop on Network Security (2008).
    8. J.H. Cho, I.R. Chen, and P.G. Feng, “Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks,” 22nd International Conference on Advanced Information Networking and Applications - Workshops (AINAW 2008)

    2006

      Conferences, Workshops, and/or Symposia Papers

    1. I.R. Chen, J.H. Cho and D.C. Wang, “Performance Characteristics of Region-based Group Key Management in Mobile Ad Hoc Networks,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (2006).

    2005

      Conferences, Workshops, and/or Symposia Papers

    1. J.H. Cho and I.R. Chen, “On Design Tradeoffs Between Security and Performance in Wireless Group Communicating Systems,” IEEE 1st Workshop on Secure Network Protocols (NPSec 2005)
    2. J.H. Cho, I.R. Chen and M. Eltoweissy, “Optimization of Batch Rekey Interval for Secure Group Communications in Wireless Networks,” IEEE International Conference on Wireless Networks, Communications, and Mobile Computing (Wirelesscom 2005)

    2004

    Master Thesis

    • J.H. Cho, Design, Implementation, and Analysis of Wireless Ad Hoc Messenger, using Pocket PCs and Microsoft .Net Compact Framework, Department of Computer Science, Virginia Tech, Aug. 2004