Wade Trappe spends much of his time researching Computer network, Wireless, Wireless sensor network, Authentication and Computer security. His Computer network research is multidisciplinary, incorporating perspectives in Cryptography, Wireless ad hoc network, Wireless network, Key distribution in wireless sensor networks and Channel surfing. The study incorporates disciplines such as Node, Robust random early detection and Spoofing attack in addition to Wireless network.
His biological study spans a wide range of topics, including Eavesdropping and Communication channel, Fading. Wade Trappe has researched Wireless sensor network in several fields, including Sensor node, Information security and Distributed computing. His work is dedicated to discovering how Computer security, Cloud computing security are connected with Asset and other disciplines.
Wade Trappe mainly investigates Computer network, Computer security, Wireless, Wireless network and Wireless sensor network. In his study, Rekeying is inextricably linked to Distributed computing, which falls within the broad field of Computer network. His Computer security research integrates issues from Cognitive radio and Cloud computing security.
His Wireless research includes elements of Eavesdropping, Secrecy and Communication channel. His work in the fields of Wireless network, such as Wi-Fi array, overlaps with other areas such as Jamming. His research in Wireless sensor network intersects with topics in Sensor node, Key distribution in wireless sensor networks, Mobile wireless sensor network, Channel surfing and Robustness.
Jamming, Mathematical optimization, Computer network, Communications system and Nash equilibrium are his primary areas of study. His Computer network study combines topics from a wide range of disciplines, such as Cognitive radio, Usability and Metric. The study incorporates disciplines such as Radar, Eavesdropping, Transmission and Boundary in addition to Communications system.
His work deals with themes such as Transmitter and Fading, which intersect with Nash equilibrium. His Obfuscation study in the realm of Computer security interacts with subjects such as Resource. To a larger extent, Wade Trappe studies Wireless with the aim of understanding Wireless network.
Wade Trappe mostly deals with Jamming, Game theory, Computer network, Mathematical optimization and Bayesian game. Wade Trappe performs multidisciplinary study in Jamming and Wireless network in his work. His Wireless network research is multidisciplinary, incorporating elements of Computer security and Adversary.
His Computer network study combines topics in areas such as Exploit and Secrecy. The various areas that Wade Trappe examines in his Mathematical optimization study include Radar, Stochastic game and Communications system. His Bayesian game research also works with subjects such as
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The feasibility of launching and detecting jamming attacks in wireless networks
Wenyuan Xu;Wade Trappe;Yanyong Zhang;Timothy Wood.
mobile ad hoc networking and computing (2005)
Introduction to Cryptography with Coding Theory
Lawrence C. Washington;Wade Trappe.
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Suhas Mathur;Wade Trappe;Narayan Mandayam;Chunxuan Ye.
acm/ieee international conference on mobile computing and networking (2008)
Jamming sensor networks: attack and defense strategies
Wenyuan Xu;Ke Ma;W. Trappe;Yanyong Zhang.
IEEE Network (2006)
Enhancing Source-Location Privacy in Sensor Network Routing
P. Kamat;Yanyong Zhang;W. Trappe;C. Ozturk.
international conference on distributed computing systems (2005)
Robust statistical methods for securing wireless localization in sensor networks
Zang Li;Wade Trappe;Yanyong Zhang;Badri Nath.
information processing in sensor networks (2005)
Anti-collusion fingerprinting for multimedia
W. Trappe;Min Wu;Z.J. Wang;K.J.R. Liu.
IEEE Transactions on Signal Processing (2003)
Detecting and Localizing Wireless Spoofing Attacks
Yingying Chen;W. Trappe;R.P. Martin.
sensor mesh and ad hoc communications and networks (2007)
Source-location privacy in energy-constrained sensor network routing
Celal Ozturk;Yanyong Zhang;Wade Trappe.
security of ad hoc and sensor networks (2004)
ParkNet: drive-by sensing of road-side parking statistics
Suhas Mathur;Tong Jin;Nikhil Kasturirangan;Janani Chandrasekaran.
international conference on mobile systems, applications, and services (2010)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: