Follow
George Corser
George Corser
Assistant Professor of Computer Science and Information Systems, Saginaw Valley State University
Verified email at svsu.edu - Homepage
Title
Cited by
Cited by
Year
Classification approach for intrusion detection in vehicle systems
A Alshammari, MA Zohdy, D Debnath, G Corser
Wireless Engineering and Technology 9 (4), 79-94, 2018
1042018
Evaluating Location Privacy in Vehicular Communications and Applications
GP Corser, H Fu, A Banihani
IEEE, 2016
742016
Privacy-by-decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services
G Corser, H Fu, T Shu, P D'Errico, W Ma, S Leng, Y Zhu
2014 IEEE Intelligent Vehicles Symposium Proceedings, 1030-1036, 2014
282014
Internet of things security best practices
G Corser, G Fink
IEEE Internet Technology Policy Community White Paper, 2017
172017
Endpoint Protection Zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks
G Corser, H Fu, T Shu, P D'Errico, W Ma
2013 International Conference on Connected Vehicles and Expo (ICCVE), 369-374, 2013
172013
Sybil attacks and defenses in internet of things and mobile social networks
A Alharbi, M Zohdy, D Debnath, R Olawoyin, G Corser
International Journal of Computer Science Issues (IJCSI) 15 (6), 36-41, 2018
162018
Blockchain adoption, implementation and integration in healthcare application systems
W Bodeis, GP Corser
SoutheastCon 2021, 1-3, 2021
132021
Effect on vehicle safety of nonexistent or silenced basic safety messages
GP Corser, A Arenas, H Fu
2016 international conference on computing, networking and communications …, 2016
112016
T-PAAD: Trajectory privacy attack on autonomous driving
A Banihani, A Alzahrani, R Alharthi, H Fu, GP Corser
2018 IEEE Conference on Communications and Network Security (CNS), 1-2, 2018
72018
Maps: A multi-dimensional password scheme for mobile authentication
J Gurary, Y Zhu, G Corser, J Oluoch, N Alnahash, H Fu
Proceedings of the 2015 International Conference on Interactive Tabletops …, 2015
72015
CMAPS: a chess-based multi-facet password scheme for mobile devices
Y Zhu, J Gurary, G Corser, J Oluoch, N Alnahash, H Fu, J Tang
IEEE Access 6, 54795-54810, 2018
52018
Internet of Things (IoT) Security Best Practices; IEEE Internet Technology Policy Community; White Paper
G Corser, G Fink, J Bielby
IEEE: Piscataway, NJ, USA, 2017
52017
Location Privacy, Application Overhead and Congestion in VANET Location Based Services
GP Corser, A Banihani, J Cox, R Hoque, H Fu, Y Zhu
2017 ieee 3rd international conference on big data security on cloud …, 2017
42017
IoT Security Principles and Best Practices
G Corser, GA Fink, M Aledhari, J Bielby, R Nighot, S Mandal, N Aneja, ...
42017
Energy prediction based intrusion detection in wireless sensor networks
N Alrajei, G Corser, H Fu, Y Zhu
International Journal of Emerging Technology and Advanced Engineering 4 (2), 2014
42014
Internet of Things (IOT) Security Best Practices: whitepaper, IEEE, 2017
G Corser, GA Fink, M Aledhari, J Bielby, R Nighot, S Mandal, N Aneja, ...
3
Classification of Mobile Healthcare App Research
NR Senjaliya, GP Corser
SoutheastCon 2021, 1-5, 2021
22021
Classification of Blockchain Implementation in Mobile Electronic Health Records and Internet of Medical Things Devices Research
J Reinert, G Corser
SoutheastCon 2021, 01-05, 2021
22021
Protecting vehicle privacy using dummy events
N Alnahash, G Corser, H Fu, Y Zhu
2014 American Society For Engineering Education North Central Section …, 2014
22014
Position Altered Random Repetition of Transportation Signature (PARROTS): a VANET Privacy Model
G Corser, H Fu, N Pondicherry, N Alnahash
22013
The system can't perform the operation now. Try again later.
Articles 1–20