Follow
Tanya G Roosta
Tanya G Roosta
Applied research scientist
Verified email at mfe.berkeley.edu
Title
Cited by
Cited by
Year
Security and privacy issues with health care information technology
M Meingast, T Roosta, S Sastry
2006 international conference of the IEEE engineering in medicine and …, 2006
4742006
Time synchronization attacks in sensor networks
M Manzo, T Roosta, S Sastry
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor …, 2005
1712005
Taxonomy of security attacks in sensor networks and countermeasures
T Roosta, S Shieh, S Sastry
The first IEEE international conference on system integration and …, 2006
1662006
Key management and secure software updates in wireless process control environments
DK Nilsson, T Roosta, U Lindqvist, A Valdes
Proceedings of the first ACM conference on Wireless network security, 100-108, 2008
1642008
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
AA Cardenas, T Roosta, S Sastry
Ad Hoc Networks 7 (8), 1434-1447, 2009
1422009
Instrumenting wireless sensor networks for real-time surveillance
S Sastry, M Manzo, S Oh, P Chen
Proceedings 2006 IEEE International Conference on Robotics and Automation …, 2006
1272006
A testbed for secure and robust SCADA systems
A Giani, G Karsai, T Roosta, A Shah, B Sinopoli, J Wiley
ACM SIGBED Review 5 (2), 1-4, 2008
1132008
Probabilistic geographic routing protocol for ad hoc and sensor networks
T Roosta, M Menzo, S Sastry
Proceeding (474) wireless networks and emerging technologies, 2005
782005
Transactional confidentiality in sensor networks
S Pai, M Meingast, T Roosta, S Bermudez, SB Wicker, DK Mulligan, ...
IEEE Security & Privacy 6 (4), 28-35, 2008
592008
Convergence analysis of reweighted sum-product algorithms
TG Roosta, MJ Wainwright, SS Sastry
IEEE Transactions on Signal Processing 56 (9), 4293-4305, 2008
582008
An intrusion detection system for wireless process control systems
T Roosta, DK Nilsson, U Lindqvist, A Valdes
2008 5th IEEE international conference on mobile ad hoc and sensor systems …, 2008
532008
Distributed reputation system for tracking applications in sensor networks
T Roosta, M Meingast, S Sastry
2006 3rd Annual International Conference on Mobile and Ubiquitous Systems …, 2006
322006
Attacks and defenses of ubiquitous sensor networks
TG Roosta
University of California, Berkeley, 2008
292008
Confidentiality in sensor networks: Transactional information
S Pai, M Meingast, T Roosta, S Bermudez, S Wicker, DK Mulligan, ...
IEEE Security and Privacy magazine, 2008
202008
Inherent security of routing protocols in ad-hoc and sensor networks
T Roosta, S Pai, P Chen, S Sastry, S Wicker
IEEE GLOBECOM 2007-IEEE Global Telecommunications Conference, 1273-1278, 2007
202007
Using social network theory towards development of wireless ad hoc network trust
S Pai, T Roosta, S Wicker, S Sastry
21st International Conference on Advanced Information Networking and …, 2007
202007
Integrity checker for wireless sensor networks in health care applications
A Giani, T Roosta, S Sastry
2008 Second International Conference on Pervasive Computing Technologies for …, 2008
162008
Testbed implementation of a secure flooding time synchronization protocol
T Roosta, WC Liao, WC Teng, S Sastry
2008 IEEE Wireless Communications and Networking Conference, 3157-3162, 2008
152008
Robust estimation and detection in ad hoc and sensor networks
T Roosta, SM Mishra, A Ghazizadeh
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 236-245, 2006
152006
Cyber security basic defenses and attack trends
AA Cárdenas, T Roosta, G Taban, S Sastry
Homeland Security Technology Challenges, 73-101, 2008
132008
The system can't perform the operation now. Try again later.
Articles 1–20