My research is in the broad areas of network security and traffic
control, and their intersection. Specific problems of interest include:
- malware
- critical infrastructure attacks and protection
- measurement-based traffic classification and modeling
- web filtering
- intrusion detection and modeling
Security-related Publications:
- T. Chen, J-C. Sanchez-Aarnoutse, J. Buford, "Petri nets models for cyber-physical attacks in smart grid," IEEE Trans. on Smart Grid, vol. 2, Dec. 2011, pp. 741-749
- T. Chen, "Information warfare," tutorial at IEEE Globecom 2011, Nov. 2011
- S. Abu-Nimeh, T. Chen, O. Alzubi, "Malicious and spam posts in online social networks," IEEE Computer, vol. 44, Sept. 2011, pp. 23-28
- T. Chen, "Cyber crime," The House (magazine for UK House of Parliament), vol. 36, May 2, 2011, p. 32
- T. Chen, S. Abu-Nimeh, "Lessons from Stuxnet," IEEE Computer, vol. 44, April 2011, pp. 79-81
- S. Abu-Nimeh, T. Chen, "Proliferation and detection of blog
spam," IEEE Security and Privacy, vol. 8, Sept./Nov. 2010, pp. 42-47
- T. Chen, N. Jamil, "A mathematical view of self-replicating
malware," chapter in Handbook of
Security and Networks, Y. Xiao, F. Li, H. Chen (eds.), World
Scientific Publishing, to appear 2011
- A. Olteanu, Y. Xiao, J. Liu, T. Chen, "Studying non-intrusive
tracing in the Internet," 7th Int.
ICST Conf. on Heterogeneous Networking for Quality, Reliability,
Security and Robustness (QShine 2010), Houston, November 17-19,
2010
- T. Chen, "Survey of cyber security issues in smart grids", SPIE Defense, Security and Sensing
(DSS 2010), Orlando, April 5-9, 2010, pp. 77090D
- T. Chen, V. Wang, "Web filtering and censoring," IEEE Computer, vol. 43, March 2010,
pp. 77-80
- T. Chen, J. Buford, "Design of a honeypot for SQL injection
attacks," 5th IEEE LCN Workshop on
Security in Communication Networks (SICK 2009), Zurich, Oct
2009, pp. 915-921
- N. Jamil, T. Chen, "A mathematical view of network-based
suppressions of worm epidemics," IEEE
ICC 2009, Dresden, June 14-18, 2009, pp. 1-5
- T. Chen, "Identity theft through the Web," chapter in Handbook of Research on Computational
Forensics, Digital Crime and Investigation: Methods and Solutions,
C.-T. Li (ed.), IGI Global, 2009
- H. Patil, D. Wing, T. Chen, "VoIP security," chapter in Computer and Information Security Handbook,
J. Vacca (ed.), Morgan Kaufmann, 2009
- T. Chen, P. Walsh, "Guarding against network intrusions," chapter
in Computer and Information Security
Handbook, J. Vacca (ed.), Morgan Kaufmann, 2009
- C. Chen, T. Chen, R. Sethi, "Spam e-mail detection and
classification: a Bayes/empirical Bayes approach," ASA Joint Statistical Meeting 2008,
Denver, Aug. 3-7, 2008
- T. Chen, J. Fu, "Protection of privacy on the Web," chapter in Handbook of Research on Social and
Political Implications of Data Mining and Information Privacy:
Interdisciplinary Frameworks and Solutions, E. Eyob (ed.), IGI
Global, 2008 [PDF]
- T. Chen, G. Tally, "Network worms," chapter in Encyclopedia of Information Science and
Technology, 2nd ed., M. Khosrow-Pour (ed.), IGI Global, 2008 [PDF]
- T. Chen, C. Davis, "An overview of electronic attacks," chapter
in Information Security and Ethics: Concepts, Methodologies, Tools
and Applications, H. Nemati (ed.), IGI Global, 2008 [PDF]
- T. Chen, "Information security and risk management," chapter in Encyclopedia
of Multimedia Technology and Networking, 2nd ed., M. Pagani
(ed.), IGI Global, 2008 [PDF]
- T. Chen, C. Peikari, "Malicious software in mobile devices,"
chapter in Handbook of Research on Wireless Security, Y. Zhang,
J. Zheng, M. Ma (eds.), IGI Global, 2008 [PDF]
- R. Chitnis, T. Chen, "Protection against identity threats in
early IP multimedia subsystem (IMS)," chapter in IEC Annual Review of Communications,
vol. 60, Jan. 2008
- H. Patil, T. Chen, "Authentication in session initiation
protocol," chapter in IEC Annual
Review of Communications, vol. 60, Jan. 2008
- T. Chen, G-S. Kuo, Z-P. Li, G-M. Zhu, "Intrusion detection in
wireless mesh networks," chapter in Security in Wireless
Mesh Networks, Y. Zhang, J. Zheng, H. Hu (eds.), CRC Press, 2007 [PDF]
- T. Chen, N. Nguyen, "Authentication and privacy," chapter in Encyclopedia
of Wireless and Mobile Communications, B. Furht (ed.), CRC Press,
2007 [PDF]
- T. Chen, G. Tally, "Malicious software," chapter in Encyclopedia
of Internet Technologies and Applications, M. Freire, M. Pereira
(eds.), IGI Global, 2007 [PDF]
- N. Jamil, T. Chen, "A Web-based network worm simulator,"
IEEE ICC 2007, June 25-27, 2007, Glasgow [PDF]
- G. Tally, D. Sames, T. Chen, C. Colleran, D. Jevans, K.
Omiliak, R. Rasmussen, "The Phisherman project: creating a
comprehensive data collection to combat phishing attacks," J. of
Digital Forensic Practice, vol. 1, June 2006, pp. 115 - 129 [PDF]
- T. Chen, N. Jamil, "Worm epidemiology," China Communications,
vol. 3, August 2006, pp. 27-31 [PDF]
- N. Jamil, T. Chen, "Effectiveness of rate control in slowing down
worm epidemics," Globecom 2006, Nov. 27-30, 2006, San
Francisco [PDF]
- T. Chen, N. Jamil, "Effectiveness of quarantine in worm
epidemics," ICC 2006, June 11-15, 2006, Istanbul, Turkey [PDF]
- T. Chen, "An epidemiological view of worms and viruses," chapter
in IEC Annual Review of Communications, vol. 59, Fall 2006 [PDF]
- T. Chen, C. Davis, "An overview of electronic attacks," chapter
in Digital Crime and Forensic Science in Cyberspace, P.
Kanellis, E. Kiountouzis, N. Kolokotronis, D. Martakos (eds.), IGI
Global, 2006 [PDF]
- T. Chen, V. Venkataramanan, "Dempster-Shafer theory for
distributed intrusion detection in ad hoc networks," IEEE Internet
Computing, vol. 9, Nov./Dec. 2005, pp. 35-41 [PDF]
- T. Chen, "The latest malware threats against your PC," talk at
Southern Methodist University, October 11, 2005 [PDF]
- T. Chen, "How to avoid losing your money and identity to
phishing," talk at Southern Methodist University, February 16, 2005 [PDF]
- T. Chen, "Towards end-to-end security," chapter in IEC Annual
Review of Communications, vol. 58, Fall 2005 [PDF preprint]
- T. Chen, M. Elder, J. Thompson, "Electronic attacks," chapter in The
Handbook of Information Security, Hosain Bidgoli (ed.), John Wiley
& Sons, 2005 [PDF preprint]
- T. Chen, "Phishing to steal your PC, money and identity," talk at
London Metropolitan University, December 8, 2004 [PDF]
- T. Chen, "Parallels between computer and biological epidemics,"
talk at London Metropolitan University, November 11, 2004 [PDF]
- T. Chen, "Malware research at SMU," talk at BT, November 5, 2004 [PDF]
- T. Chen, "Research in computer viruses and worms," talk at London
Metropolitan University, October 6, 2004 [PDF]
- T. Chen, "Network-based intrusion detection," talk at Beijing
University of Posts and Telecom, August 9, 2004 [PDF]
- T. Chen, "Viruses and worms," talk at Beijing University of Posts
and Telecom, August 10, 2004 [PDF]
- T. Chen, "Denial of service," talk at Beijing University of Posts
and Telecom, August 11, 2004 [PDF]
- T. Chen, "Intrusion detection for viruses and worms," chapter in IEC
Annual Review of Communications, vol. 57, Fall 2004 [PDF preprint]
- T. Chen, J-M. Robert, "The evolution of viruses and worms,"
chapter in Statistical Methods in Computer Security, William
Chen (ed.), Marcel Dekker, 2004 [PDF
preprint]
- T. Chen, J-M. Robert, "Worm epidemics in high-speed networks," IEEE
Computer, vol. 37, June 2004, pp. 48-53 [PDF]
- T. Chen, "Intrusion detection in mobile ad hoc networks," talk at
Rockwell Collins, May 20, 2004 [PDF]
- T. Chen, "Trends in viruses and worms," Internet Protocol
Journal, vol. 6, Sept. 2003, pp. 23-33 [PDF]
- T. Chen, "Trends in viruses and worms," talk to IEEE Computer
Society Dallas Section, Oct 16, 2003 [PDF]
Traffic-related Publications:
- E. Serpedin, T. Chen, D. Rajan (eds.), Mathematical Foundations for Signal Processing, Communications, and Networking, CRC Press, 2012
- T. Chen, "Queueing theory," chapter in Mathematical Foundations for Signal Processing, Communications, and Networking, E. Serpedin, T. Chen, D. Rajan (eds.), CRC Press, 2012
- J. He, Z. Tang, T. O'Farrell, T. Chen, "Performance analysis of
DSRC priority mechanism for road safety applications in vehicular
networks," Wireless Communications
and Mobile Computing Journal, vol. 11, July 2011, pp. 980-990
- T. Chen, J. Buford, "Services in smart grids," chapter in Advances in Next Generation Services and
Service Architectures, A. Prasad, J. Buford, V. Gurbani (eds.),
River Publishers, April 2011
- J. He, H.-H. Chen, T. Chen, W. Cheng, "Adaptive congestion
control for DSRC vehicle networks," IEEE
Communications Letters, vol. 14, Feb. 2010, pp. 127-129
- Y. Zeng, T. Chen, "Classification of traffic flows into QoS
classes by unsupervised learning and KNN clustering," KSII Trans. on Internet and Information
Systems, vol. 3, no. 2, April 2009, pp. 134-146
- Y. Zhang, S. Mao, L. Yang, T. Chen (eds.), Broadband Mobile Multimedia: Techniques
and Applications, CRC Press (Taylor & Francis Group), 2008
- T. Chen, "From circuit switched to IP-based networks," chapter in
Encyclopedia of Multimedia Technology and Networking, 2nd
ed., M. Pagani (ed.), IGI Global, 2008 [PDF]
- T. Chen, "Traffic control," chapter in Encyclopedia of
Internet Technologies and Applications, M. Freire, M. Pereira
(eds.), IGI Global, 2007 [PDF]
- T. Chen, "Network traffic modeling," chapter in Handbook of
Computer Networks, H. Bigdoli (ed.), Wiley, 2007 [PDF]
- T. Chen, "Network traffic management," chapter in Handbook of
Computer Networks, H. Bigdoli (ed.), Wiley, 2007 [PDF]
- J. Ko, T. Chen, "A decision theoretic approach to
measurement-based admission control," ICC 2006, June 11-15,
2006, Istanbul, Turkey [PDF]
- H. ElAdly, T. Chen, “Enhancing the support of multi hopping
in an IEEE 802.11 ad-hoc network,” 9th IEEE Symposium on
Computers and Communications (ISCC 2004), Alexandria, June 29 -
July 1, 2004, pp. 158-163 [PDF]
- Y. Zeng, T. Chen, “Measurement-based real-time traffic
model classification,” ICC 2004, June 21-25, 2004, Paris,
France, pp. 1857-1861 [PDF]
- H. ElAdly, T. Chen, “An overlay algorithm to improve the
support of multi-hopping in the IEEE 802.11 WLANs,” ICC 2004,
June 21-25, 2004, Paris, France, pp. 3817-3821 [PDF]
- N. Sadek, A. Khotanzad, T. Chen, “Adaptive
measurement-based admission control using neural network
predictor,” IEEE Canadian Conference on Electrical and
Computer Engineering 2004 (CCECE 2004), May 2-5, 2004, Ontario,
Canada
- H. ElAdly, T. Chen, “Performance modeling of overlapping
IBSSs in the IEEE 802.11 DCF mode,” presented at 46th IEEE
Int. Midwest Symp. on Circuits and Systems (MWSCAS), Dec. 27-30,
2003, Cairo, Egypt, pp. 486-489 [PDF]
- N. Sadek, A. Khotanzad, T. Chen, “ATM dynamic bandwidth
allocation using F-ARIMA prediction model,” 12th
International Conf. on Computer Communications and Networks (ICCCN 2003),
Oct. 20-22, 2003, pp. 359-363 [PDF]
- T. Chen, S. Liu, "ATM Switching," chapter in Wiley
Encyclopedia of Telecommunications, John Proakis (ed.), Wiley, Dec.
2002 [PDF]
- Y. Zeng, T. Chen, "Automatic classification of measured Internet
traffic," IEEE Workshop on IP Operations and Management 2002 (IPOM
2002), October 29-31, 2002, Dallas, TX, pp. 197-201 [PDF]
- T. Chen, L. Hu, "Internet performance monitoring," Proceedings
of the IEEE, vol. 90, Sept. 2002, pp. 1592-1603 [PDF]
- T. Chen, S. Liu, "A model and evaluation of distributed network
management approaches," IEEE J. on Selected Areas in Commun.,
vol. 20, May 2002, pp. 850-857 [PDF]
- T. Chen, "Internet computing as a utility," IEEE
Communications Mag., vol. 40, May 2002, p. 10 [PDF]
- H. Tran, T. Chen, "Theoretical network load limit when
self-similarity has no adverse effect on the network," 2001 IEEE
Workshop on High Performance Switching and Routing (HPSR 2001), May
29-31, 2001, Dallas, pp. 135-140 [PDF]
- Y. Zhu, T. Chen, S. Liu, "Models and analysis of trade-offs in
distributed network management approaches," 7th IFIP/IEEE Int.
Symp. on Integrated Network Management (IM 2001), Seattle, May
14-18, 2001, pp. 391-404 [PDF]
- T. Chen, "Increasing the observability of Internet behavior," Communications
of the ACM, vol. 44, January 2001, pp. 93-98 [PDF]
- T. Oh, T. Chen, J. Kennington, "Fault restoration and spare
capacity allocation with QoS constraints for MPLS networks," IEEE
Globecom 2000, San Francisco, Nov. 27- 30, 2000, pp. 1731-1735 [PDF]
- T. Chen, S. Liu, M. Procanik, "Method and system for monitoring
broadband quality of services," US patent no. 6,097,699, issued Aug. 1,
2000 [PDF]
- T. Chen, "Evolution to the programmable Internet," IEEE
Communications Mag., vol. 38, March 2000, pp. 124-129 [PDF]
- T. Chen, T. Oh, "Reliable services in MPLS," IEEE
Communications Mag., vol. 37, Dec. 1999, pp. 58-62 [PDF]
- T. Chen, "Characterization of ATM on-off traffic from cell
traffic measurements," 3rd IEEE Int. Workshop on Broadband
Switching Systems (BSS'99), Kingston, Ontario, June 1-3, 1999, pp.
53-57 [PDF]
- N. Yamanaka, E. Oki, H. Hasegawa, T. Chen, "User-programmable
flexible ATM network architecture, Active-ATM," IEICE Trans. on
Communications, vol. E81-B, no. 11, Nov. 1998, pp. 2233-2236 [PDF]
- T. Chen, S. Liu, "Method and apparatus for performance monitoring
in electronic communications networks," US patent no. 5,793,976, issued
August 11, 1998 [PDF]
- N. Yamanaka, E. Oki, H. Hasegawa, T. Chen, "Active-ATM:
user-programmable flexible ATM network architecture," ICC'98
Workshop on Active and Programmable Networks, Atlanta, GA, June 11,
1998.
- T. Chen, S. Liu, M. Procanik, D. Wang, D. Casey, "INQIRE: a
software approach to monitoring QoS in ATM networks," IEEE Network
Mag., vol. 12, March/April 1998, pp. 32-37 [PDF]
- T. Chen, S. Liu, D. Wang, V. Samalam, M. Procanik, D. Kavouspour,
"Monitoring and control of ATM networks using special cells," IEEE
Network Mag., vol. 10, Sept./Oct. 1996, pp. 28-38 [PDF]
- T. Chen, S. Liu, V. Samalam, "The available bit-rate service for
data in ATM networks," IEEE Communications Mag., vol. 34, May
1996, pp. 56-71 [PDF]
- T. Chen, V. Samalam, "Time-dependent behavior of fluid buffer
models with Markov input and constant output rates," SIAM Journal
on Applied Mathematics, vol. 55, pp. 784-799, June 1995 [PDF]
- T. Chen, J. Walrand, D. Messerschmitt, "Parameter estimation for
partially observed queues," IEEE Trans. on Communications, vol.
42, pp. 2730-2739, Sept. 1994 [PDF]
- T. Chen, S. Liu, "Management and control functions in ATM
switching systems," IEEE Network Mag., vol. 8, pp. 27-40,
July/Aug. 1994 [PDF]
- T. Chen, J. Walrand, D. Messerschmitt, "Dynamic priority
protocols for packet voice," IEEE J. on Selected Areas in
Communications, vol. 7, pp. 632-643, June 1989 [PDF]
- T. Chen, "On the independence of sojourn times in tandem queues,"
Advances in Applied Probability, vol. 21, pp. 488-489, June
1989 [PDF]
- T. Chen, D. Messerschmitt, "Integrated voice/data switching," IEEE
Communications Mag., vol. 26, pp. 16-26, June 1988 [PDF]
Current and past sponsors: