


default search action
Terrence J. Moore
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j19]Nhung H. Nguyen, Mengmeng Ge, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim:
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation. Comput. Secur. 150: 104229 (2025) - 2024
- [j18]Justin Kong
, Terrence J. Moore
, Fikadu T. Dagefu
:
Decentralized Covert Routing in Heterogeneous Networks Using Reinforcement Learning. IEEE Commun. Lett. 28(11): 2683-2687 (2024) - [j17]Justin Kong
, Fikadu T. Dagefu
, Terrence J. Moore
:
Covert Routing in Heterogeneous Networks. IEEE Trans. Inf. Forensics Secur. 19: 7047-7059 (2024) - [c32]Nhung H. Nguyen, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim
:
AuSSE: A Novel Framework for Security and Safety Evaluation for Autonomous Vehicles. DSN-S 2024: 1-5 - [c31]Brian Kim, Justin Kong, Terrence J. Moore, Fikadu T. Dagefu:
Reinforcement Learning Based Covert Routing with Node Failure Resiliency for Heterogeneous Networks. MILCOM 2024: 709-714 - [c30]Han Jun Yoon, David Soon, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Dongseong Kim, Frederica F. Nelson, Jin-Hee Cho:
Intrusion Response System for In-Vehicle Networks: Uncertainty-Aware Deep Reinforcement Learning-based Approach. MILCOM 2024: 827-832 - [c29]Rahul Aggarwal
, Justin Kong, Terrence J. Moore
, Jihun Choi
, Predrag Spasojevic
, Fikadu T. Dagefu
:
Covert Communications with Simultaneous Multi-Modal Transmission. WISEC 2024: 1-7 - [i7]Justin Kong, Terrence J. Moore, Fikadu T. Dagefu:
Decentralized Covert Routing in Heterogeneous Networks Using Reinforcement Learning. CoRR abs/2402.10087 (2024) - 2023
- [c28]Qisheng Zhang
, Jin-Hee Cho
, Terrence J. Moore
, Dan Dongseong Kim
, Hyuk Lim
, Frederica Nelson
:
EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning. ACNS (1) 2023: 555-582 - [c27]C. Hakan Arslan, Fikadu T. Dagefu, Jeffrey N. Twigg, Terrence J. Moore:
Non-Line-Of-Sight Ranging via Ultraviolet Signals. ICMCIS 2023: 1-6 - [c26]Terrence J. Moore, Fikadu T. Dagefu, C. Hakan Arslan, Michael J. Weisman, Robert J. Drost:
Range Estimation of an Ultraviolet Communication Source using a Mobile Sensor. WCNC 2023: 1-6 - 2022
- [j16]Qisheng Zhang
, Abdullah Zubair Mohammed, Zelin Wan
, Jin-Hee Cho
, Terrence J. Moore
:
Diversity-by-Design for Dependable and Secure Cyber-Physical Systems: A Survey. IEEE Trans. Netw. Serv. Manag. 19(1): 706-728 (2022) - [j15]Sunghwan Kim
, Seunghyun Yoon
, Jin-Hee Cho
, Dong Seong Kim
, Terrence J. Moore
, Frederica Free-Nelson, Hyuk Lim
:
DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework. IEEE Trans. Netw. Serv. Manag. 19(4): 4834-4846 (2022) - [c25]Hyejin Kim, Dan Dongseong Kim
, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim:
Continual Learning with Network Intrusion Dataset. IEEE Big Data 2022: 6702-6704 - [c24]Tina Moghaddam
, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim
:
A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks. DSN Workshops 2022: 103-110 - [c23]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Dan Dongseong Kim
:
Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment. PRDC 2022: 119-129 - [c22]Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore, Frederica F. Nelson, Ryan K. L. Ko
, Dan Dongseong Kim
:
Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments. QRS 2022: 276-286 - 2021
- [j14]Seunghyun Yoon
, Jin-Hee Cho
, Dong Seong Kim
, Terrence J. Moore
, Frederica Free-Nelson, Hyuk Lim
:
DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework. IEEE Access 9: 70700-70714 (2021) - [j13]Zelin Wan
, Yash Mahajan, Beom Woo Kang
, Terrence J. Moore
, Jin-Hee Cho
:
A Survey on Centrality Metrics and Their Network Resilience Analysis. IEEE Access 9: 104773-104819 (2021) - [j12]Qisheng Zhang
, Jin-Hee Cho
, Terrence J. Moore
, Ing-Ray Chen
:
Vulnerability-Aware Resilient Networks: Software Diversity-Based Network Adaptation. IEEE Trans. Netw. Serv. Manag. 18(3): 3154-3169 (2021) - [c21]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Frederica Free-Nelson:
DREVAN: Deep Reinforcement Learning-based Vulnerability-Aware Network Adaptations for Resilient Networks. CNS 2021: 137-145 - [c20]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore:
Network Resilience Under Epidemic Attacks: Deep Reinforcement Learning Network Topology Adaptations. GLOBECOM 2021: 1-7 - 2020
- [j11]Jin-Hee Cho
, Dilli P. Sharma
, Hooman Alavizadeh
, Seunghyun Yoon
, Noam Ben-Asher
, Terrence J. Moore
, Dong Seong Kim
, Hyuk Lim
, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutorials 22(1): 709-745 (2020) - [j10]Dilli P. Sharma
, Simon Yusuf Enoch
, Jin-Hee Cho, Terrence J. Moore, Frederica F. Nelson, Hyuk Lim
, Dong Seong Kim
:
Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense. J. Netw. Comput. Appl. 170: 102805 (2020) - [j9]Seunghyun Yoon
, Jin-Hee Cho
, Dong Seong Kim
, Terrence J. Moore
, Frederica Free-Nelson, Hyuk Lim
:
Attack Graph-Based Moving Target Defense in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 17(3): 1653-1668 (2020) - [c19]Dong Seong Kim, Minjune Kim, Jin-Hee Cho, Hyuk Lim, Terrence J. Moore
, Frederica F. Nelson:
Design and Performance Analysis of Software Defined Networking Based Web Services Adopting Moving Target Defense. DSN (Supplements) 2020: 43-44 - [c18]Júlio Mendonça
, Jin-Hee Cho, Terrence J. Moore
, Frederica F. Nelson, Hyuk Lim, Armin Zimmermann, Dong Seong Kim
:
Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms. SAC 2020: 1180-1189 - [i6]Qisheng Zhang, Jin-Hee Cho, Terrence J. Moore, Ing-Ray Chen:
Vulnerability-Aware Resilient Networks: Software Diversity-based Network Adaptation. CoRR abs/2007.08469 (2020) - [i5]Qisheng Zhang, Abdullah Zubair Mohammed, Zelin Wan, Jin-Hee Cho, Terrence J. Moore:
Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey. CoRR abs/2007.08688 (2020) - [i4]Zelin Wan, Yash Mahajan, Beom Woo Kang, Terrence J. Moore, Jin-Hee Cho:
A Survey on Centrality Metrics and Their Implications in Network Resilience. CoRR abs/2011.14575 (2020)
2010 – 2019
- 2019
- [j8]Terrence J. Moore
, Jin-Hee Cho
, Ing-Ray Chen
:
Network Adaptations Under Cascading Failures for Mission-Oriented Networks. IEEE Trans. Netw. Serv. Manag. 16(3): 1184-1198 (2019) - [c17]Jargalsaikhan Narantuya, Seunghyun Yoon
, Hyuk Lim, Jin-Hee Cho, Dong Seong Kim
, Terrence J. Moore
, Frederica Nelson:
SDN-Based IP Shuffling Moving Target Defense with Multiple SDN Controllers. DSN (Supplements) 2019: 15-16 - [c16]Dilli P. Sharma
, Jin-Hee Cho, Terrence J. Moore
, Frederica F. Nelson, Hyuk Lim, Dong Seong Kim
:
Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. ICC 2019: 1-6 - [c15]Seunghyun Yoon, Jin-Hee Cho, Dong Seong Kim
, Terrence J. Moore
, Frederica Nelson, Hyuk Lim:
Poster: Address Shuffling based Moving Target Defense for In-Vehicle Software-Defined Networks. MobiCom 2019: 103:1-103:3 - [c14]Cole Dishington, Dilli P. Sharma
, Dong Seong Kim
, Jin-Hee Cho, Terrence J. Moore
, Frederica F. Nelson:
Security and Performance Assessment of IP Multiplexing Moving Target Defence in Software Defined Networks. TrustCom/BigDataSE 2019: 288-295 - [i3]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh
, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore
, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. CoRR abs/1909.08092 (2019) - 2018
- [c13]Jin-Hee Cho, Terrence J. Moore
:
Percolation-based Network Adaptability Under Correlated Failures. INFOCOM 2018: 2186-2194 - [c12]Dilli Prasad Sharma
, Dong Seong Kim
, Seunghyun Yoon
, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore
:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. TrustCom/BigDataSE 2018: 579-587 - [i2]Dilli P. Sharma, Dong Seong Kim, Seunghyun Yoon, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore:
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. CoRR abs/1807.09343 (2018) - 2017
- [c11]Ankit Sharma, Terrence J. Moore
, Ananthram Swami, Jaideep Srivastava:
Weighted Simplicial Complex: A Novel Approach for Predicting Small Group Evolution. PAKDD (1) 2017: 511-523 - [i1]Siddharth Pal, Feng Yu, Terrence J. Moore
, Ram Ramanathan, Amotz Bar-Noy, Ananthram Swami:
An efficient alternative to Ollivier-Ricci curvature based on the Jaccard metric. CoRR abs/1710.01724 (2017) - 2016
- [j7]Robert J. Drost, Terrence J. Moore
, Michael Brodsky:
Switching Networks for Pairwise-Entanglement Distribution. JOCN 8(5): 331-342 (2016) - [c10]Terrence J. Moore
:
Greedy approaches to finding a sparse cover in a sensor network without location information. GlobalSIP 2016: 430-434 - 2013
- [c9]Minh X. Hoang, Ram Ramanathan, Terrence J. Moore
, Ananthram Swami:
Structural and collaborative properties of team science networks. ASONAM 2013: 1102-1109 - [c8]Adam C. Wilkerson, Harish Chintakunta, Hamid Krim, Terrence J. Moore
, Ananthram Swami:
A distributed collapse of a network's dimensionality. GlobalSIP 2013: 595-598 - [c7]Adam C. Wilkerson, Terrence J. Moore
, Ananthram Swami, Hamid Krim:
Simplifying the homology of networks via strong collapses. ICASSP 2013: 5258-5262 - 2012
- [c6]Terrence J. Moore
, Robert J. Drost, Prithwish Basu, Ram Ramanathan, Ananthram Swami:
Analyzing collaboration networks using simplicial complexes: A case study. INFOCOM Workshops 2012: 238-243 - [c5]Terrence J. Moore
, Brian M. Sadler
:
The value of information in constrained parametric models. SSP 2012: 293-296
2000 – 2009
- 2008
- [j6]Terrence J. Moore
, Brian M. Sadler
, Richard J. Kozick:
Maximum-Likelihood Estimation, the Cramér-Rao Bound, and the Method of Scoring With Parameter Constraints. IEEE Trans. Signal Process. 56(3): 895-908 (2008) - 2007
- [j5]Terrence J. Moore
, Richard J. Kozick, Brian M. Sadler
:
The Constrained CramÉr-Rao Bound From the Perspective of Fitting a Model. IEEE Signal Process. Lett. 14(8): 564-567 (2007) - 2004
- [j4]Terrence J. Moore
, Brian M. Sadler
:
Sufficient conditions for regularity and strict identifiability in MIMO systems. IEEE Trans. Signal Process. 52(9): 2650-2655 (2004) - 2002
- [j3]Terrence J. Moore
, Brian M. Sadler
, Richard J. Kozick:
Regularity and strict identifiability in MIMO systems. IEEE Trans. Signal Process. 50(8): 1831-1842 (2002) - [j2]Brian M. Sadler
, Richard J. Kozick, Terrence J. Moore
, Ananthram Swami:
Bounds on SIMO and MIMO Channel Estimation and Equalization with Side Information. J. VLSI Signal Process. 30(1-3): 107-126 (2002) - [c4]Brian M. Sadler
, Richard J. Kozick, Terrence J. Moore
:
On the performance of source separation with constant modulus signals. ICASSP 2002: 2373-2376 - 2001
- [j1]Brian M. Sadler
, Richard J. Kozick, Terrence J. Moore
:
Bounds on bearing and symbol estimation with side information. IEEE Trans. Signal Process. 49(4): 822-834 (2001) - [c3]Brian M. Sadler
, Richard J. Kozick, Terrence J. Moore
:
Bounds on MIMO channel estimation and equalization with side information. ICASSP 2001: 2145-2148 - 2000
- [c2]Brian M. Sadler
, Richard J. Kozick, Terrence J. Moore
:
Performance bounds on bearing and symbol estimation for communication signals with side information. ICASSP 2000: 2529-2532
1990 – 1999
- 1999
- [c1]Brian M. Sadler
, Richard J. Kozick, Terrence J. Moore
:
Performance analysis for direction finding in non-Gaussian noise. ICASSP 1999: 2857-2860
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-22 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint