


default search action
35th MILCOM 2016: Baltimore, MD, USA
- Jerry Brand, Matthew C. Valenti, Akinwale Akinpelu, Bharat T. Doshi, Bonnie L. Gorsic: 
 2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, November 1-3, 2016. IEEE 2016, ISBN 978-1-5090-3781-0
- Michael Atighetchi, Fusun Yaman, Borislava I. Simidchieva  , Marco M. Carvalho , Marco M. Carvalho : :
 An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms. 1-6
- Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini  , Thomas F. La Porta, Ritu Chadha: , Thomas F. La Porta, Ritu Chadha:
 Mapping sample scenarios to operational models. 7-12
- Steven W. Stone: 
 Agility in decision-making for cyberspace operations. 13-18
- Marco M. Carvalho  , Thomas C. Eskridge , Thomas C. Eskridge , Michael Atighetchi, Nicholas Paltzer: , Michael Atighetchi, Nicholas Paltzer:
 Semi-automated wrapping of defenses (SAWD) for cyber command and control. 19-24
- Elisha Peterson: 
 Dagger: Modeling and visualization for mission impact situation awareness. 25-30
- Eric D. Trias, William R. Simpson, Kevin E. Foltz, Frank P. Konieczny: 
 Enterprise Level Security. 31-36
- Zhuo Lu, Yalin E. Sagduyu: 
 Risk assessment based access control with text and behavior analysis for document management. 37-42
- Weiwei Zhao, Aixin Zhang, Jianhua Li, Xinghua Wu, Yuchen Liu: 
 Analysis and design of an authentication protocol for space information network. 43-48
- Nicolas Papernot, Patrick D. McDaniel, Ananthram Swami, Richard E. Harang: 
 Crafting adversarial input sequences for recurrent neural networks. 49-54
- David Whelihan, Michael Vai, Daniil M. Utin, Roger Khazan, Karen Gettings, Tom Anderson, Antonio Godfrey, Raymond Govotski, Mark Yeager, Brendon Chetwynd, Ben Nahill, Eric Koziel: 
 SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor. 55-60
- Younghee Park, Shruti Daftari, Pratik Inamdar, Snehal Salavi, Aniket Savanand, Youngsoo Kim: 
 IoTGuard: Scalable and agile safeguards for Internet of Things. 61-66
- Vikas Bollapragada Subrahmanya, Harlan B. Russell: 
 Recovering the reserved transmission time slots in an ad hoc network with scheduled channel access. 67-72
- Zhifeng He, Shiwen Mao, Sastry Kompella  , Ananthram Swami: , Ananthram Swami:
 Link scheduling and channel assignment with a graph spectral clustering approach. 73-78
- John Metzger, Vincent W. S. Chan, Christopher C. Yu: 
 A random access scheme for satellite packet communication with intentional interference. 79-84
- Zejue Wang, Hongjia Li, Dan Wang, Liming Wang, Song Ci: 
 Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments. 85-90
- Michael T. Cunningham, Gary J. Saulnier, Robert Chase, Edward M. Curt, Kyle R. Wilt, Francisco J. Maldonado, Stephen Oonk, Henry A. Scarton: 
 Low-rate ultrasonic communications and power delivery for sensor applications. 91-96
- Kevin Schubert, Nicholas Bambos: 
 Data aggregation for low power wireless devices. 97-102
- Nick Letzepis: 
 Optimal power allocation for parallel Gaussian channels with LPD constraints. 103-107
- Yalin E. Sagduyu, Yi Shi  , Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri: , Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri:
 Analytical framework for MANET learning and routing. 108-113
- Vincentzio Roman, Jakub J. Moskal, Mieczyslaw M. Kokar, Roger P. Guseman, Robert B. Normoyle, David H. Scheidt: 
 Reusability of knowledge for deriving latent situational information in EW scenarios. 114-119
- Di Wu, Dongmei Zhao, Weimiao Feng, Siye Wang  , Yu Zhang: , Yu Zhang:
 SPIN: An active location verification scheme for wireless sensor networks. 120-125
- Xin Tian, Genshe Chen, Khanh Pham, Erik Blasch: 
 Joint transmission power control in transponded SATCOM systems. 126-131
- Krittetash Pinyoanuntapong, Madhuprana Goswami, Ashfia Binte Habib, Hyuck M. Kwon, Khanh D. Pham: 
 Boundaries of signal-to-noise ratio for adaptive code modulations. 132-137
- Matthew Hannon, Shaung Feng, Hyuck M. Kwon, Khanh D. Pham: 
 Jamming statistics-dependent frequency hopping. 138-143
- Haya Shajaiah, Jasmin A. Mahal, Charles Clancy: 
 Resource management with anti-jamming capability for cognitive space communication systems. 144-149
- Tien M. Nguyen, Andy T. Guillen, Sumner S. Matsunaga: 
 Practical achievable capacity for advanced SATCOM on-the-Move. 150-155
- Mengqi Ren, Ruixin Niu, Gang Wang, Genshe Chen: 
 Minimax anti-jammer design for FHSS/QPSK satellite communication systems. 156-161
- Thi My Chinh Chu, Hans-Jürgen Zepernick  , Hoc Phan: , Hoc Phan:
 Optimal secrecy capacity of underlay cognitive radio networks with multiple relays. 162-167
- Wenqi Liu, Hongxiang Li, Sanjuli Agarwal, Bin Xie: 
 Optimize the spectrum sensing and decision making strategies under uncertainty for SATCOM. 168-173
- Yang Li, Qihang Peng: 
 Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning. 174-179
- J. Daniel Park  , John F. Doherty: , John F. Doherty:
 A steganographic approach for covert waveform design. 180-185
- Tyler Ward, Eduardo L. Pasiliao, John M. Shea  , Tan F. Wong: , Tan F. Wong:
 Autonomous navigation to an RF source in multipath environments. 186-191
- Kyuman Lee, Jaesung Lim: 
 Self-correction scheme by adjusting the navigation signal transmission time. 192-197
- Elias Yaacoub  : :
 On the use of massive cylindrical antenna arrays for physical layer security. 198-203
- Gui Chao Huang, Magdy F. Iskander, Mahbub Hoque: 
 Advanced antenna array designs for directional networks. 204-207
- Kendrick Q. Henderson, Saeed I. Latif, Georgios Y. Lazarou: 
 A microstrip line-fed multi-resonant slot antenna in the 4G/LTE band for smartphones. 208-212
- Chriss Hammerschmidt, Robert T. Johnk: 
 Extracting clutter metrics from mobile propagation measurements in the 1755-1780 MHz band. 213-218
- Swapnil Mhaske, Predrag Spasojevic  , Ahsan Aziz, Malik Muhammad Usman Gul: , Ahsan Aziz, Malik Muhammad Usman Gul:
 Link quality analysis in the presence of blockages for analog beamformed mm-wave channel. 219-224
- François Chan, Yiu Tong Chan, Robert J. Inkol: 
 Path loss exponent estimation and RSS localization using the linearizing variable constraint. 225-229
- Venkatesh Ramaswamy, Jerediah R. Fevold, Jeffrey T. Correia, Timothy E. Daughters: 
 Design of an anti-jamming Appliqué for LTE-based military communications. 230-235
- Gwenael Poitau: 
 LTE-UTac: LTE-U customization for multi-mission tactical networks. 236-241
- Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner: 
 Network coverage detection using order statistics: An LTE perspective. 242-247
- Lan K. Nguyen, Richard B. Wells, Khanh D. Pham: 
 Impact of satellite transponder nonlinearities on the performance of protected tactical waveform (PTW) for the return link (RL). 248-253
- Lun Li, Xin Tian, Genshe Chen, Khanh Pham, Erik Blasch: 
 Secure spectrum-efficient frequency hopping for return link of protected tactical satellite communications. 254-258
- Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger: 
 Agility maneuvers to mitigate inference attacks on sensed location data. 259-264
- Omar Nakhila, Cliff C. Zou: 
 Parallel active dictionary attack on IEEE 802.11 enterprise networks. 265-270
- Jon R. Ward, Mohamed F. Younis: 
 A cross-layer traffic analysis countermeasure against adaptive attackers of Wireless Sensor Networks. 271-276
- Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra: 
 Stealthy attacks with insider information: A game theoretic model with asymmetric feedback. 277-282
- Emrah Korkmaz, Andrey M. Dolgikh, Matthew Davis, Victor A. Skormin: 
 ICS security testbed with delay attack case study. 283-288
- Xinyuan Wang: 
 On the feasibility of real-time cyber attack attribution on the Internet. 289-294
- Akshay Kumar, Ahmed Abdel-Hadi, Charles Clancy: 
 A delay-optimal packet scheduler for M2M uplink. 295-300
- Clement Kam, Sastry Kompella  , Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides: , Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
 Controlling the age of information: Buffer size, deadline, and packet replacement. 301-306
- Xiang Mi, Limin Xiao, Ming Zhao, Xibin Xu, Shidong Zhou, Jing Wang: 
 Statistical QoS-driven power control and source adaptation for D2D communications. 307-312
- Akshay Kumar, Ahmed Abdelhadi, Charles Clancy: 
 A delay efficient multiclass packet scheduler for heterogeneous M2M uplink. 313-318
- Andrew Thornburg, Robert W. Heath Jr.  , Robert C. Daniels: , Robert C. Daniels:
 Capacity and scaling laws of dense mmWave and interference alignment ad hoc networks. 319-324
- Mahmudur Khan, Suman Bhunia  , Murat Yuksel, Shamik Sengupta: , Murat Yuksel, Shamik Sengupta:
 LOS discovery in 3D for highly directional transceivers. 325-330
- Rahul Amin, Tom Goff, Bow-Nan Cheng: 
 An evaluation of layer 2 and layer 3 routing on high capacity aerial directional links. 331-336
- Suman Bhunia  , Mahmudur Khan, Shamik Sengupta, Murat Yuksel: , Mahmudur Khan, Shamik Sengupta, Murat Yuksel:
 LOS discovery for highly directional full duplex RF/FSO transceivers. 337-342
- Joy Na Wang, Thomas H. Shake, Patricia Deutsch, Andrea Coyle, Bow-Nan Cheng: 
 Topology management algorithms for large-scale aerial high capacity directional networks. 343-348
- Jun Xiang Yeo, Yee Hui Lee  , Jin Teong Ong: , Jin Teong Ong:
 Use of weather radar rain cell motion forecasting for site diversity system. 349-353
- Pengyuan Du, Sobhan Nazari, Jorge Mena, Ruolin Fan, Mario Gerla, Riten Gupta: 
 Multipath TCP in SDN-enabled LEO satellite networks. 354-359
- Sobhan Nazari, Pengyuan Du, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim, Antonio Capone  : :
 Software Defined naval network for satellite communications (SDN-SAT). 360-366
- Jonathon Cheah: 
 MUOS satellite communication beyond latitude 65° North. 367-372
- Yash Vasavada  , Ying Liu, Javier Sanchez, Prashant Kapoor, Yezdi Antia, Jack Rozmaryn, John Border: , Ying Liu, Javier Sanchez, Prashant Kapoor, Yezdi Antia, Jack Rozmaryn, John Border:
 An Uplink Power Control driven compensation of wideband, semi-static, rain or interference induced link impairments affecting satellite feeder links operating at Ka band and above. 373-378
- Bosung Kim, Gyumin Lee, Geunkyung Choi, Byeong-Hee Roh  : :
 Effective bandwidth based capacity request for real-time voice in GEO satellite system. 379-384
- Sungjun Ahn, Wonju Lee, Kwang-Eog Lee, Joonhyuk Kang: 
 Deterministic pilot jamming symbol design for enhanced physical layer secrecy. 385-389
- Karim A. Banawan  , Sennur Ulukus, Peng Wang, Brian Henz: , Sennur Ulukus, Peng Wang, Brian Henz:
 Secure rates in multiband broadcast channels with combating jammers. 390-395
- Corey D. Cooke  , Frederick K. Reed , Frederick K. Reed , Luke J. Prince , Luke J. Prince , Jason M. Vann , Jason M. Vann , Adam L. Anderson , Adam L. Anderson : :
 An efficient sparse FFT algorithm with application to signal source separation and 2D virtual image feature extraction. 396-400
- Darcy A. Bibb, Zhengqing Yun, Magdy F. Iskander: 
 Machine learning for source localization in urban environments. 401-405
- Marc Lichtman, T. Charles Clancy, Jeffrey H. Reed: 
 Reactive jammer piggybacking: Achieving antifragile electronic warfare. 406-411
- Zijian Mo, Weifeng Su, John D. Matyjas: 
 Amplify and forward relaying protocol design with optimum power and time allocation. 412-417
- Siddhartha S. Borkotoky, Michael B. Pursley: 
 A method for network-coded broadcast in an ad hoc network. 418-423
- Magdy F. Iskander, Zhengqing Yun, Farhan A. Qazi, Galen H. Sasaki, Asutosh Das: 
 Physical layer based approach for advanced directional networking. 424-429
- Ahmad A. I. Ibrahim, Jing Guo  , David J. Love, Navid Yazdani, Keith W. Forsythe: , David J. Love, Navid Yazdani, Keith W. Forsythe:
 Receiver design and bit allocation for a multi-user distributed relay network performing vector quantization. 430-435
- Bilal Al-Doori, Xian Liu: 
 Enabling NAICS to mitigate inter-cell interference in evolving wireless networks. 436-441
- Benjamin Peiffer, Raghu Mudumbai, Sairam Goguri, Anton Kruger, Soura Dasgupta: 
 Experimental demonstration of retrodirective beamforming from a fully wireless distributed array. 442-447
- Yavuz Yaman, Predrag Spasojevic  : :
 Reducing the LOS ray beamforming setup time for IEEE 802.11ad and IEEE 802.15.3c. 448-453
- Min Wang, Hui Gao, Xin Su, Tiejun Lv: 
 Joint channel allocation, mode selection and power control in D2D-enabled femtocells. 454-459
- Kareem Bonna, Predrag Spasojevic  , Emmanuel Kanterakis: , Emmanuel Kanterakis:
 Subspace-based SIMO blind channel identification: Asymptotic performance comparison. 460-465
- Salvatore Talarico, Matthew C. Valenti, Thomas R. Halford: 
 Controlled barrage regions: Stochastic modeling, analysis, and optimization. 466-472
- Wenhao Xiong, Zijian Mo, Genshe Chen, Khanh Pham, Erik Blasch, Hyuck M. Kwon: 
 Agile MU-MIMO in congested environments with robust channel estimation. 473-478
- Brian Thompson, James R. Morris-King, Hasan Çam: 
 Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware. 479-484
- Brian Thompson, James R. Morris-King, Richard E. Harang: 
 Slowing the spread of Bluetooth-based malware in mobile tactical networks. 485-490
- Scott E. Brown, Harold Brown, Michael Russell, Brian Henz, Michael Edwards, Frank Turner, Giorgio Bertoli: 
 Validation of network simulation model and scalability tests using example malware. 491-496
- Kayla M. Straub, Avik Sengupta, Joseph M. Ernst, Robert W. McGwier, Merrick Watchorn, Richard Tilley, Randolph Marchany: 
 Malware propagation in fully connected networks: A netflow-based analysis. 497-502
- James R. Morris-King, Hasan Çam: 
 Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning. 503-508
- Ragib Hasan  , Shams Zawoad, Md Munirul Haque: , Shams Zawoad, Md Munirul Haque:
 StuxMob: A situational-aware malware for targeted attack on smart mobile devices. 509-514
- Heng Song, Xiangyang Li: 
 Collaborative detection of Covert Storage Channels. 515-520
- Kyuho Oh, Kyuman Lee, Jaesung Lim: 
 Point Transformation Scheme to protect location data changing in real time. 521-526
- Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao: 
 TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage. 527-532
- Mikko Kiviharju, Arseny Kurnikov: 
 Tactical CAC profile for NATO OLP? Performance estimations for NATO OLP cryptographic evolution stage. 533-538
- Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel: 
 Enabling reproducible cyber research - four labeled datasets. 539-544
- Ulrika Uppman, Jan Nilsson, Ulf Sterner: 
 Jamming effects on multicast traffic in ad hoc networks for different terrains. 545-550
- Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv: 
 Robust beamforming and power allocation for secrecy in multi-pair decode-and-forward relay networks. 551-556
- Paul T. Watrobski, Douglas H. Summerville: 
 De-encapsulation of network packets for network protocol reverse engineering. 557-562
- Mazda Salmanian, J. David Brown, Ming Li, Tricia J. Willink: 
 On the robustness of the OLSR protocol under unwanted interference. 563-568
- Zhenxiang Gao, Weihua Zhou, Yongming Wang: 
 Exploiting social relationship for secure routing in mobile social networks. 569-575
- Lisa M. Scott, Kelvin Marcus, Rommie L. Hardy, Kevin S. Chan: 
 Exploring dependencies of networks of multi-genre network experiments. 576-581
- Joseph P. Macker: 
 Hamlet: A metaphor for modeling and analyzing network conversational adjacency graphs. 582-587
- Siddharth Pal, Yuxiao Dong, Bishal Thapa, Nitesh V. Chawla  , Ananthram Swami, Ram Ramanathan: , Ananthram Swami, Ram Ramanathan:
 Deep learning for network analysis: Problems, approaches and challenges. 588-593
- Wei Gao: 
 Exploiting deployment information for social-aware contact prediction at the tactical edge. 594-599
- Joseph P. Macker: 
 An improved local bridging centrality model for distributed network analytics. 600-605
- Prithwish Basu: 
 K-anycasting strategies in networks: To grow or to prune? 606-611
- Vijitha Weerackody: 
 Spectrum sharing of VMES terminals with fixed service stations. 612-617
- Stephan P. Winter, Christian A. Hofmann  , Andreas Knopp: , Andreas Knopp:
 Antenna diversity techniques for enhanced jamming resistance in multi-beam satellites. 618-623
- Tat Fung, Jeff Hoppe, Syed Akbar, Tom Rittenbach, Jenelle Vickberg: 
 Distributed SATCOM On-The-Move (SOTM) Terminal Open Standard Architecture. 624-629
- Jeff Hoppe, Tat Fung, Syed Akbar, Tom Rittenbach: 
 Distributed SATCOM On-The-Move Terminal Open Standard Architecture architectural details. 630-635
- Sebastián A. Zanlongo, Alexander C. Wilson, Leonardo Bobadilla  , Tamim Sookoor , Tamim Sookoor : :
 Scheduling and path planning for computational ferrying. 636-641
- Md. Mahbubur Rahman  , Leonardo Bobadilla , Leonardo Bobadilla , Brian Rapp: , Brian Rapp:
 Establishing line-of-sight communication via autonomous relay vehicles. 642-647
- Guosheng Yang, Jun Wang, Guangrong Yue, Shaoqian Li: 
 Myriad MSK signal detection for VLF/LF communication. 648-653
- Juan Zeng, Ying Wang, Xinke Zhang, Keke Hu  , Yongming Wang: , Yongming Wang:
 Reduced-complexity IBDFE for faster-than-Nyquist communication systems. 654-659
- Stephen G. Wilson, Ho Him Jonathan Lo: 
 Optimum digital pulse shaping filters. 660-665
- Bruce F. McGuffin: 
 Median of Maxima Estimate (MOME) receivers for robust adaptive signal detection. 666-671
- Steven W. Ellingson, R. Michael Buehrer: 
 Frequency channel delay modulation for interference-robust low data rate communication. 672-677
- Alan J. Michaels, David B. Chester: 
 Adaptive correlation techniques for spread spectrum communication systems. 678-681
- Xin Wang, Xiaolin Zhang, Yuan Yang: 
 Doppler frequency offset estimation and compensation in OFDM aeronautical communication systems in the presence of narrow-band interference. 682-687
- Mostafa Ibrahim, Hüseyin Arslan  : :
 Zero Tail Filter Bank Spread OFDM. 688-693
- Gunjan Verma, Fikadu T. Dagefu, Brian M. Sadler  , Predrag Spasojevic , Predrag Spasojevic : :
 Implications of time/frequency synchronization tradeoff of quasi-synchronous multi-carrier DS-CDMA for robust communications at lower VHF. 694-699
- Donald C. Buzanowski, Frederick J. Block, Thomas C. Royster IV: 
 Digital construction and characterization of noise-like spread spectrum signals. 700-704
- Alexandros Palaios, Masih Nilforoushan, Petri Mähönen: 
 Understanding European forest radio propagation dynamics with in and out of forest transmitters. 705-710
- Stephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny: 
 Experimental results of FB-MC-SS on a wideband HF NVIS propagation channel. 711-716
- Jeffrey Boksiner, Yuriy Posherstnik, Michael Murphy, Chrysanthos Chrysanthou, Thierry Marsault, Jean-Philippe Millet: 
 Validation of an analytical Urban Propagation Model. 717-722
- Alexandros Palaios, Kushwah Nagendra Singh, Petri Mähönen: 
 Propagation models for users crossing forest areas in central European forest environments. 723-728
- Na Wu, Qilian Liang, Prasad Gogineni: 
 Greenland bed elevation resolution improvement via compressive sensing and co-prime up-sampling. 729-734
- Kevin Benton, L. Jean Camp, Martin Swany  : :
 Bongo: A BGP speaker built for defending against bad routes. 735-739
- Christopher Mansour  , Danai Chasaki: , Danai Chasaki:
 Trust and reliability for next-generation routers. 740-745
- Franki Yeung, Peter Cho, Christopher Morrell, Randy C. Marchany, Joseph G. Tront: 
 Modeling network based moving target defense impacts through simulation in Ns-3. 746-751
- Sidney C. Smith  , Robert J. Hammell: , Robert J. Hammell:
 An experimental exploration of the impact of sensor-level packet loss on network intrusion detection. 752-757
- Noam Ben-Asher, Steve E. Hutchinson, Alessandro Oltramari: 
 Characterizing network behavior features using a cyber-security ontology. 758-763
- Brian P. Van Leeuwen, William M. S. Stout, Vincent E. Urias: 
 Empirical assessment of network-based Moving Target Defense approaches. 764-769
- Tingwen Liu  , Yang Zhang, Jinqiao Shi, Jing Ya, Quangang Li , Yang Zhang, Jinqiao Shi, Jing Ya, Quangang Li , Li Guo: , Li Guo:
 Towards quantifying visual similarity of domain names for combating typosquatting abuse. 770-775
- Diane S. Henshel  , Gary M. Deckard, Brad Lufkin, Norbou Buchler, Blaine Hoffman, Prashanth Rajivan, Steve Collman: , Gary M. Deckard, Brad Lufkin, Norbou Buchler, Blaine Hoffman, Prashanth Rajivan, Steve Collman:
 Predicting proficiency in cyber defense team exercises. 776-781
- Daegeon Kim  , Jiyoung Woo, Huy Kang Kim , Jiyoung Woo, Huy Kang Kim : :
 "I know what you did before": General framework for correlation analysis of cyber threat incidents. 782-787
- Rui Xu, Xiaojun Chen, Yingbing Wang, Jinqiao Shi, Haitao Mi: 
 Memory chunking analysis of numerical password for Chinese websites. 788-793
- Xuan D. Tran, Marcin Lukowiak, Stanislaw P. Radziszowski: 
 Effectiveness of variable bit-length power analysis attacks on SHA-3 based MAC. 794-799
- Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos: 
 ACyDS: An adaptive cyber deception system. 800-805
- Li Li, S. Haavik, Bjørnar Libæk, R. Wik, Anne Marie Hegland, D. McLachlan, Phil Hugg, C. Brown, Thomas Kunz: 
 Automated IP connectivity in narrowband radio networks. 806-811
- George Kesidis, David J. Miller, Zhicong Qiu: 
 IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric. 812-816
- Pratik K. Biswas, Amitabh Mishra, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Ram Ramanathan, Prithwish Basu: 
 Smallworld routing for tactical networks. 817-822
- Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse: 
 ITMAN: An inter tactical mobile ad hoc network routing protocol. 823-828
- Bongsoo Roh, Myoung-hun Han, Mijeong Hoh, Kwangsoo Kim  , Byeong-Hee Roh , Byeong-Hee Roh : :
 Tactical MANET architecture for Unmanned Autonomous Maneuver Network. 829-834
- Mathew Elliot, Thomas Stevens: 
 Dynamic range extension using HARLEQUIN and HAIL. 835-841
- Dimitrios K. Papakostas  , Pavlos Basaras, Dimitrios Katsaros, Leandros Tassiulas: , Pavlos Basaras, Dimitrios Katsaros, Leandros Tassiulas:
 Backbone formation in military multi-layer ad hoc networks using complex network concepts. 842-848
- Anisha Mazumder, Chenyang Zhou, Arun Das  , Arunabha Sen: , Arunabha Sen:
 Budget constrained relay node placement problem for maximal "connectedness". 849-854
- Sara Örn Tengstrand, Patrik Eliardsson, Erik Axell  : :
 Mitigation of multiple impulse noise sources through selective attenuation. 855-860
- John Narayan, T. Charles Clancy: 
 A Hidden Markov Model approach for automatic closed protocol hop synchronization. 861-866
- Michael Merritt, Timothy Brothers, Andrew Stark, Jeffrey Rada, Debbie Nielsen, Kyle Davis, Benjamin B. Yang, Chris Ward, Margaret Quiggle: 
 A reconfigurable architecture to support dynamic communications, radar, and sensing. 867-871
- Nicholas Johnson, Mohamed Chergui, Oren Sternberg, John D. Rockway, W. Linwood Jones: 
 Ambiguity function analysis for passive radar system performance. 872-876
- Kristen Nock, Carlos Font, Michael A. Rupar: 
 Adaptive transmission algorithms for a hard-switched FSO/RF link. 877-881
- Ryan C. Shoup: 
 Practical hardware realizable frame discrimination algorithms for deep fading channels in optical communications. 882-887
- Shaogang Wang, Vishal M. Patel, Athina P. Petropulu: 
 RSFT: A realistic high dimensional sparse fourier transform and its application in radar signal processing. 888-893
- Thomas Feuillen  , Achraf Mallat , Achraf Mallat , Luc Vandendorpe: , Luc Vandendorpe:
 Stepped frequency radar for automotive application: Range-Doppler coupling and distortions analysis. 894-899
- Chris A. Rogers, Dimitrie C. Popescu: 
 Performance analysis of extended target detection with radar waveforms designed using compressed sensing. 900-905
- Yu Zhang, Ling Huang, Jian Song: 
 Phased array radar based angular domain channel estimation scheme for integrated radar-communication system. 906-911
- John Ellinger, Zhiping Zhang, Michael C. Wicks, Zhiqiang Wu  : :
 Polar signal detection: Multi-carrier waveform design for improved radar detection performance. 912-917
- Michael J. Nowak, Zhiping Zhang, Yang Qu, Dimitri A. Dessources, Michael C. Wicks, Zhiqiang Wu  : :
 Co-designed radar-communication using linear frequency modulation waveform. 918-923
- Gihan J. Mendis, Tharindu Randeny, Jin Wei, Arjuna Madanayake  : :
 Deep learning based doppler radar for micro UAS detection and classification. 924-929
- Yu Zhao, Biao Chen: 
 Nonparametric target detection using airborne MIMO communication systems. 930-935
- Amro Lulu, Bijan G. Mobasseri: 
 Multitarget detection by stretch processing of chirp diversity waveforms. 936-941
- Kihyoung Kim, Kyuman Lee, Jaesung Lim: 
 A RELNAV enhancement for reducing cumulative position error in Link-16 without GRU. 942-947
- William Watson, Thomas McElwain: 
 4D CAF for localization of co-located, moving, and RF coincident emitters. 948-951
- Adly T. Fam, Ravi Kadlimatti  : :
 Good code sets from complementary pairs via polyphase chips. 952-957
- Soumendra Nanda, Charles Tao, Victor Firoiu, Hui Zeng, Gahng-Seop Ahn, Julia Deng: 
 Cross-layer TCP adaptation in DISCO for tactical edge networks. 958-963
- Scott Moore, Rahul Amin, David Ripplinger, Devanshu Mehta, Bow-Nan Cheng: 
 Performance evaluation of a disruption tolerant network proxy for tactical edge networks. 964-969
- Roberto Fronteddu, Alessandro Morelli  , Mauro Tortonesi , Mauro Tortonesi , Niranjan Suri, Cesare Stefanelli, Rita Lenzi, Enrico Casini: , Niranjan Suri, Cesare Stefanelli, Rita Lenzi, Enrico Casini:
 DDAM: Dynamic network condition detection and communication adaptation in Tactical Edge Networks. 970-975
- Hannes Holm  , Teodor Sommestad: , Teodor Sommestad:
 SVED: Scanning, Vulnerabilities, Exploits and Detection. 976-981
- Risto Vaarandi  , Markus Kont, Mauno Pihelgas: , Markus Kont, Mauno Pihelgas:
 Event log analysis with the LogCluster tool. 982-987
- Jack W. Stokes, Himanshu Chandola, Christian Seifert, Tim Burrell: 
 MART: Targeted attack detection on a compromised network. 988-997
- Xiao Li, Paul Avellino, Jeff Janies, M. Patrick Collins: 
 Software asset analyzer: A system for detecting configuration anomalies. 998-1003
- Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li: 
 Hunting abnormal configurations for permission-sensitive role mining. 1004-1009
- Jaime C. Acosta, Edgar Padilla, John Homer: 
 Augmenting attack graphs to represent data link and network layer vulnerabilities. 1010-1015
- Nathan D. Holzhauer, James R. Milligan, Nathaniel B. Soule: 
 A hybrid P2P and pub/sub messaging system for decentralized Information Management. 1016-1021
- Byungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu  : :
 Validity region sensitive query processing strategies in mobile ad hoc networks. 1022-1027
- Xi Zhang, Qixuan Zhu: 
 Information-centric network virtualization for QoS provisioning over software defined wireless networks. 1028-1033
- Jimmi Grönkvist, Arwid Komulainen, Ulf Sterner, Ulrika Uppman: 
 Dynamic scheduling for cooperative broadcasting in tactical ad hoc networks. 1034-1040
- Demir Y. Yavas, Ibrahim Hökelek, Bilge Günsel  : :
 Analytical Model of Priority Based Request Scheduling Mechanism Preventing SIP Server Overload. 1041-1046
- Kevin Phemius, Jawad Seddar, Mathieu Bouet  , Hicham Khalife, Vania Conan: , Hicham Khalife, Vania Conan:
 Bringing SDN to the edge of tactical networks. 1047-1052
- Jon Spencer, Tricia J. Willink: 
 SDN in coalition tactical networks. 1053-1058
- Xuemin Wen, Yanni Han, Bing Yu, Xin Chen, Zhen Xu: 
 Towards reliable virtual data center embedding in software defined networking. 1059-1064
- Jacob H. Cox Jr., Sean Patrick Donovan, Russell J. Clark, Henry L. Owen: 
 Ryuretic: A modular framework for Ryu. 1065-1070
- Ruolin Fan, Li Wei, Pengyuan Du, Ciarán Mc Goldrick  , Mario Gerla: , Mario Gerla:
 A SDN-controlled underwater MAC and routing testbed. 1071-1076
- Zequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas, Ha Duong: 
 Fuzzy sets based team decision-making for Cyber Situation Awareness. 1077-1082
- John Holliman, Michael Zhivich, Roger Khazan, Albert Swiston, Brian A. Telfer  : :
 Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring. 1083-1089
- Ghaith Shabsigh, Victor S. Frost: 
 Stochastic geometry for the analysis of wireless covert networks. 1090-1095
- Saritha Arunkumar, Mudhakar Srivatsa, Berker Soyluoglu, Murat Sensoy  , Federico Cerutti , Federico Cerutti : :
 Privacy enforcement through policy extension. 1096-1100
- Gokul Sridharan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella  : :
 Physical-layer security of NC-OFDM-based systems. 1101-1106
- Satya Prakash Ponnaluri, Babak Azimi-Sadjadi, Yik-Kiong Hue, Tugba Erpek, Arash Komaee, Wade Trappe: 
 A practical wireless reciprocity-aware key establishment protocol. 1107-1113
- Paul J. Nicholas, Karla L. Hoffman: 
 Optimal channel assignment for military MANET using integer optimization and constraint programming. 1114-1120
- Song Jun Park, Stephen Allen, Dale R. Shires: 
 Urban reconnaissance planning: Discovering new applications with tactical high performance computing. 1121-1124
- Ritu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos: 
 CyberVAN: A Cyber Security Virtual Assured Network testbed. 1125-1130
- Aaron E. Cohen  , Yvette T. Lee, David A. Heide, Thomas M. Moran: , Yvette T. Lee, David A. Heide, Thomas M. Moran:
 A novel software defined radio relay method for power conservation. 1131-1136
- Amarnadha Reddy Mahasamudram, Ramu Srinivasaiah, Raveendranath KR, Sreenath Ramanath: 
 Agile cognizant transceiver link for mission critical applications. 1137-1142
- Vito Dantona, Berthold Lankl: 
 Requirements for ACI tolerance in MANETs for VHF tactical communications. 1143-1148
- Bow-Nan Cheng, Shari Mann, Tim Arganbright: 
 Toward Composable Hardware Agnostic Communications Blocks - Lessons Learned. 1149-1154
- Peng Wang, Brian Henz: 
 Efficient approach to find optimal antenna assignment for JALN HCB. 1155-1160
- Yalin E. Sagduyu, Yi Shi  , Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley, Clif Banner, Greg Heinen: , Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley, Clif Banner, Greg Heinen:
 Optimal orbit selection and design for airborne relay communications. 1161-1166
- Yang Liu, Kapil M. Borle, Janek J. Mroczek, Biao Chen, Michael J. Gans, Paul J. Oleski, Richard J. Michalak: 
 Variable rate MIMO communication with airborne platforms: An experimental study. 1167-1172
- Riadh Essaadali, Taher Hadouej, Chokri Jebali, Ammar B. Kouki: 
 Optimization of a direct conversion multi-standard transmitter used for rescue operations. 1173-1178
- Riadh Essaadali, Ammar B. Kouki: 
 A new simple Unmanned Aerial Vehicle doppler effect RF reducing technique. 1179-1183
- Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv: 
 Secure beamforming and power allocation for multi-pair decode-and-forward relay networks. 1184-1189
- Marwan Yusuf  , Hüseyin Arslan , Hüseyin Arslan : :
 Enhancing physical-layer security in wireless communications using signal space diversity. 1190-1194
- Dong Wei, Lili Liang, Meng Zhang, Rong Qiao, Wei-qing Huang: 
 A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications. 1195-1201
- Xiguang Zhang, Yong Shang, Shiwei Yan, Dehuai Li, Junqi Guo: 
 Adaptive power and access control for physical security of heterogeneous cellular network. 1202-1206
- Ashwin Amanna, Anu Saji, James W. Bohl, Arun Subramanian: 
 Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed. 1207-1212
- Michael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf  , Lanier A. Watkins, William H. Robinson , Lanier A. Watkins, William H. Robinson , Wlajimir Alexis: , Wlajimir Alexis:
 Securing commercial WiFi-based UAVs from common security attacks. 1213-1218
- Deirdre K. Kilcoyne, Shiri Bendelac, Joseph M. Ernst, Alan J. Michaels: 
 Tire Pressure Monitoring System encryption to improve vehicular security. 1219-1224
- Gordon Werner, Steven Farris, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski: 
 Implementing authenticated encryption algorithm MK-3 on FPGA. 1225-1230
- Jason Uher, Ryan G. Mennecke, Bassam S. Farroha: 
 Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networks. 1231-1236
- Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu: 
 Metrics and measurement of trustworthy systems. 1237-1242
- Omar Nakhila, Cliff C. Zou: 
 User-side Wi-Fi evil twin attack detection using random wireless channel monitoring. 1243-1248
- Noor Abani, Mario Gerla: 
 Centrality-based caching for privacy in Information-Centric Networks. 1249-1254
- Hao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu  , Prasant Mohapatra: , Prasant Mohapatra:
 Trust exploitation and attention competition: A game theoretical model. 1255-1260
- Jithin Jagannath  , Hanne M. Saarinen, Timothy Woods, Joshua O'Brien, Sean Furman, Andrew L. Drozd, Tommaso Melodia , Hanne M. Saarinen, Timothy Woods, Joshua O'Brien, Sean Furman, Andrew L. Drozd, Tommaso Melodia : :
 COmBAT: Cross-layer Based testbed with Analysis Tool implemented using software defined radios. 1261-1266
- Enrico Casini, Giacomo Benincasa  , Alessandro Morelli , Alessandro Morelli , Niranjan Suri, Maggie R. Breedy: , Niranjan Suri, Maggie R. Breedy:
 An experimental evaluation of data distribution applications in tactical networks. 1267-1272
- Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx: 
 Large scale over-the-air testing of Group Centric Networking. 1273-1278
- Matthew Dillon, Er-Hsien Frank Fu, Daniel Gdula, Trang Mai, Joseph Molnar, Lan H. Tran: 
 Real and virtual wireless radio network emulator. 1279-1285
- Timothy D. Kurp: 
 Design challenges of carrier phase tracking for higher modulation orders in high data rate applications. 1286-1291
- Michael Rice, Mohammad Saquib: 
 On frequency offset estimation errors in coherent detection over equalized ISI channels. 1292-1297
- Md. Shah Afran, Mohammad Saquib, Michael Rice: 
 A polynomial rooting based ML CFO estimator in multipath channel with repetitive pilot symbols. 1298-1303

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














