


default search action
36th MILCOM 2017: Baltimore, MD, USA
- 2017 IEEE Military Communications Conference, MILCOM 2017, Baltimore, MD, USA, October 23-25, 2017. IEEE 2017, ISBN 978-1-5386-0595-0

- Steven McElwee

, Jeffrey Heaton, James B. Fraley, James Cannady:
Deep learning for prioritizing and responding to intrusion detection alerts. 1-5 - Ken F. Yu, Richard E. Harang:

Machine learning in malware traffic classifications. 6-10 - Muhammad Ejaz Ahmed, Hyoungshick Kim, Moosung Park:

Mitigating DNS query-based DDoS attacks with machine learning on software-defined networking. 11-16 - Juan Zhao, Sachin Shetty

, Jan Wei Pan:
Feature-based transfer learning for network security. 17-22 - Shayok Chakraborty, Jack W. Stokes, Lin Xiao, Dengyong Zhou, Mady Marinescu, Anil Thomas:

Hierarchical learning for automated malware classification. 23-28 - Xiaoqing Fan, Joel Llewelyn, Aaron B. Wagner, Matthew P. Kuzdeba:

Resilient communication against adversarial path-errors. 29-34 - Andrew Kolodgie, Paul Berges, Ryan Burrow, Mark Carman, Josh Collins, Sam Bair, Geffrey D. Moy, Joseph M. Ernst, Alan J. Michaels:

Enhanced TPMS security through acceleration timed transmissions. 35-39 - Xiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun:

On eavesdropping attacks and countermeasures for MU-MIMO systems. 40-45 - Rui Zhu

, Tao Shu, Huirong Fu:
Empirical statistical inference attack against PHY-layer key extraction in real environments. 46-51 - Omar Nakhila, Cliff C. Zou:

Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network. 52-56 - Xian Liu:

Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factors. 57-62 - Marek Malowidzki, Pawel Kaniewski, Robert Matyszkiel, Przemyslaw Berezinski:

Standard tactical services in a military disruption-tolerant network: Field tests. 63-68 - Ehsan Keramat, Nicholas Kauffroath, Kia Karbasi, Heng Zhao, Babak Daneshrad, Gregory J. Pottie:

Experimental results for low overhead frequency offset estimation in MANETs with concurrent transmission. 69-72 - Abdoulaye Saadou, Harsha Chenji:

A network-centric model of situational awareness. 73-78 - Karina M. Fors, Sara Linder, Jan Nilsson, Ulf Sterner:

Effects of interference between co-located frequency-hopping ad hoc networks. 79-84 - Joseph P. Macker, Jeffery W. Weston

:
An examination of forwarding prediction metrics in dynamic wireless networks. 85-90 - Xian Liu:

Strictly positive secrecy of IoT: A case study involving correlated eavesdroppers. 91-96 - Ertugrul N. Ciftcioglu, Rommie L. Hardy, Lisa M. Scott, Kevin S. Chan:

Efficient chaff-aided obfuscation in resource constrained environments. 97-102 - Yalin E. Sagduyu, Yi Shi

, Tugba Erpek, Sohraab Soltani, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Boleslaw K. Szymanski
, Guohong Cao:
Multilayer MANET routing with social-cognitive learning. 103-108 - Venkata Sriram Siddhardh Nadendla

, Emrah Akyol
, Cedric Langbort, Tamer Basar:
Strategic communication between prospect theoretic agents over a Gaussian test channel. 109-114 - Talha Ahmed Khan, Robert W. Heath Jr.

:
Analyzing wireless power transfer in millimeter wave networks with human blockages. 115-120 - Steven Conrad Hauser, William C. Headley

, Alan J. Michaels:
Signal detection effects on deep neural networks utilizing raw IQ for modulation classification. 121-127 - Joseph Vanderpoorten, Kevin Zhang:

Flexible modem interface - Enabling DoD wideband SATCOM enterprise. 128-134 - Armando J. Vigil, Mark Jasen, Dahesh A. Khalil:

SATCOM innovation: Priorities for modern development. 135-140 - Qiwei Wang, Thinh Nguyen, Khanh D. Pham, Hyuck Kwon:

Satellite jamming: A game theoretic analysis. 141-146 - Lino Gonzalez, Jerry Rippon:

On minimizing WGS transponder power by optimizing channel gains designed for uplink frequency reuse via circular polarization. 147-152 - Jerry Brand, Keith Olds, Thomas Saam:

Real-time control and management of roaming wideband SATCOM terminals. 153-157 - David N. Meadows, Jordan Thomas:

A remote control and management scheme for deployed VSATs: An approach for the USAF pathfinder flexible modem interface. 158-163 - Mohammad Hossein Moghaddam, Mohammad Javad Azizipour, Saeed Vahidian, Besma Smida

:
A framework for super-resolution of scalable video via sparse reconstruction of residual frames. 164-168 - Hassan Yazdani, Azadeh Vosoughi, Nazanin Rahnavard:

Compressive sensing based direction-of-arrival estimation using reweighted greedy block coordinate descent algorithm for ESPAR antennas. 169-173 - Sener Dikmese

, Markku Renfors
, Ismail Güvenç:
Flexible filter bank based spectrum sensing and waveform processing for mission critical communications. 174-179 - Erik Axell

, Sara Örn Tengstrand, Kia Wiklundh:
Online classification of Class A impulse interference. 180-184 - Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner:

Sliding windows technique for LTE network coverage detection. 185-190 - Yuyu Ma, Hui Gao, Tiejun Lv, Yueming Lu:

Novel user clustering schemes for downlink NOMA system. 191-196 - Xinxin Liu, Yunzhou Li, Limin Xiao, Jing Wang:

Power control in D2D-based multi-antenna V2V underlay cellular networks with rate constraints. 197-202 - Henry Romero, Adam R. Margetts, Greg Kuperman:

Subband bandwidth considerations for multiple-antenna multicarrier communications. 203-208 - Hosseinali Jamal, David W. Matolak:

Enhanced airport surface multi-carrier communication systems: Filterbank advantages over AeroMACS OFDM. 209-213 - Stephen G. Wilson, Rui Shang, Ruixuan He:

Frame synchronization for OFDM using cyclic prefix and pilot carriers. 214-218 - Çagri Göken, Onur Dizdar

:
Performance of edge windowing for OFDM under non-linear power amplifier effects. 219-224 - Hitesh Tewari

, Arthur Hughes, Stefan Weber
, Tomas Barry:
X509Cloud - Framework for a ubiquitous PKI. 225-230 - Marcus Pendleton, Shouhuai Xu:

A dataset generator for next generation system call host intrusion detection systems. 231-236 - Iman Vakilinia

, Shamik Sengupta:
A coalitional game theory approach for cybersecurity information sharing. 237-242 - Yi Shi

, Yalin E. Sagduyu:
Evasion and causative attacks with adversarial deep learning. 243-248 - David Whelihan, Michael Vai, Nicholas Evancich, Kyung Joon Kwak, Jason H. Li, M. Britton, B. Frantz, D. Hadcock, Michael Lynch, Douglas Schafer, J. DeMatteis, D. Russo:

Designing agility and resilience into embedded systems. 249-254 - Baki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic:

Quantifying information leakage in a processor caused by the execution of instructions. 255-260 - Xueping Liang, Juan Zhao, Sachin Shetty

, Danyi Li:
Towards data assurance and resilience in IoT using blockchain. 261-266 - Georgios Kambourakis, Constantinos Kolias, Angelos Stavrou

:
The Mirai botnet and the IoT Zombie Armies. 267-272 - Thomas H. Shake, Rahul Amin:

Maximizing interconnectedness and availability in directional airborne range extension networks. 273-278 - Kin-Ping Hui, Damien Phillips, Asanka Kekirigoda:

Beyond Line-of-Sight range extension with OPAL using autonomous unmanned aerial vehicles. 279-284 - DeJuan Anderson

:
An investigation into the use of software defined networking controllers in aerial networks. 285-290 - William D. Watson, Steve Huntsman, James T. Dolan:

Software Defined Networks (SDNs) of RF Internet of Things (RIOTs) on Unmanned Aerial Systems (UASs). 291-296 - John M. Shea

, Joseph P. Macker:
An adjacency matrix approach to delay analysis in temporal networks. 297-302 - Xiao Xu, Sattar Vakili

, Qing Zhao, Ananthram Swami:
Online learning with side information. 303-308 - Yuan Li, Prithwish Basu:

Assigning teams to tasks under time-varying coordination costs. 309-314 - Ali Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng:

Successive synthesis of latent Gaussian trees. 315-320 - Peter Dong, Harrison Carcione, Joseph Hutter, Gina Jiang, Charles Kuch, Soomin Park, Advai Podduturi, Peijing Xu, David Beering:

Designing a low-cost mobile tracking system for communication with a medium earth orbit satellite. 321-324 - Yash Vasavada

, Deepak Arur, Channasandra Ravishankar, Charles Barnett:
User location determination using delay and Doppler measurements in LEO satellite systems. 325-330 - Yash Vasavada

, Channasandra Ravishankar, J. Corrigan, Gaguk Zakaria, Xiaoling Huang:
Determination of locations of calibration earth stations for ground based beam forming in satellite systems. 331-336 - Madhuprana Goswami, Hyuck M. Kwon, Khanh D. Pham, James Lyke, Thinh Nguyen:

Communication on the move with satellite digital beamforming. 337-341 - Ahmad A. I. Ibrahim, Andrew C. Marcum, David J. Love, James V. Krogmeier:

Channel estimation for multi-way quantized distributed wireless relaying. 342-347 - Ngwe Thawdar, Ulysses Lee, Weifeng Su

, Dimitris A. Pados:
Differential amplify-and-forward cooperative relaying in a software-defined radio testbed with an aerial relay node. 348-353 - Xian Liu:

Performance of selection DF scheme for a relay system with non-identical Rician fading. 354-359 - Bilal Al-Doori, Xian Liu, Ayad N. Bihnam:

Throughput and power management of access link DF type I relay nodes for LTE-A networks and beyond. 360-365 - Marcel Rieß

, Steffen Moser, Frank Slomka:
Efficient underwater communication modem for harsh and highly non-stationary channel conditions - A fully model-based approach. 366-371 - Alexei V. Nikitin, Ruslan L. Davidchack:

Nonlinear rank-based analog loop filters in delta-sigma analog-to-digital converters for mitigation of technogenic interference. 372-381 - Juha Kukkola, Mari Ristolainen, Juha-Pekka Nikkarila:

Confrontation with closed network nation: Open network society's choices and consequences. 382-387 - Grace A. Lewis, Sebastián Echeverría, Dan Klinedinst, Keegan Williams:

Secure VM migration in tactical cloudlets. 388-393 - Jaime C. Acosta, Joshua McKee, Alexander Fielder, Salamah Salamah:

A platform for evaluator-centric cybersecurity training and data acquisition. 394-399 - Markus Kont, Mauno Pihelgas, Kaie Maennel

, Bernhards Blumbergs
, Toomas Lepik
:
Frankenstack: Toward real-time Red Team feedback. 400-405 - Hyun Kyoo Park, Min Sik Kim, Moosung Park, Kyungho Lee:

Cyber situational awareness enhancement with regular expressions and an evaluation methodology. 406-411 - Xi Zhang, Qixuan Zhu:

Statistical quality of service provisioning over edge computing mobile wireless networks. 412-417 - Georgios Kyriakou, Pei Liu, Shivendra S. Panwar, Stephen Raio, Giorgio Bertoli, William Scott Sanz, Harold Brown:

Spreading the message: Defining the delay distribution in opportunistic communications. 418-423 - Weiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Yuemei Xu:

A hybrid caching scheme based on manifold learning in CCN. 424-429 - Roberto Fronteddu, Alessandro Morelli

, Enrico Casini, Niranjan Suri, Brian Jalaian, Laurel Sadler:
A content and context-aware solution for network state exchange in tactical networks. 430-435 - Clement Kam, Sastry Kompella

, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Modeling the age of information in emulated ad hoc networks. 436-441 - James Norris, John Nieto:

A new UHF narrowband satellite communications PHY layer for HPW. 442-446 - Robert T. Schwarz, Florian Völk, Andreas Knopp, Christian A. Hofmann

, Kai-Uwe Storek:
The multiple-satellite MIMO channel of narrow band vehicular communications at UHF. 447-452 - Hanguk Jee, Kyuman Lee, Jaesung Lim:

Autonomous maneuvering of relay UAV for battlefields using TDOA localization. 453-458 - Pengyuan Du, Fan Pang, Torsten Braun

, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim:
Traffic optimization in software defined naval network for satellite communications. 459-464 - Tauhidul Alam

, Md. Mahbubur Rahman
, Leonardo Bobadilla
, Brian Rapp:
Multi-vehicle patrolling with limited visibility and communication constraints. 465-470 - Siddhartha S. Borkotoky, Patrick J. Dynes, Michael B. Pursley:

A comparison of three adaptive transmission protocols for fountain-coded multicast. 471-476 - O. Goubet, R. Fracchia, A. Descharles:

A more robust and efficient physical layer for SEDR airborne waveform. 477-482 - Michael A. Tope, Joel M. Morris:

Near optimal channel rate discovery for discrete memoryless binary output channels. 483-488 - Adrien Le Naour, Elie Janin, Charly Poulliat:

New perspectives for coded continuous phase modulations for narrowband waveforms: Iterative versus non-iterative solutions. 489-494 - Marco Di Renzo:

Spatial modulation based on reconfigurable antennas - A new air interface for the IoT. 495-500 - Zafer Vatansever

, Maïté Brandt-Pearce
:
Effects of unknown shadowing and non-line-of-sight on indoor tracking using visible light. 501-506 - Chris A. Rogers, Dimitrie C. Popescu:

Fluctuating extended target detection in clutter environment compressed sensing MIMO radar. 507-512 - Jaeuk Baek, Doyeon Kim, Hongsuk Shim, Youngnam Han:

Improved target-tracking process in PCL. 513-518 - Mahi Abdelbar

, R. Michael Buehrer:
Indoor localization through trajectory tracking using neural networks. 519-524 - Yu Rong, Daniel W. Bliss:

Underdetermined source number estimation based on complex wishart distribution using nested arrays. 525-530 - Kevin Andrea, Arda Gumusalan, Robert Simon, Hugh Harney:

The design and implementation of a multicast address moving target defensive system for internet-of-things applications. 531-538 - Cong Pu

, Sunho Lim, Byungkwan Jung, Manki Min:
Mitigating stealthy collision attack in energy harvesting motivated networks. 539-544 - Laila M. Almutairi, Sachin Shetty

:
Generalized stochastic Petri Net model based security risk assessment of software defined networks. 545-550 - Joseph Sagisi, Joseph G. Tront, Randy C. Marchany:

System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet. 551-556 - Yonghui Xin, Yang Li, Wei Wang, Weiyuan Li, Xin Chen:

Detection of collusive interest flooding attacks in named data networking using wavelet analysis. 557-562 - Chang Liu

, Zygmunt J. Haas:
Multi-hop routing protocols for RFID systems with tag-to-tag communication. 563-568 - Shamsad Parvin, Abderrahmen Mtibaa, Hong Huang, Satyajayant Misra, S. M. Yahea Mahbub, Ali Alshehri, Ramin Zahedi:

STAR: STAble routing for hidden interfering primary user problems in mobile cognitive radio networks. 569-574 - Paulo Alexandre Regis, Shamik Sengupta:

Distributed split-path routing strategy for multi-hop mesh networks. 575-580 - Brian Adamson, Joseph P. Macker, Jeffery W. Weston

:
Elastic multicast: Design extensions and experimentation results. 581-586 - Michael J. Hirsch, Azar Sadeghnejad

, Héctor J. Ortiz-Peña:
Shortest paths for routing information over temporally dynamic communication networks. 587-591 - Nathaniel B. Soule, Benjamin Toll, Colleen T. Rock, Emily H. Do, Jonathan Price, Joseph P. Loyall, Joseph P. McEttrick, James R. Milligan:

Enabling real-time global reach using a gateway building framework. 592-598 - Salman M. Al-Shehri, Pavel Loskot, Tolga Numanoglu, Mehmet Mert:

Comparing tactical and commercial MANETs design strategies and performance evaluations. 599-604 - Sebastián Echeverría, Grace A. Lewis, Marc Novakouski, Jeff Boleng:

Delay-tolerant data sharing in tactical environments. 605-610 - Allen Starke, D. Kumar, M. Ford, Janise McNair, A. Bell:

A test bed study of network determinism for heterogeneous traffic using time-triggered ethernet. 611-616 - Mohammadreza Mousaei, Mojtaba Soltanalian

, Besma Smida
:
ComSens: Exploiting pilot diversity for pervasive integration of communication and sensing in MIMO-TDD-Frameworks. 617-622 - Muharrem Arik, Özgür B. Akan:

Utilizing sidelobe ASK based joint radar-communication system under fading. 623-628 - Joel T. Kees, Joseph M. Ernst, William C. Headley

, A. A. Louis Beex:
Robust blind spectral estimation in the presence of non-Gaussian noise. 629-634 - Jonathon Cheah, Mitre San Diego:

Numerical reference frequency sample. 635-640 - Xiao-Bei Liu, Yong Liang Guan, Soo Ngee Koh, Zilong Liu, Peng Wang:

Single-channel blind separation of co-frequency PSK signals with unknown carrier frequency offsets. 641-646 - Özgür Özdemir, Ridha Hamila, Naofal Al-Dhahir, Ismail Güvenç:

Sparsity-aware joint frame synchronization and channel estimation: Algorithm and USRP implementation. 647-652 - Catherine Lamy-Bergot

, Jean-Luc Rogier, Jean-Yves Bernier, Jean-Baptiste Chantelouve, Patrice Stevens, Philippe Crambert:
Time-division approach in HF wideband: Surfing the wave to offer a better performance. 653-658 - Danda B. Rawat

, Olumide Malomo, Chandra Bajracharya, Min Song:
Evaluating physical-layer security for secondary users in cognitive radio systems with attackers. 659-665 - James Chacko, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy

, Kapil R. Dandekar
:
Independent source architecture for developing FPGA-based physical layer security techniques. 666-671 - Xian Liu:

Secrecy analysis of the cloud-Fog radio access network with poisson point process and general path-loss parameters. 672-677 - Joseph Schneible, Alex Lu:

Anomaly detection on the edge. 678-682 - Moustafa Saleh, E. Paul Ratazzi

, Shouhuai Xu:
A control flow graph-based signature for packer identification. 683-688 - Benjamin Nahill, Aaron Mills, Martin Kiernicki, David A. Wilson, Michael Vai, Roger Khazan, John Sherer:

Towards a universal CDAR device: A high-performance adapter-based inline media encryptor. 689-694 - Jason A. Wampler, Chien Hsieh, Andrew Toth:

Efficient distribution of fragmented sensor data for obfuscation. 695-700 - Hasan Cam:

Online detection and control of malware infected assets. 701-706 - Bernhards Blumbergs

, Risto Vaarandi
:
Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysis. 707-712 - Neelakantan Nurani Krishnan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella

:
Coexistence of radar and communication systems in CBRS bands through downlink power control. 713-718 - Narueporn Nartasilpa, Daniela Tuninetti

, Natasha Devroye:
Signal constellation design in the presence of radar interference and Gaussian noise. 719-724 - Hamza Soury, Besma Smida

:
Optimal pilot overhead for FDD full-duplex communication and radar sensing (ComSens). 725-730 - Jouni Koivisto, Topi Tuukkanen

:
Comprehensive capability meta model tested by a cognitive radio. 731-737 - Susan Watson, Jean-Benoit Larouche:

Design of a software defined radio-based tactical DSA network. 738-743 - Raghunandan M. Rao

, Sean Ha, Vuk Marojevic
, Jeffrey H. Reed:
LTE PHY layer vulnerability analysis and testing using open-source SDR tools. 744-749 - Hanguang Yu, Hyunseok Lee, Richard M. Gutierrez, Andrew Herschfelt, Daniel W. Bliss:

WISCA SDR network. 750-755 - Dmitry Kramarev

:
Accurate symbol-level synchronization of universal software radio peripherals for physical-layer network coding applications. 756-761 - Suman Bhunia

, Shamik Sengupta:
Implementation of interface agility for duplex dynamic spectrum access radio using USRP. 762-767 - Jingchao Bao, Derek Sprinz, Husheng Li:

Blockage of millimeter wave communications on rotor UAVs: Demonstration and mitigation. 768-774 - Celalettin Umit Bas, Vinod Kristem

, Rui Wang, Andreas F. Molisch:
Real-time ultra-wideband frequency sweeping channel sounder for 3-18 GHz. 775-781 - Rui Wang, Celalettin Umit Bas, Seun Sangodoyin, Sooyoung Hur, Jeongho Park, Jianzhong Zhang, Andreas F. Molisch:

Stationarity region of Mm-Wave channel based on outdoor microcellular measurements at 28 GHz. 782-787 - Robert A. Hunjet

, Thomas Stevens, Mathew Elliot, Bradley Fraser
, Peter George:
Survivable communications and autonomous delivery service a generic swarming framework enabling communications in contested environments. 788-793 - Saritha Arunkumar, Mudhakar Srivatsa, Elisa Bertino:

Learning information release policies for preventing intersection attacks. 794-799 - Na Pang, Dali Zhu, Gang Li

, Shaowu Liu
:
WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric model. 800-805 - Jonathan Thews, Alan O'Donnell, Alan J. Michaels:

Design and analysis of dual helix liquid metal antenna. 806-811 - Jonathan Thews, Alan O'Donnell, Alan J. Michaels:

Design and analysis of two-dimensional parasitic liquid metal monopole array. 812-816 - Drew Overturf, Kristopher Buchanan, Jeffrey Jensen, Carlos Flores-Molina, Sara Wheeland, Gregory H. Huff

:
Investigation of beamforming patterns from volumetrically distributed phased arrays. 817-822 - Robert Mitchell, Elizabeth Walkup:

Further refinements to the foundations of cyber zone defense. 823-828 - Iman Vakilinia

, Deepak K. Tosh
, Shamik Sengupta:
3-Way game model for privacy-preserving cybersecurity information exchange framework. 829-834 - Tyler Ward, Joseph I. Choi, Kevin R. B. Butler

, John M. Shea
, Patrick Traynor, Tan F. Wong:
Privacy preserving localization using a distributed particle filtering protocol. 835-840 - Alan J. Michaels, Matthew Meadows, Joseph M. Ernst:

PRNG sequence combination techniques via Galois extension fields. 841-845 - Jaeyoung Choi, Yung Yi:

Joint optimization of emergency and periodic message transmissions in vehicular networks. 846-851 - Chenchen Liu, Tiejun Lv, Weijun Tang, Hui Gao, Yueming Lu:

On the performance of mode selection for hybrid-duplex D2D communications. 852-857 - Sohraab Soltani, Yalin E. Sagduyu, Sean Scanlon, Yi Shi

, Jason H. Li, Jared Feldman, John D. Matyjas:
Joint network coding and backpressure algorithm for cognitive radio networks. 858-863 - Vikas Bollapragada Subrahmanya, Harlan B. Russell:

RMTS-a: A scheduling based MAC protocol with frame aggregation for multi-rate radios in an Ad Hoc network. 864-869 - Joakim Johanson Lindquister, Frank T. Johnsen, Trude Hafsoe Bloebaum:

Proxy pair optimizations for increased service reliability in DIL networks. 870-875 - Joel Anderson, Jin-Hee Cho:

Software Defined Network Based Virtual Machine Placement in Cloud Systems. 876-881 - Warren Smith, Greg Kuperman, Michael Chan, Eric Morgan, Huy Nguyen, Nabil Schear, Bich Vu, Andrew J. Weinert

, Matthew Weyant, Daniel Whisman:
Cloud computing in tactical environments. 882-887 - Romain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent:

Channel estimation and equalization for CPM with application for aeronautical communications via a satellite link. 888-893 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:

Outage probability analysis of the Protected Tactical Waveform (PTW) on the return link. 894-899 - Xian Liu:

A secrecy model in satellite fading channels. 900-905

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














