


Остановите войну!
for scientists:


default search action
Richard R. Brooks
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j57]Richard R. Brooks
, Lu Yu, Ilker Özçelik
, Jon Oakley, Nathan Tusing
:
Distributed Denial of Service (DDoS): A History. IEEE Ann. Hist. Comput. 44(2): 44-54 (2022) - [j56]Fei Sun
, Richard R. Brooks
, Gurcan Comert
, Nathan Tusing
:
Side-Channel Security Analysis of Connected Vehicle Communications Using Hidden Markov Models. IEEE Trans. Intell. Transp. Syst. 23(10): 17562-17574 (2022) - [c50]Xingsi Zhong, Ganesh K. Venayagamoorthy, Richard R. Brooks:
A Virtual Synchrophasor Network for Power System Resiliency Under Concurrent DoS Attacks. SSCI 2022: 1342-1349 - 2021
- [j55]Amani Altarawneh, Fei Sun
, Richard R. Brooks, Oluwakemi Hambolu, Lu Yu
, Anthony Skjellum:
Availability analysis of a permissioned blockchain with a lightweight consensus protocol. Comput. Secur. 102: 102098 (2021) - [j54]Lu Yu
, Yu Fu, Jonathan Oakley, Oluwakemi Hambolu, Richard R. Brooks:
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms. Comput. Secur. 105: 102206 (2021) - [c49]Paul Black, Iqbal Gondal, Richard R. Brooks, Lu Yu:
AFES: An Advanced Forensic Evidence System. EDOC Workshops 2021: 67-74 - [i10]Jon Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Ilker Özçelik
, Anthony Skjellum, Jihad Obeid:
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. CoRR abs/2109.05649 (2021) - 2020
- [j53]Jonathan Oakley
, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy
, Richard R. Brooks:
Protocol Proxy: An FTE-based covert channel. Comput. Secur. 92: 101777 (2020) - [c48]Satyabrata Sen, Nageswara S. V. Rao, Chase Q. Wu, Richard R. Brooks, Christopher Temples:
Detecting Low-level Radiation Sources Using Border Monitoring Gamma Sensors. MFI 2020: 342-347 - [p2]Carl R. Worley, Lu Yu, Richard R. Brooks, Jon Oakley, Anthony Skjellum, Amani Altarawneh, Sai Medury, Ujan Mukhopadhyay:
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications. Blockchain Cybersecurity, Trust and Privacy 2020: 51-67 - [i9]Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard R. Brooks:
Protocol Proxy: An FTE-based Covert Channel. CoRR abs/2002.10687 (2020)
2010 – 2019
- 2019
- [j52]Chase Qishi Wu
, Mark L. Berry, Kayla M. Grieme, Satyabrata Sen
, Nageswara S. V. Rao
, Richard R. Brooks
, Guthrie Cordone:
Network Detection of Radiation Sources Using Localization-Based Approaches. IEEE Trans. Ind. Informatics 15(4): 2308-2320 (2019) - [c47]Nathan Tusing
, Jonathan Oakley, C. Geddings Barrineau, Lu Yu, Kuang-Ching Wang, Richard R. Brooks:
Traffic Analysis Resistant Network (TARN) Anonymity Analysis. ICNP 2019: 1-2 - [i8]Lu Yu, Oluwakemi Hambolu, Yu Fu, Jon Oakley, Richard R. Brooks:
Privacy Preserving Count Statistics. CoRR abs/1910.07020 (2019) - 2018
- [j51]Richard R. Brooks
, Lu Yu, Yu Fu, Oluwakemi Hambolu, John Gaynard, Julie Owono, Archippe Yepmou, Felix Blanc:
Internet freedom in West Africa: technical support for journalists and democracy advocates. Commun. ACM 61(5): 72-82 (2018) - [j50]Guneet Bedi
, Ganesh Kumar Venayagamoorthy
, Rajendra Singh, Richard R. Brooks
, Kuang-Ching Wang:
Review of Internet of Things (IoT) in Electric Power and Energy Systems. IEEE Internet Things J. 5(2): 847-870 (2018) - [c46]Kuang-Ching Wang, Richard R. Brooks
, C. Geddings Barrineau, Jonathan Oakley, Lu Yu, Qing Wang:
Internet Security Liberated via Software Defined Exchanges. SDN-NFV@CODASPY 2018: 19-22 - [c45]Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu, Richard R. Brooks
:
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing. SDN-NFV@CODASPY 2018: 55-58 - [c44]Chase Q. Wu, Wuji Liu, Satyabrata Sen
, Nageswara S. V. Rao, Richard R. Brooks
, Guthrie Cordone:
Two-Level Clustering-Based Target Detection Through Sensor Deployment and Data Fusion. FUSION 2018: 2376-2383 - [c43]Sai Medury, Anthony Skjellum, Richard R. Brooks
, Lu Yu:
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. MALWARE 2018: 145-152 - [c42]Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks
, Anthony Skjellum:
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. MALWARE 2018: 161-166 - [i7]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - 2017
- [j49]Xingsi Zhong, Iroshani Jayawardene, Ganesh Kumar Venayagamoorthy
, Richard R. Brooks:
Denial of Service Attack on Tie-Line Bias Control in a Power System With PV Plant. IEEE Trans. Emerg. Top. Comput. Intell. 1(5): 375-390 (2017) - [j48]Yu Fu
, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik
, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks
:
Stealthy Domain Generation Algorithms. IEEE Trans. Inf. Forensics Secur. 12(6): 1430-1443 (2017) - [c41]Guthrie Cordone, Richard R. Brooks
, Satyabrata Sen
, Nageswara S. V. Rao, Chase Q. Wu, Mark L. Berry, Kayla M. Grieme:
Improved multi-resolution method for MLE-based localization of radiation sources. FUSION 2017: 1-8 - [c40]Lu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks
, Kuang-Ching Wang:
TARN: A SDN-based traffic analysis resistant network architecture. MALWARE 2017: 91-98 - [i6]Xingsi Zhong, Yu Fu, Lu Yu, Richard R. Brooks:
Stealthy Malware Traffic - Not as Innocent as It Looks. CoRR abs/1703.02200 (2017) - [i5]Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks:
A Covert Data Transport Protocol. CoRR abs/1703.02201 (2017) - [i4]Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum:
Provenance Threat Modeling. CoRR abs/1703.03835 (2017) - [i3]Lu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang:
TARN: A SDN-based Traffic Analysis Resistant Network Architecture. CoRR abs/1709.00782 (2017) - [i2]Lu Yu, Richard R. Brooks:
Stochastic Tools for Network Intrusion Detection. CoRR abs/1709.07567 (2017) - [i1]Richard R. Brooks, Lu Yu, Yu Fu, Guthrie Cordone, Jon Oakley, Xingsi Zhong:
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data. CoRR abs/1709.07573 (2017) - 2016
- [j47]Buke Ao, Yongcai Wang, Lu Yu, Richard R. Brooks
, S. S. Iyengar:
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms. ACM Comput. Surv. 49(1): 5:1-5:23 (2016) - [c39]Satyabrata Sen, Nageswara S. V. Rao, Chase Q. Wu, Mark L. Berry, Kayla M. Grieme, Richard R. Brooks, Guthrie Cordone:
Performance analysis of Wald-statistic based network detection methods for radiation sources. FUSION 2016: 820-827 - [c38]Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks
:
A covert data transport protocol. MALWARE 2016: 93-100 - [c37]Chase Q. Wu, Mark L. Berry, Kayla M. Grieme, Satyabrata Sen, Nageswara S. V. Rao, Richard R. Brooks
, Guthrie Cordone:
A source-attractor approach to network detection of radiation sources. MFI 2016: 394-399 - [c36]Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks
, Ujan Mukhopadhyay, Anthony Skjellum:
Provenance threat modeling. PST 2016: 384-387 - [c35]Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Richard R. Brooks
:
A brief survey of Cryptocurrency systems. PST 2016: 745-752 - 2015
- [j46]Ilker Özçelik
, Richard R. Brooks
:
Deceiving entropy based DoS detection. Comput. Secur. 48: 234-245 (2015) - [c34]Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks
, Ganesh Kumar Venayagamoorthy
:
Side-Channels in Electric Power Synchrophasor Network Data Traffic. CISR 2015: 3:1-3:8 - [c33]Dan Du, Lu Yu, Richard R. Brooks
:
Semantic Similarity Detection For Data Leak Prevention. CISR 2015: 4:1-4:6 - [c32]Yu Fu, Benafsh Husain, Richard R. Brooks
:
Analysis of Botnet Counter-Counter-Measures. CISR 2015: 9:1-9:4 - [c31]Lu Yu, Juan Deng, Richard R. Brooks
, SeokBae Yun:
Automobile ECU Design to Avoid Data Tampering. CISR 2015: 10:1-10:4 - [c30]Xingsi Zhong, Yu Fu, Lu Yu, Richard R. Brooks
, Ganesh Kumar Venayagamoorthy
:
Stealthy malware traffic - Not as innocent as it looks. MALWARE 2015: 110-116 - 2013
- [j45]Chen Lu, Jason M. Schwier, Ryan Craven, Lu Yu, Richard R. Brooks
, Christopher Griffin
:
A Normalized Statistical Metric Space for Hidden Markov Models. IEEE Trans. Cybern. 43(3): 806-819 (2013) - [j44]Lu Yu, Jason M. Schwier, Ryan Craven, Richard R. Brooks
, Christopher Griffin
:
Inferring Statistically Significant Hidden Markov Models. IEEE Trans. Knowl. Data Eng. 25(7): 1548-1558 (2013) - [c29]Richard R. Brooks
, Benafsh Husain, SeokBae Yun, Juan Deng:
Security and performance evaluation of security protocols. CSIIRW 2013: 2 - [c28]Chen Lu, Richard R. Brooks
:
Timing analysis in P2P botnet traffic using probabilistic context-free grammars. CSIIRW 2013: 14 - [c27]Katherine C. Cameron, Richard R. Brooks
, Juan Deng:
Cost-effective quality assurance of wireless network security. CSIIRW 2013: 15 - [c26]Lianyu Zhao, Richard R. Brooks
:
Tailoring trusted semantic information. CSIIRW 2013: 17 - [c25]Lu Yu, Richard R. Brooks
:
Applying POMDP to moving target optimization. CSIIRW 2013: 49 - [c24]Richard R. Brooks
, Oluwakemi Hambolu, Paul Marusich, Yu Fu, Saiprasad Balachandran:
Creating a tailored trustworthy space for democracy advocates using hostile host. CSIIRW 2013: 50 - [c23]Ilker Özçelik
, Richard R. Brooks
:
Operational system testing for designed in security. CSIIRW 2013: 55 - [c22]Ilker Özçelik
, Yu Fu, Richard R. Brooks
:
DoS Detection is Easier Now. GREE 2013: 50-55 - [c21]Karan Sapra, Benafsh Husain, Richard R. Brooks
, Melissa C. Smith:
Circumventing keyloggers and screendumps. MALWARE 2013: 103-108 - 2011
- [j43]Harakrishnan Bhanu, Jason M. Schwier, Ryan Craven, Richard R. Brooks, Kathryn Hempstalk, Daniele Gunetti, Christopher Griffin:
Side-Channel Analysis for Detecting Protocol Tunneling. Adv. Internet Things 1(2): 13-26 (2011) - [j42]Christopher Griffin
, Richard R. Brooks
, Jason M. Schwier:
A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set. IEEE Trans. Autom. Control. 56(8): 1926-1931 (2011) - [j41]Chinar Dingankar, Sampada Karandikar, Richard R. Brooks
, Christopher Griffin
:
On Bandwidth-Limited Sum-of-Games Problems. IEEE Trans. Syst. Man Cybern. Part A 41(2): 341-349 (2011) - [j40]Jason M. Schwier, Richard R. Brooks
, Christopher Griffin
:
Methods to Window Data to Differentiate Between Markov Models. IEEE Trans. Syst. Man Cybern. Part B 41(3): 650-663 (2011) - [c20]Chen Lu, Richard R. Brooks
:
Botnet traffic detection using hidden Markov models. CSIIRW 2011: 31 - [c19]Ilker Özçelik
, Richard R. Brooks
:
Security experimentation using operational systems. CSIIRW 2011: 79 - [c18]Lu Yu, Richard R. Brooks
:
Observable subspace solution for irreducible POMDPs with infinite horizon. CSIIRW 2011: 83 - [c17]Harakrishnan Bhanu, Jason M. Schwier, Ryan Craven, Ilker Özçelik
, Christopher Griffin
, Richard R. Brooks
:
Noise tolerant symbolic learning of Markov models of tunneled protocols. IWCMC 2011: 1310-1314 - 2010
- [j39]Mengxia Zhu, Song Ding, Qishi Wu, Richard R. Brooks
, Nageswara S. V. Rao
, S. Sitharama Iyengar:
Fusion of threshold rules for target detection in wireless sensor networks. ACM Trans. Sens. Networks 6(2): 18:1-18:7 (2010) - [c16]Ryan Craven, Christopher Abbott, Harikrishnan Bhanu, Juan Deng, Richard R. Brooks
:
Orwell was an optimist. CSIIRW 2010: 57 - [c15]Richard R. Brooks
, Juan Deng:
Lies and the lying liars that tell them: a fair and balanced look at TLS. CSIIRW 2010: 59
2000 – 2009
- 2009
- [j38]Richard R. Brooks
, Brijesh Pillai, Matthew Pirretti, Michele C. Weigle
:
Multicast Encryption Infrastructure for Security in Sensor Networks. Int. J. Distributed Sens. Networks 5(2): 139-157 (2009) - [j37]Richard R. Brooks
, Hemanth Siddulugari:
Adaptive Optimizations for Surveillance Sensor Network Longevity. Int. J. Distributed Sens. Networks 5(2): 158-184 (2009) - [j36]Richard R. Brooks
:
Sensor Network Self-Organization Using Random Graphs. Int. J. Distributed Sens. Networks 5(3): 201-208 (2009) - [j35]Richard R. Brooks
, P. Y. Govindaraju, Matthew Pirretti, Narayanan Vijaykrishnan, Mahmut T. Kandemir:
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies. Int. J. Distributed Sens. Networks 5(3): 209-223 (2009) - [j34]Mengxia Zhu, Richard R. Brooks
:
Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks. Int. J. Distributed Sens. Networks 5(5): 480-501 (2009) - [j33]Jason M. Schwier, Richard R. Brooks
, Christopher Griffin
, Satish T. S. Bukkapatnam
:
Zero knowledge hidden Markov model inference. Pattern Recognit. Lett. 30(14): 1273-1280 (2009) - [j32]Richard R. Brooks
, Jason M. Schwier, Christopher Griffin
:
Markovian Search Games in Heterogeneous Spaces. IEEE Trans. Syst. Man Cybern. Part B 39(3): 626-635 (2009) - [j31]Richard R. Brooks
, Jason M. Schwier, Christopher Griffin
:
Behavior Detection Using Confidence Intervals of Hidden Markov Models. IEEE Trans. Syst. Man Cybern. Part B 39(6): 1484-1492 (2009) - [j30]Richard R. Brooks
, S. Sander, Juan Deng, Joachim Taiber:
Automobile security concerns. IEEE Veh. Technol. Mag. 4(2): 52-64 (2009) - 2008
- [j29]S. Sitharama Iyengar, Richard R. Brooks
, Günter Karjoth:
International Journal of Distributed Sensor Networks. Int. J. Distributed Sens. Networks 4(1): 1-3 (2008) - [j28]Richard R. Brooks
, Jing-En Pang, Christopher Griffin
:
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. IEEE Trans. Syst. Man Cybern. Part A 38(6): 1281-1294 (2008) - [c14]Christopher Griffin
, Richard R. Brooks
, Jason M. Schwier:
Determining a purely symbolic transfer function from symbol streams: Theory and algorithms. ACC 2008: 4065-4067 - 2007
- [j27]Richard R. Brooks
, Brijesh Pillai, Michele C. Weigle
, Matthew Pirretti:
Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks. Int. J. Distributed Sens. Networks 3(3): 273-287 (2007) - [j26]Richard R. Brooks
, Brijesh Pillai, Stephen A. Racunas, Suresh Rai:
Mobile Network Analysis Using Probabilistic Connectivity Matrices. IEEE Trans. Syst. Man Cybern. Part C 37(4): 694-702 (2007) - [j25]Richard R. Brooks
, P. Y. Govindaraju, Matthew Pirretti, Narayanan Vijaykrishnan, Mahmut T. Kandemir:
On the Detection of Clones in Sensor Networks Using Random Key Predistribution. IEEE Trans. Syst. Man Cybern. Part C 37(6): 1246-1258 (2007) - [c13]Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Richard R. Brooks:
Performance aware secure code partitioning. DATE 2007: 1122-1127 - 2006
- [j24]Glenn Carl, Richard R. Brooks
, Suresh Rai:
Wavelet based Denial-of-Service detection. Comput. Secur. 25(8): 600-615 (2006) - [j23]Richard R. Brooks
, Christopher N. Vutsinas:
Kafka in the academy: a note on ethics in IA education. IEEE Secur. Priv. 4(4): 50-53 (2006) - [j22]Richard R. Brooks:
A Review of: "Wireless Sensor Networks: An Information Processing.". Int. J. Distributed Sens. Networks 2(1): 101-102 (2006) - [j21]Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick D. McDaniel, Mahmut T. Kandemir, Richard R. Brooks
:
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distributed Sens. Networks 2(3): 267-287 (2006) - [j20]Glenn Carl, George Kesidis, Richard R. Brooks
, Suresh Rai:
Denial-of-Service Attack-Detection Techniques. IEEE Internet Comput. 10(1): 82-89 (2006) - [j19]Christopher Griffin
, Richard R. Brooks
:
A note on the spread of worms in scale-free networks. IEEE Trans. Syst. Man Cybern. Part B 36(1): 198-202 (2006) - [c12]Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Richard R. Brooks
, Ibrahim Kolcu:
Secure Execution of Computations in Untrusted Hosts. Ada-Europe 2006: 106-118 - [c11]Marion G. Ceruti, Subrata Das, Adam Ashenfelter, Gary Raven, Richard R. Brooks
, Moises Sudit, Genshe Chen, Edward Wright:
Pedigree Information for Enhanced Situation and Threat Assessment. FUSION 2006: 1-8 - 2005
- [j18]Eric J. Swankoski, Narayanan Vijaykrishnan, Richard R. Brooks, Mahmut T. Kandemir, Mary Jane Irwin:
Symmetric encryption in reconfigurable and custom hardware. Int. J. Embed. Syst. 1(3/4): 205-217 (2005) - [c10]Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richard R. Brooks:
A Compiler-Based Approach to Data Security. CC 2005: 188-203 - [c9]Hendra Saputra, Ozcan Ozturk, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Richard R. Brooks
:
A Data-Driven Approach for Embedded Security. ISVLSI 2005: 104-109 - 2004
- [j17]Richard R. Brooks
, Christopher Griffin
, T. Alan Payne:
A cellular automata model can quickly approximate UDP and TCP network traffic. Complex. 9(3): 32-40 (2004) - [j16]Richard R. Brooks
:
Mobile Code Paradigms and Security Issues. IEEE Internet Comput. 8(3): 54-59 (2004) - [j15]Richard R. Brooks
, Thomas E. Keiser:
Mobile Code Daemons for Networks of Embedded Systems. IEEE Internet Comput. 8(4): 72-79 (2004) - [j14]S. Sitharama Iyengar, Richard R. Brooks:
Special issue introduction--the road map for distributed sensor networks in the context of computing and communication. J. Parallel Distributed Comput. 64(7): 785-787 (2004) - [j13]Richard R. Brooks
, Mengxia Zhu, Jacob Lamb, S. Sitharama Iyengar:
Aspect-oriented design of sensor networks. J. Parallel Distributed Comput. 64(7): 853-865 (2004) - [j12]Richard R. Brooks
, David Friedlander
, John Koch, Shashi Phoha:
Tracking multiple targets with self-organizing distributed ground sensors. J. Parallel Distributed Comput. 64(7): 874-884 (2004) - [c8]Matthew Pirretti, Greg M. Link, Richard R. Brooks
, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin:
Fault Tolerant Algorithms for Network-On-Chip Interconnect. ISVLSI 2004: 46-51 - [c7]Hendra Saputra, Guangyu Chen, Richard R. Brooks
, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin:
Code protection for resource-constrained embedded devices. LCTES 2004: 240-248 - [p1]Qishi Wu, Nageswara S. V. Rao, Richard R. Brooks, S. Sitharama Iyengar, Mengxia Zhu:
Computational andNetworking Problemsin Distributed Sensor Networks. Handbook of Sensor Networks 2004 - 2003
- [j11]David Friedlander
, Christopher Griffin
, Noah Jacobson, Shashi Phoha, Richard R. Brooks
:
Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network. EURASIP J. Adv. Signal Process. 2003(4): 371-377 (2003) - [j10]John Zachary, Richard R. Brooks:
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware. Mob. Networks Appl. 8(2): 137-143 (2003) - [j9]Richard R. Brooks
, Parameswaran Ramanathan, Akbar M. Sayeed:
Distributed target classification and tracking in sensor networks. Proc. IEEE 91(8): 1163-1171 (2003) - [c6]Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin, Richard R. Brooks, Soontae Kim, Wei Zhang:
Masking the Energy Behavior of DES Encryption. DATE 2003: 10084-10089 - [c5]Shashi Phoha, Noah Jacobson, David Friedlander, Richard R. Brooks:
Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering. GLOBECOM 2003: 2952-2956 - [c4]Richard R. Brooks, Matthew Pirretti, Mengxia Zhu, S. Sitharama Iyengar:
Distributed adaptation methods for wireless sensor networks. GLOBECOM 2003: 2967-2971 - 2002
- [j8]Richard R. Brooks
, Christopher Griffin
, David Friedlander
:
Self-Organized Distributed Sensor Network Entity Tracking. Int. J. High Perform. Comput. Appl. 16(3): 207-219 (2002) - [j7]Richard R. Brooks
, Christopher Griffin
:
Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms. Int. J. High Perform. Comput. Appl. 16(3): 221-234 (2002) - [j6]Ying Chen, Richard R. Brooks
, S. Sitharama Iyengar, Nageswara S. V. Rao
, Jacob Barhen:
Efficient Global Optimization for Image Registration. IEEE Trans. Knowl. Data Eng. 14(1): 79-92 (2002) - [j5]Richard R. Brooks
, Nathan Orr:
A Model for Mobile Code Using Interacting Automata. IEEE Trans. Mob. Comput. 1(4): 313-326 (2002) - 2001
- [j4]Richard R. Brooks
, Lynne L. Grewe, S. Sitharama Iyengar:
Recognition in the wavelet domain: A survey. J. Electronic Imaging 10(3): 757-784 (2001) - 2000
- [c3]Richard R. Brooks, Eric Grele, Wojtek Klimkiewicz, Jamila Moore, Christopher Griffin, Brian Kovak, John Koch:
Reactive Sensor Networks. DARS 2000: 471-472
1990 – 1999
- 1999
- [c2]