default search action
35th MILCOM 2016: Baltimore, MD, USA
- Jerry Brand, Matthew C. Valenti, Akinwale Akinpelu, Bharat T. Doshi, Bonnie L. Gorsic:
2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, November 1-3, 2016. IEEE 2016, ISBN 978-1-5090-3781-0 - Michael Atighetchi, Fusun Yaman, Borislava I. Simidchieva, Marco M. Carvalho:
An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms. 1-6 - Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. 7-12 - Steven W. Stone:
Agility in decision-making for cyberspace operations. 13-18 - Marco M. Carvalho, Thomas C. Eskridge, Michael Atighetchi, Nicholas Paltzer:
Semi-automated wrapping of defenses (SAWD) for cyber command and control. 19-24 - Elisha Peterson:
Dagger: Modeling and visualization for mission impact situation awareness. 25-30 - Eric D. Trias, William R. Simpson, Kevin E. Foltz, Frank P. Konieczny:
Enterprise Level Security. 31-36 - Zhuo Lu, Yalin E. Sagduyu:
Risk assessment based access control with text and behavior analysis for document management. 37-42 - Weiwei Zhao, Aixin Zhang, Jianhua Li, Xinghua Wu, Yuchen Liu:
Analysis and design of an authentication protocol for space information network. 43-48 - Nicolas Papernot, Patrick D. McDaniel, Ananthram Swami, Richard E. Harang:
Crafting adversarial input sequences for recurrent neural networks. 49-54 - David Whelihan, Michael Vai, Daniil M. Utin, Roger Khazan, Karen Gettings, Tom Anderson, Antonio Godfrey, Raymond Govotski, Mark Yeager, Brendon Chetwynd, Ben Nahill, Eric Koziel:
SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor. 55-60 - Younghee Park, Shruti Daftari, Pratik Inamdar, Snehal Salavi, Aniket Savanand, Youngsoo Kim:
IoTGuard: Scalable and agile safeguards for Internet of Things. 61-66 - Vikas Bollapragada Subrahmanya, Harlan B. Russell:
Recovering the reserved transmission time slots in an ad hoc network with scheduled channel access. 67-72 - Zhifeng He, Shiwen Mao, Sastry Kompella, Ananthram Swami:
Link scheduling and channel assignment with a graph spectral clustering approach. 73-78 - John Metzger, Vincent W. S. Chan, Christopher C. Yu:
A random access scheme for satellite packet communication with intentional interference. 79-84 - Zejue Wang, Hongjia Li, Dan Wang, Liming Wang, Song Ci:
Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments. 85-90 - Michael T. Cunningham, Gary J. Saulnier, Robert Chase, Edward M. Curt, Kyle R. Wilt, Francisco J. Maldonado, Stephen Oonk, Henry A. Scarton:
Low-rate ultrasonic communications and power delivery for sensor applications. 91-96 - Kevin Schubert, Nicholas Bambos:
Data aggregation for low power wireless devices. 97-102 - Nick Letzepis:
Optimal power allocation for parallel Gaussian channels with LPD constraints. 103-107 - Yalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri:
Analytical framework for MANET learning and routing. 108-113 - Vincentzio Roman, Jakub J. Moskal, Mieczyslaw M. Kokar, Roger P. Guseman, Robert B. Normoyle, David H. Scheidt:
Reusability of knowledge for deriving latent situational information in EW scenarios. 114-119 - Di Wu, Dongmei Zhao, Weimiao Feng, Siye Wang, Yu Zhang:
SPIN: An active location verification scheme for wireless sensor networks. 120-125 - Xin Tian, Genshe Chen, Khanh D. Pham, Erik Blasch:
Joint transmission power control in transponded SATCOM systems. 126-131 - Krittetash Pinyoanuntapong, Madhuprana Goswami, Ashfia Binte Habib, Hyuck M. Kwon, Khanh D. Pham:
Boundaries of signal-to-noise ratio for adaptive code modulations. 132-137 - Matthew Hannon, Shaung Feng, Hyuck M. Kwon, Khanh D. Pham:
Jamming statistics-dependent frequency hopping. 138-143 - Haya Shajaiah, Jasmin A. Mahal, Charles Clancy:
Resource management with anti-jamming capability for cognitive space communication systems. 144-149 - Tien M. Nguyen, Andy T. Guillen, Sumner S. Matsunaga:
Practical achievable capacity for advanced SATCOM on-the-Move. 150-155 - Mengqi Ren, Ruixin Niu, Gang Wang, Genshe Chen:
Minimax anti-jammer design for FHSS/QPSK satellite communication systems. 156-161 - Thi My Chinh Chu, Hans-Jürgen Zepernick, Hoc Phan:
Optimal secrecy capacity of underlay cognitive radio networks with multiple relays. 162-167 - Wenqi Liu, Hongxiang Li, Sanjuli Agarwal, Bin Xie:
Optimize the spectrum sensing and decision making strategies under uncertainty for SATCOM. 168-173 - Yang Li, Qihang Peng:
Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning. 174-179 - J. Daniel Park, John F. Doherty:
A steganographic approach for covert waveform design. 180-185 - Tyler Ward, Eduardo L. Pasiliao, John M. Shea, Tan F. Wong:
Autonomous navigation to an RF source in multipath environments. 186-191 - Kyuman Lee, Jaesung Lim:
Self-correction scheme by adjusting the navigation signal transmission time. 192-197 - Elias Yaacoub:
On the use of massive cylindrical antenna arrays for physical layer security. 198-203 - Gui Chao Huang, Magdy F. Iskander, Mahbub Hoque:
Advanced antenna array designs for directional networks. 204-207 - Kendrick Q. Henderson, Saeed I. Latif, Georgios Y. Lazarou:
A microstrip line-fed multi-resonant slot antenna in the 4G/LTE band for smartphones. 208-212 - Chriss Hammerschmidt, Robert T. Johnk:
Extracting clutter metrics from mobile propagation measurements in the 1755-1780 MHz band. 213-218 - Swapnil Mhaske, Predrag Spasojevic, Ahsan Aziz, Malik Muhammad Usman Gul:
Link quality analysis in the presence of blockages for analog beamformed mm-wave channel. 219-224 - François Chan, Yiu Tong Chan, Robert J. Inkol:
Path loss exponent estimation and RSS localization using the linearizing variable constraint. 225-229 - Venkatesh Ramaswamy, Jerediah R. Fevold, Jeffrey T. Correia, Timothy E. Daughters:
Design of an anti-jamming Appliqué for LTE-based military communications. 230-235 - Gwenael Poitau:
LTE-UTac: LTE-U customization for multi-mission tactical networks. 236-241 - Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner:
Network coverage detection using order statistics: An LTE perspective. 242-247 - Lan K. Nguyen, Richard B. Wells, Khanh D. Pham:
Impact of satellite transponder nonlinearities on the performance of protected tactical waveform (PTW) for the return link (RL). 248-253 - Lun Li, Xin Tian, Genshe Chen, Khanh D. Pham, Erik Blasch:
Secure spectrum-efficient frequency hopping for return link of protected tactical satellite communications. 254-258 - Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger:
Agility maneuvers to mitigate inference attacks on sensed location data. 259-264 - Omar Nakhila, Cliff C. Zou:
Parallel active dictionary attack on IEEE 802.11 enterprise networks. 265-270 - Jon R. Ward, Mohamed F. Younis:
A cross-layer traffic analysis countermeasure against adaptive attackers of Wireless Sensor Networks. 271-276 - Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra:
Stealthy attacks with insider information: A game theoretic model with asymmetric feedback. 277-282 - Emrah Korkmaz, Andrey M. Dolgikh, Matthew Davis, Victor A. Skormin:
ICS security testbed with delay attack case study. 283-288 - Xinyuan Wang:
On the feasibility of real-time cyber attack attribution on the Internet. 289-294 - Akshay Kumar, Ahmed Abdel-Hadi, Charles Clancy:
A delay-optimal packet scheduler for M2M uplink. 295-300 - Clement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Controlling the age of information: Buffer size, deadline, and packet replacement. 301-306 - Xiang Mi, Limin Xiao, Ming Zhao, Xibin Xu, Shidong Zhou, Jing Wang:
Statistical QoS-driven power control and source adaptation for D2D communications. 307-312 - Akshay Kumar, Ahmed Abdelhadi, Charles Clancy:
A delay efficient multiclass packet scheduler for heterogeneous M2M uplink. 313-318 - Andrew Thornburg, Robert W. Heath Jr., Robert C. Daniels:
Capacity and scaling laws of dense mmWave and interference alignment ad hoc networks. 319-324 - Mahmudur Khan, Suman Bhunia, Murat Yuksel, Shamik Sengupta:
LOS discovery in 3D for highly directional transceivers. 325-330 - Rahul Amin, Tom Goff, Bow-Nan Cheng:
An evaluation of layer 2 and layer 3 routing on high capacity aerial directional links. 331-336 - Suman Bhunia, Mahmudur Khan, Shamik Sengupta, Murat Yuksel:
LOS discovery for highly directional full duplex RF/FSO transceivers. 337-342 - Joy Na Wang, Thomas H. Shake, Patricia Deutsch, Andrea Coyle, Bow-Nan Cheng:
Topology management algorithms for large-scale aerial high capacity directional networks. 343-348 - Jun Xiang Yeo, Yee Hui Lee, Jin Teong Ong:
Use of weather radar rain cell motion forecasting for site diversity system. 349-353 - Pengyuan Du, Sobhan Nazari, Jorge Mena, Ruolin Fan, Mario Gerla, Riten Gupta:
Multipath TCP in SDN-enabled LEO satellite networks. 354-359 - Sobhan Nazari, Pengyuan Du, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim, Antonio Capone:
Software Defined naval network for satellite communications (SDN-SAT). 360-366 - Jonathon Cheah:
MUOS satellite communication beyond latitude 65° North. 367-372 - Yash Vasavada, Ying Liu, Javier Sanchez, Prashant Kapoor, Yezdi Antia, Jack Rozmaryn, John Border:
An Uplink Power Control driven compensation of wideband, semi-static, rain or interference induced link impairments affecting satellite feeder links operating at Ka band and above. 373-378 - Bosung Kim, Gyumin Lee, Geunkyung Choi, Byeong-Hee Roh:
Effective bandwidth based capacity request for real-time voice in GEO satellite system. 379-384 - Sungjun Ahn, Wonju Lee, Kwang-Eog Lee, Joonhyuk Kang:
Deterministic pilot jamming symbol design for enhanced physical layer secrecy. 385-389 - Karim A. Banawan, Sennur Ulukus, Peng Wang, Brian Henz:
Secure rates in multiband broadcast channels with combating jammers. 390-395 - Corey D. Cooke, Frederick K. Reed, Luke J. Prince, Jason M. Vann, Adam L. Anderson:
An efficient sparse FFT algorithm with application to signal source separation and 2D virtual image feature extraction. 396-400 - Darcy A. Bibb, Zhengqing Yun, Magdy F. Iskander:
Machine learning for source localization in urban environments. 401-405 - Marc Lichtman, T. Charles Clancy, Jeffrey H. Reed:
Reactive jammer piggybacking: Achieving antifragile electronic warfare. 406-411 - Zijian Mo, Weifeng Su, John D. Matyjas:
Amplify and forward relaying protocol design with optimum power and time allocation. 412-417 - Siddhartha S. Borkotoky, Michael B. Pursley:
A method for network-coded broadcast in an ad hoc network. 418-423 - Magdy F. Iskander, Zhengqing Yun, Farhan A. Qazi, Galen H. Sasaki, Asutosh Das:
Physical layer based approach for advanced directional networking. 424-429 - Ahmad A. I. Ibrahim, Jing Guo, David J. Love, Navid Yazdani, Keith W. Forsythe:
Receiver design and bit allocation for a multi-user distributed relay network performing vector quantization. 430-435 - Bilal Al-Doori, Xian Liu:
Enabling NAICS to mitigate inter-cell interference in evolving wireless networks. 436-441 - Benjamin Peiffer, Raghu Mudumbai, Sairam Goguri, Anton Kruger, Soura Dasgupta:
Experimental demonstration of retrodirective beamforming from a fully wireless distributed array. 442-447 - Yavuz Yaman, Predrag Spasojevic:
Reducing the LOS ray beamforming setup time for IEEE 802.11ad and IEEE 802.15.3c. 448-453 - Min Wang, Hui Gao, Xin Su, Tiejun Lv:
Joint channel allocation, mode selection and power control in D2D-enabled femtocells. 454-459 - Kareem Bonna, Predrag Spasojevic, Emmanuel Kanterakis:
Subspace-based SIMO blind channel identification: Asymptotic performance comparison. 460-465 - Salvatore Talarico, Matthew C. Valenti, Thomas R. Halford:
Controlled barrage regions: Stochastic modeling, analysis, and optimization. 466-472 - Wenhao Xiong, Zijian Mo, Genshe Chen, Khanh D. Pham, Erik Blasch, Hyuck M. Kwon:
Agile MU-MIMO in congested environments with robust channel estimation. 473-478 - Brian Thompson, James R. Morris-King, Hasan Çam:
Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware. 479-484 - Brian Thompson, James R. Morris-King, Richard E. Harang:
Slowing the spread of Bluetooth-based malware in mobile tactical networks. 485-490 - Scott E. Brown, Harold Brown, Michael Russell, Brian Henz, Michael Edwards, Frank Turner, Giorgio Bertoli:
Validation of network simulation model and scalability tests using example malware. 491-496 - Kayla M. Straub, Avik Sengupta, Joseph M. Ernst, Robert W. McGwier, Merrick Watchorn, Richard Tilley, Randolph Marchany:
Malware propagation in fully connected networks: A netflow-based analysis. 497-502 - James R. Morris-King, Hasan Çam:
Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning. 503-508 - Ragib Hasan, Shams Zawoad, Md Munirul Haque:
StuxMob: A situational-aware malware for targeted attack on smart mobile devices. 509-514 - Heng Song, Xiangyang Li:
Collaborative detection of Covert Storage Channels. 515-520 - Kyuho Oh, Kyuman Lee, Jaesung Lim:
Point Transformation Scheme to protect location data changing in real time. 521-526 - Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage. 527-532 - Mikko Kiviharju, Arseny Kurnikov:
Tactical CAC profile for NATO OLP? Performance estimations for NATO OLP cryptographic evolution stage. 533-538 - Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel:
Enabling reproducible cyber research - four labeled datasets. 539-544 - Ulrika Uppman, Jan Nilsson, Ulf Sterner:
Jamming effects on multicast traffic in ad hoc networks for different terrains. 545-550 - Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv:
Robust beamforming and power allocation for secrecy in multi-pair decode-and-forward relay networks. 551-556 - Paul T. Watrobski, Douglas H. Summerville:
De-encapsulation of network packets for network protocol reverse engineering. 557-562 - Mazda Salmanian, J. David Brown, Ming Li, Tricia J. Willink:
On the robustness of the OLSR protocol under unwanted interference. 563-568 - Zhenxiang Gao, Weihua Zhou, Yongming Wang:
Exploiting social relationship for secure routing in mobile social networks. 569-575 - Lisa M. Scott, Kelvin Marcus, Rommie L. Hardy, Kevin S. Chan:
Exploring dependencies of networks of multi-genre network experiments. 576-581 - Joseph P. Macker:
Hamlet: A metaphor for modeling and analyzing network conversational adjacency graphs. 582-587 - Siddharth Pal, Yuxiao Dong, Bishal Thapa, Nitesh V. Chawla, Ananthram Swami, Ram Ramanathan:
Deep learning for network analysis: Problems, approaches and challenges. 588-593 - Wei Gao:
Exploiting deployment information for social-aware contact prediction at the tactical edge. 594-599 - Joseph P. Macker:
An improved local bridging centrality model for distributed network analytics. 600-605 - Prithwish Basu:
K-anycasting strategies in networks: To grow or to prune? 606-611 - Vijitha Weerackody:
Spectrum sharing of VMES terminals with fixed service stations. 612-617 - Stephan P. Winter, Christian A. Hofmann, Andreas Knopp:
Antenna diversity techniques for enhanced jamming resistance in multi-beam satellites. 618-623 - Tat Fung, Jeff Hoppe, Syed Akbar, Tom Rittenbach, Jenelle Vickberg:
Distributed SATCOM On-The-Move (SOTM) Terminal Open Standard Architecture. 624-629 - Jeff Hoppe, Tat Fung, Syed Akbar, Tom Rittenbach:
Distributed SATCOM On-The-Move Terminal Open Standard Architecture architectural details. 630-635 - Sebastián A. Zanlongo, Alexander C. Wilson, Leonardo Bobadilla, Tamim Sookoor:
Scheduling and path planning for computational ferrying. 636-641 - Md. Mahbubur Rahman, Leonardo Bobadilla, Brian Rapp:
Establishing line-of-sight communication via autonomous relay vehicles. 642-647 - Guosheng Yang, Jun Wang, Guangrong Yue, Shaoqian Li:
Myriad MSK signal detection for VLF/LF communication. 648-653 - Juan Zeng, Ying Wang, Xinke Zhang, Keke Hu, Yongming Wang:
Reduced-complexity IBDFE for faster-than-Nyquist communication systems. 654-659 - Stephen G. Wilson, Ho Him Jonathan Lo:
Optimum digital pulse shaping filters. 660-665 - Bruce F. McGuffin:
Median of Maxima Estimate (MOME) receivers for robust adaptive signal detection. 666-671 - Steven W. Ellingson, R. Michael Buehrer:
Frequency channel delay modulation for interference-robust low data rate communication. 672-677 - Alan J. Michaels, David B. Chester:
Adaptive correlation techniques for spread spectrum communication systems. 678-681 - Xin Wang, Xiaolin Zhang, Yuan Yang:
Doppler frequency offset estimation and compensation in OFDM aeronautical communication systems in the presence of narrow-band interference. 682-687 - Mostafa Ibrahim, Hüseyin Arslan:
Zero Tail Filter Bank Spread OFDM. 688-693 - Gunjan Verma, Fikadu T. Dagefu, Brian M. Sadler, Predrag Spasojevic:
Implications of time/frequency synchronization tradeoff of quasi-synchronous multi-carrier DS-CDMA for robust communications at lower VHF. 694-699 - Donald C. Buzanowski, Frederick J. Block, Thomas C. Royster IV:
Digital construction and characterization of noise-like spread spectrum signals. 700-704 - Alexandros Palaios, Masih Nilforoushan, Petri Mähönen:
Understanding European forest radio propagation dynamics with in and out of forest transmitters. 705-710 - Stephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny:
Experimental results of FB-MC-SS on a wideband HF NVIS propagation channel. 711-716 - Jeffrey Boksiner, Yuriy Posherstnik, Michael Murphy, Chrysanthos Chrysanthou, Thierry Marsault, Jean-Philippe Millet:
Validation of an analytical Urban Propagation Model. 717-722 - Alexandros Palaios, Kushwah Nagendra Singh, Petri Mähönen:
Propagation models for users crossing forest areas in central European forest environments. 723-728 - Na Wu, Qilian Liang, Prasad Gogineni:
Greenland bed elevation resolution improvement via compressive sensing and co-prime up-sampling. 729-734 - Kevin Benton, L. Jean Camp, Martin Swany:
Bongo: A BGP speaker built for defending against bad routes. 735-739 - Christopher Mansour, Danai Chasaki:
Trust and reliability for next-generation routers. 740-745 - Franki Yeung, Peter Cho, Christopher Morrell, Randy C. Marchany, Joseph G. Tront:
Modeling network based moving target defense impacts through simulation in Ns-3. 746-751 - Sidney C. Smith, Robert J. Hammell:
An experimental exploration of the impact of sensor-level packet loss on network intrusion detection. 752-757 - Noam Ben-Asher, Steve E. Hutchinson, Alessandro Oltramari:
Characterizing network behavior features using a cyber-security ontology. 758-763 - Brian P. Van Leeuwen, William M. S. Stout, Vincent E. Urias:
Empirical assessment of network-based Moving Target Defense approaches. 764-769 - Tingwen Liu, Yang Zhang, Jinqiao Shi, Jing Ya, Quangang Li, Li Guo:
Towards quantifying visual similarity of domain names for combating typosquatting abuse. 770-775 - Diane S. Henshel, Gary M. Deckard, Brad Lufkin, Norbou Buchler, Blaine Hoffman, Prashanth Rajivan, Steve Collman:
Predicting proficiency in cyber defense team exercises. 776-781 - Daegeon Kim, Jiyoung Woo, Huy Kang Kim:
"I know what you did before": General framework for correlation analysis of cyber threat incidents. 782-787 - Rui Xu, Xiaojun Chen, Yingbing Wang, Jinqiao Shi, Haitao Mi:
Memory chunking analysis of numerical password for Chinese websites. 788-793 - Xuan D. Tran, Marcin Lukowiak, Stanislaw P. Radziszowski:
Effectiveness of variable bit-length power analysis attacks on SHA-3 based MAC. 794-799 - Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos:
ACyDS: An adaptive cyber deception system. 800-805 - Li Li, S. Haavik, Bjørnar Libæk, R. Wik, Anne Marie Hegland, D. McLachlan, Phil Hugg, C. Brown, Thomas Kunz:
Automated IP connectivity in narrowband radio networks. 806-811 - George Kesidis, David J. Miller, Zhicong Qiu:
IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metric. 812-816 - Pratik K. Biswas, Amitabh Mishra, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Ram Ramanathan, Prithwish Basu:
Smallworld routing for tactical networks. 817-822 - Florian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse:
ITMAN: An inter tactical mobile ad hoc network routing protocol. 823-828 - Bongsoo Roh, Myoung-hun Han, Mijeong Hoh, Kwangsoo Kim, Byeong-Hee Roh:
Tactical MANET architecture for Unmanned Autonomous Maneuver Network. 829-834 - Mathew Elliot, Thomas Stevens:
Dynamic range extension using HARLEQUIN and HAIL. 835-841 - Dimitrios Papakostas, Pavlos Basaras, Dimitrios Katsaros, Leandros Tassiulas:
Backbone formation in military multi-layer ad hoc networks using complex network concepts. 842-848 - Anisha Mazumder, Chenyang Zhou, Arun Das, Arunabha Sen:
Budget constrained relay node placement problem for maximal "connectedness". 849-854 - Sara Örn Tengstrand, Patrik Eliardsson, Erik Axell:
Mitigation of multiple impulse noise sources through selective attenuation. 855-860 - John Narayan, T. Charles Clancy:
A Hidden Markov Model approach for automatic closed protocol hop synchronization. 861-866 - Michael Merritt, Timothy Brothers, Andrew Stark, Jeffrey Rada, Debbie Nielsen, Kyle Davis, Benjamin B. Yang, Chris Ward, Margaret Quiggle:
A reconfigurable architecture to support dynamic communications, radar, and sensing. 867-871 - Nicholas Johnson, Mohamed Chergui, Oren Sternberg, John D. Rockway, W. Linwood Jones:
Ambiguity function analysis for passive radar system performance. 872-876 - Kristen Nock, Carlos Font, Michael A. Rupar:
Adaptive transmission algorithms for a hard-switched FSO/RF link. 877-881 - Ryan C. Shoup:
Practical hardware realizable frame discrimination algorithms for deep fading channels in optical communications. 882-887 - Shaogang Wang, Vishal M. Patel, Athina P. Petropulu:
RSFT: A realistic high dimensional sparse fourier transform and its application in radar signal processing. 888-893 - Thomas Feuillen, Achraf Mallat, Luc Vandendorpe:
Stepped frequency radar for automotive application: Range-Doppler coupling and distortions analysis. 894-899 - Chris A. Rogers, Dimitrie C. Popescu:
Performance analysis of extended target detection with radar waveforms designed using compressed sensing. 900-905 - Yu Zhang, Ling Huang, Jian Song:
Phased array radar based angular domain channel estimation scheme for integrated radar-communication system. 906-911 - John Ellinger, Zhiping Zhang, Michael C. Wicks, Zhiqiang Wu:
Polar signal detection: Multi-carrier waveform design for improved radar detection performance. 912-917 - Michael J. Nowak, Zhiping Zhang, Yang Qu, Dimitri A. Dessources, Michael C. Wicks, Zhiqiang Wu:
Co-designed radar-communication using linear frequency modulation waveform. 918-923 - Gihan J. Mendis, Tharindu Randeny, Jin Wei, Arjuna Madanayake:
Deep learning based doppler radar for micro UAS detection and classification. 924-929 - Yu Zhao, Biao Chen:
Nonparametric target detection using airborne MIMO communication systems. 930-935 - Amro Lulu, Bijan G. Mobasseri:
Multitarget detection by stretch processing of chirp diversity waveforms. 936-941 - Kihyoung Kim, Kyuman Lee, Jaesung Lim:
A RELNAV enhancement for reducing cumulative position error in Link-16 without GRU. 942-947 - William Watson, Thomas McElwain:
4D CAF for localization of co-located, moving, and RF coincident emitters. 948-951 - Adly T. Fam, Ravi Kadlimatti:
Good code sets from complementary pairs via polyphase chips. 952-957 - Soumendra Nanda, Charles Tao, Victor Firoiu, Hui Zeng, Gahng-Seop Ahn, Julia Deng:
Cross-layer TCP adaptation in DISCO for tactical edge networks. 958-963 - Scott Moore, Rahul Amin, David Ripplinger, Devanshu Mehta, Bow-Nan Cheng:
Performance evaluation of a disruption tolerant network proxy for tactical edge networks. 964-969 - Roberto Fronteddu, Alessandro Morelli, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli, Rita Lenzi, Enrico Casini:
DDAM: Dynamic network condition detection and communication adaptation in Tactical Edge Networks. 970-975 - Hannes Holm, Teodor Sommestad:
SVED: Scanning, Vulnerabilities, Exploits and Detection. 976-981 - Risto Vaarandi, Markus Kont, Mauno Pihelgas:
Event log analysis with the LogCluster tool. 982-987 - Jack W. Stokes, Himanshu Chandola, Christian Seifert, Tim Burrell:
MART: Targeted attack detection on a compromised network. 988-997 - Xiao Li, Paul Avellino, Jeff Janies, M. Patrick Collins:
Software asset analyzer: A system for detecting configuration anomalies. 998-1003 - Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li:
Hunting abnormal configurations for permission-sensitive role mining. 1004-1009 - Jaime C. Acosta, Edgar Padilla, John Homer:
Augmenting attack graphs to represent data link and network layer vulnerabilities. 1010-1015 - Nathan D. Holzhauer, James R. Milligan, Nathaniel B. Soule:
A hybrid P2P and pub/sub messaging system for decentralized Information Management. 1016-1021 - Byungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu:
Validity region sensitive query processing strategies in mobile ad hoc networks. 1022-1027 - Xi Zhang, Qixuan Zhu:
Information-centric network virtualization for QoS provisioning over software defined wireless networks. 1028-1033 - Jimmi Grönkvist, Arwid Komulainen, Ulf Sterner, Ulrika Uppman:
Dynamic scheduling for cooperative broadcasting in tactical ad hoc networks. 1034-1040 - Demir Y. Yavas, Ibrahim Hökelek, Bilge Günsel:
Analytical Model of Priority Based Request Scheduling Mechanism Preventing SIP Server Overload. 1041-1046 - Kevin Phemius, Jawad Seddar, Mathieu Bouet, Hicham Khalife, Vania Conan:
Bringing SDN to the edge of tactical networks. 1047-1052 - Jon Spencer, Tricia J. Willink:
SDN in coalition tactical networks. 1053-1058 - Xuemin Wen, Yanni Han, Bing Yu, Xin Chen, Zhen Xu:
Towards reliable virtual data center embedding in software defined networking. 1059-1064 - Jacob H. Cox Jr., Sean Patrick Donovan, Russell J. Clark, Henry L. Owen:
Ryuretic: A modular framework for Ryu. 1065-1070 - Ruolin Fan, Li Wei, Pengyuan Du, Ciarán Mc Goldrick, Mario Gerla:
A SDN-controlled underwater MAC and routing testbed. 1071-1076 - Zequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas, Ha Duong:
Fuzzy sets based team decision-making for Cyber Situation Awareness. 1077-1082 - John Holliman, Michael Zhivich, Roger Khazan, Albert Swiston, Brian A. Telfer:
Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status Monitoring. 1083-1089 - Ghaith Shabsigh, Victor S. Frost:
Stochastic geometry for the analysis of wireless covert networks. 1090-1095 - Saritha Arunkumar, Mudhakar Srivatsa, Berker Soyluoglu, Murat Sensoy, Federico Cerutti:
Privacy enforcement through policy extension. 1096-1100 - Gokul Sridharan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella:
Physical-layer security of NC-OFDM-based systems. 1101-1106 - Satya Prakash Ponnaluri, Babak Azimi-Sadjadi, Yik-Kiong Hue, Tugba Erpek, Arash Komaee, Wade Trappe:
A practical wireless reciprocity-aware key establishment protocol. 1107-1113 - Paul J. Nicholas, Karla L. Hoffman:
Optimal channel assignment for military MANET using integer optimization and constraint programming. 1114-1120 - Song Jun Park, Stephen Allen, Dale R. Shires:
Urban reconnaissance planning: Discovering new applications with tactical high performance computing. 1121-1124 - Ritu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos:
CyberVAN: A Cyber Security Virtual Assured Network testbed. 1125-1130 - Aaron E. Cohen, Yvette T. Lee, David A. Heide, Thomas M. Moran:
A novel software defined radio relay method for power conservation. 1131-1136 - Amarnadha Reddy Mahasamudram, Ramu Srinivasaiah, Raveendranath KR, Sreenath Ramanath:
Agile cognizant transceiver link for mission critical applications. 1137-1142 - Vito Dantona, Berthold Lankl:
Requirements for ACI tolerance in MANETs for VHF tactical communications. 1143-1148 - Bow-Nan Cheng, Shari Mann, Tim Arganbright:
Toward Composable Hardware Agnostic Communications Blocks - Lessons Learned. 1149-1154 - Peng Wang, Brian Henz:
Efficient approach to find optimal antenna assignment for JALN HCB. 1155-1160 - Yalin E. Sagduyu, Yi Shi, Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley, Clif Banner, Greg Heinen:
Optimal orbit selection and design for airborne relay communications. 1161-1166 - Yang Liu, Kapil M. Borle, Janek J. Mroczek, Biao Chen, Michael J. Gans, Paul J. Oleski, Richard J. Michalak:
Variable rate MIMO communication with airborne platforms: An experimental study. 1167-1172 - Riadh Essaadali, Taher Hadouej, Chokri Jebali, Ammar B. Kouki:
Optimization of a direct conversion multi-standard transmitter used for rescue operations. 1173-1178 - Riadh Essaadali, Ammar B. Kouki:
A new simple Unmanned Aerial Vehicle doppler effect RF reducing technique. 1179-1183 - Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv:
Secure beamforming and power allocation for multi-pair decode-and-forward relay networks. 1184-1189 - Marwan Yusuf, Hüseyin Arslan:
Enhancing physical-layer security in wireless communications using signal space diversity. 1190-1194 - Dong Wei, Lili Liang, Meng Zhang, Rong Qiao, Wei-qing Huang:
A Polarization state Modulation based Physical Layer Security scheme for Wireless Communications. 1195-1201 - Xiguang Zhang, Yong Shang, Shiwei Yan, Dehuai Li, Junqi Guo:
Adaptive power and access control for physical security of heterogeneous cellular network. 1202-1206 - Ashwin Amanna, Anu Saji, James W. Bohl, Arun Subramanian:
Realizing physical layer authentication using constellation perturbation on a software-defined radio testbed. 1207-1212 - Michael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf, Lanier A. Watkins, William H. Robinson, Wlajimir Alexis:
Securing commercial WiFi-based UAVs from common security attacks. 1213-1218 - Deirdre K. Kilcoyne, Shiri Bendelac, Joseph M. Ernst, Alan J. Michaels:
Tire Pressure Monitoring System encryption to improve vehicular security. 1219-1224 - Gordon Werner, Steven Farris, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Implementing authenticated encryption algorithm MK-3 on FPGA. 1225-1230 - Jason Uher, Ryan G. Mennecke, Bassam S. Farroha:
Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networks. 1231-1236 - Jin-Hee Cho, Patrick M. Hurley, Shouhuai Xu:
Metrics and measurement of trustworthy systems. 1237-1242 - Omar Nakhila, Cliff C. Zou:
User-side Wi-Fi evil twin attack detection using random wireless channel monitoring. 1243-1248 - Noor Abani, Mario Gerla:
Centrality-based caching for privacy in Information-Centric Networks. 1249-1254 - Hao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu, Prasant Mohapatra:
Trust exploitation and attention competition: A game theoretical model. 1255-1260 - Jithin Jagannath, Hanne M. Saarinen, Timothy Woods, Joshua O'Brien, Sean Furman, Andrew L. Drozd, Tommaso Melodia:
COmBAT: Cross-layer Based testbed with Analysis Tool implemented using software defined radios. 1261-1266 - Enrico Casini, Giacomo Benincasa, Alessandro Morelli, Niranjan Suri, Maggie R. Breedy:
An experimental evaluation of data distribution applications in tactical networks. 1267-1272 - Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx:
Large scale over-the-air testing of Group Centric Networking. 1273-1278 - Matthew Dillon, Er-Hsien Frank Fu, Daniel Gdula, Trang Mai, Joseph Molnar, Lan H. Tran:
Real and virtual wireless radio network emulator. 1279-1285 - Timothy D. Kurp:
Design challenges of carrier phase tracking for higher modulation orders in high data rate applications. 1286-1291 - Michael Rice, Mohammad Saquib:
On frequency offset estimation errors in coherent detection over equalized ISI channels. 1292-1297 - Md. Shah Afran, Mohammad Saquib, Michael Rice:
A polynomial rooting based ML CFO estimator in multipath channel with repetitive pilot symbols. 1298-1303
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.