Search Results - "Baldwin, Rusty O"

Refine Results
  1. 1

    Intrinsic Physical-Layer Authentication of Integrated Circuits by Cobb, William E., Laspe, Eric D., Baldwin, Rusty O., Temple, Michael A., Kim, Yong C.

    “…Radio-frequency distinct native attribute (RF-DNA) fingerprinting is adapted as a physical-layer technique to improve the security of integrated circuit…”
    Get full text
    Journal Article
  2. 2

    Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios by Montminy, David P., Baldwin, Rusty O., Temple, Michael A., Oxley, Mark E.

    “…Side-channel analysis has been used to successfully attack many cryptographic systems. However, to improve trace quality and make collection of side-channel…”
    Get full text
    Journal Article
  3. 3

    On the performance evaluation of query-based wireless sensor networks by Degirmenci, Guvenc, Kharoufeh, Jeffrey P., Baldwin, Rusty O.

    Published in Performance evaluation (01-02-2013)
    “…We present a queueing-theoretic framework to evaluate the performance of large-scale, query-based wireless sensor networks whose nodes detect and advertise…”
    Get full text
    Journal Article
  4. 4

    Characterizing, Measuring, and Validating the Temporal Consistency of Live—Virtual—Constructive Environments by Hodson, Douglas D., Baldwin, Rusty O.

    Published in Simulation (San Diego, Calif.) (01-10-2009)
    “…A distinguishing characteristic of interactive live—virtual—constructive (LVC) environments is the relaxation of data consistency to improve the performance…”
    Get full text
    Journal Article
  5. 5

    Physical layer identification of embedded devices using RF-DNA fingerprinting by Cobb, W E, Garcia, E W, Temple, M A, Baldwin, R O, Kim, Y C

    “…RF distinct native attribute (RF-DNA) fingerprinting is introduced as a means to uniquely identify embedded processors and other integrated circuit devices by…”
    Get full text
    Conference Proceeding
  6. 6

    Energy cost and error performance of range-aware, anchor-free localization algorithms by Jordt, Gustav J., Baldwin, Rusty O., Raquet, John F., Mullins, Barry E.

    Published in Ad hoc networks (01-06-2008)
    “…Many applications that use sensor data from a wireless sensor network (WSN) require corresponding node position information as well. Therefore, it is not…”
    Get full text
    Journal Article
  7. 7

    A security policy language for wireless sensor networks by Marsh, David W., Baldwin, Rusty O., Mullins, Barry E., Mills, Robert F., Grimaila, Michael R.

    “…Authenticated computer system users are only authorized to access certain data within the system. In the future, wireless sensor networks (WSNs) will need to…”
    Get full text
    Journal Article
  8. 8

    Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting by Patel, Hiren J., Temple, Michael A., Baldwin, Rusty O.

    Published in IEEE transactions on reliability (01-03-2015)
    “…The popularity of ZigBee devices continues to grow in home automation, transportation, traffic management, and Industrial Control System (ICS) applications…”
    Get full text
    Journal Article
  9. 9

    An investigation on the effects of emerging 4G transmissions on 3G networks by Lopez Jr, Juan, Raines, Richard A., Temple, Michael A., Baldwin, Rusty O., Stephens Sr, James P.

    Published in Omega (Oxford) (01-12-2007)
    “…Within the last 10 years, technological advances have allowed personal wireless communications to become part of our global, information-centric culture…”
    Get full text
    Journal Article
  10. 10

    A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks by Mann, Christopher R., Baldwin, Rusty O., Kharoufeh, Jeffrey P., Mullins, Barry E.

    Published in Telecommunication systems (01-06-2007)
    “…We present a small-footprint search protocol designed to facilitate any-type queries for data content and services in large population, high-density wireless…”
    Get full text
    Journal Article
  11. 11

    A secure group communication architecture for autonomous unmanned aerial vehicles by Phillips, Adrian N., Mullins, Barry E., Raines, Richard A., Baldwin, Rusty O.

    Published in Security and communication networks (01-01-2009)
    “…This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast…”
    Get full text
    Journal Article
  12. 12

    Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards by Jeffers, Sean A., Baldwin, Rusty O., Mullins, Barry E.

    Published in Simulation (San Diego, Calif.) (01-08-2006)
    “…The authors use inexpensive personal computer graphics cards to perform the intensive image-processing computations done in a heat-seeking missile’s tracking…”
    Get full text
    Journal Article
  13. 13

    A model for managing decision-making information in the GIG-enabled battlespace by Bass, Samuel D, Baldwin, Rusty O

    Published in Air & space power journal (01-07-2007)
    “…The Defense Department is transforming information-technology systems into a Global Information Grid (GIG) that will connect sensors to weapons systems and…”
    Get full text
    Journal Article
  14. 14

    Queueing network analysis: concepts, terminology, and methods by Baldwin, Rusty O., Davis IV, Nathaniel J., Midkiff, Scott F., Kobza, John E.

    Published in The Journal of systems and software (15-05-2003)
    “…Queueing network analysis can be a valuable tool to analyze network models. However, the vast number and diverse nature of the tools available to analyze a…”
    Get full text
    Journal Article
  15. 15

    Refinements to the packet error rate upper bound for Bluetooth networks by Peterson, B.S., Baldwin, R.O., Kharoufeh, J.P., Raines, R.A.

    Published in IEEE communications letters (01-08-2003)
    “…The Bluetooth frequency hop sequence is uniformly distributed asymptotically but generally distributed otherwise. We present an upper bound on the Bluetooth…”
    Get full text
    Journal Article
  16. 16

    Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process by Stone, Samuel J., Temple, Michael A., Baldwin, Rusty O.

    “…Industrial control systems are used to operate critical infrastructure assets in the civilian and military sectors. Current industrial control system…”
    Get full text
    Journal Article
  17. 17

    Performance analysis of multicast algorithms for mobile satellite communication networks by Thomas, Ryan W, Raines, Richard A, Baldwin, Rusty O, Temple, Michael A

    Published in Computer communications (01-07-2002)
    “…With the rise of mobile computing and an increasing need for ubiquitous high-speed data connections, Internet-in-the-sky solutions are becoming increasingly…”
    Get full text
    Journal Article
  18. 18

    Improving cross-device attacks using zero-mean unit-variance normalization by Montminy, David P., Baldwin, Rusty O., Temple, Michael A., Laspe, Eric D.

    Published in Journal of cryptographic engineering (01-06-2013)
    “…Template attacks are a very powerful form of side-channel analysis. It is assumed an adversary has access to a training device, identical to the device under…”
    Get full text
    Journal Article
  19. 19

    Real-time queueing theory : A tutorial presentation with an admission control application by BALDWIN, Rusty O, DAVIS, Nathaniel J, KOBZA, John E, MIDKIFF, Scott F

    Published in Queueing systems (2000)
    “…Real-time scheduling, or scheduling with respect to a deadline, is critical in many application areas such as telecommunications, control systems, and…”
    Get full text
    Journal Article
  20. 20

    Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network by Brault, Gregory J, Augeri, Christopher James, Mullins, Barry E, Baldwin, Rusty O, Mayer, Christopher B

    Published 25-11-2024
    “…Proceedings of the 6th IEEE International Symposium on Network Computing and Applications NCA, Cambridge, MA, IEEE, 12-14 July 2007 A skip graph is a resilient…”
    Get full text
    Journal Article