Search Results - "Baldwin, Rusty O"
-
1
Intrinsic Physical-Layer Authentication of Integrated Circuits
Published in IEEE transactions on information forensics and security (01-02-2012)“…Radio-frequency distinct native attribute (RF-DNA) fingerprinting is adapted as a physical-layer technique to improve the security of integrated circuit…”
Get full text
Journal Article -
2
Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios
Published in IEEE transactions on information forensics and security (01-12-2013)“…Side-channel analysis has been used to successfully attack many cryptographic systems. However, to improve trace quality and make collection of side-channel…”
Get full text
Journal Article -
3
On the performance evaluation of query-based wireless sensor networks
Published in Performance evaluation (01-02-2013)“…We present a queueing-theoretic framework to evaluate the performance of large-scale, query-based wireless sensor networks whose nodes detect and advertise…”
Get full text
Journal Article -
4
Characterizing, Measuring, and Validating the Temporal Consistency of Live—Virtual—Constructive Environments
Published in Simulation (San Diego, Calif.) (01-10-2009)“…A distinguishing characteristic of interactive live—virtual—constructive (LVC) environments is the relaxation of data consistency to improve the performance…”
Get full text
Journal Article -
5
Physical layer identification of embedded devices using RF-DNA fingerprinting
Published in 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE (01-10-2010)“…RF distinct native attribute (RF-DNA) fingerprinting is introduced as a means to uniquely identify embedded processors and other integrated circuit devices by…”
Get full text
Conference Proceeding -
6
Energy cost and error performance of range-aware, anchor-free localization algorithms
Published in Ad hoc networks (01-06-2008)“…Many applications that use sensor data from a wireless sensor network (WSN) require corresponding node position information as well. Therefore, it is not…”
Get full text
Journal Article -
7
A security policy language for wireless sensor networks
Published in The Journal of systems and software (2009)“…Authenticated computer system users are only authorized to access certain data within the system. In the future, wireless sensor networks (WSNs) will need to…”
Get full text
Journal Article -
8
Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting
Published in IEEE transactions on reliability (01-03-2015)“…The popularity of ZigBee devices continues to grow in home automation, transportation, traffic management, and Industrial Control System (ICS) applications…”
Get full text
Journal Article -
9
An investigation on the effects of emerging 4G transmissions on 3G networks
Published in Omega (Oxford) (01-12-2007)“…Within the last 10 years, technological advances have allowed personal wireless communications to become part of our global, information-centric culture…”
Get full text
Journal Article -
10
A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks
Published in Telecommunication systems (01-06-2007)“…We present a small-footprint search protocol designed to facilitate any-type queries for data content and services in large population, high-density wireless…”
Get full text
Journal Article -
11
A secure group communication architecture for autonomous unmanned aerial vehicles
Published in Security and communication networks (01-01-2009)“…This paper investigates the application of a secure group communication architecture to a swarm of autonomous unmanned aerial vehicles (UAVs). A multicast…”
Get full text
Journal Article -
12
Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards
Published in Simulation (San Diego, Calif.) (01-08-2006)“…The authors use inexpensive personal computer graphics cards to perform the intensive image-processing computations done in a heat-seeking missile’s tracking…”
Get full text
Journal Article -
13
A model for managing decision-making information in the GIG-enabled battlespace
Published in Air & space power journal (01-07-2007)“…The Defense Department is transforming information-technology systems into a Global Information Grid (GIG) that will connect sensors to weapons systems and…”
Get full text
Journal Article -
14
Queueing network analysis: concepts, terminology, and methods
Published in The Journal of systems and software (15-05-2003)“…Queueing network analysis can be a valuable tool to analyze network models. However, the vast number and diverse nature of the tools available to analyze a…”
Get full text
Journal Article -
15
Refinements to the packet error rate upper bound for Bluetooth networks
Published in IEEE communications letters (01-08-2003)“…The Bluetooth frequency hop sequence is uniformly distributed asymptotically but generally distributed otherwise. We present an upper bound on the Bluetooth…”
Get full text
Journal Article -
16
Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process
Published in International journal of critical infrastructure protection (01-06-2015)“…Industrial control systems are used to operate critical infrastructure assets in the civilian and military sectors. Current industrial control system…”
Get full text
Journal Article -
17
Performance analysis of multicast algorithms for mobile satellite communication networks
Published in Computer communications (01-07-2002)“…With the rise of mobile computing and an increasing need for ubiquitous high-speed data connections, Internet-in-the-sky solutions are becoming increasingly…”
Get full text
Journal Article -
18
Improving cross-device attacks using zero-mean unit-variance normalization
Published in Journal of cryptographic engineering (01-06-2013)“…Template attacks are a very powerful form of side-channel analysis. It is assumed an adversary has access to a training device, identical to the device under…”
Get full text
Journal Article -
19
Real-time queueing theory : A tutorial presentation with an admission control application
Published in Queueing systems (2000)“…Real-time scheduling, or scheduling with respect to a deadline, is critical in many application areas such as telecommunications, control systems, and…”
Get full text
Journal Article -
20
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network
Published 25-11-2024“…Proceedings of the 6th IEEE International Symposium on Network Computing and Applications NCA, Cambridge, MA, IEEE, 12-14 July 2007 A skip graph is a resilient…”
Get full text
Journal Article