Self-selecting reliable paths for wireless sensor network routing TA Babbitt, C Morrell, BK Szymanski, JW Branch Computer Communications 31 (16), 3799-3809, 2008 | 52 | 2008 |
Hacking competitions and their untapped potential for security education G Conti, T Babbitt, J Nelson IEEE Security & Privacy 9 (3), 56-59, 2011 | 48 | 2011 |
Punch Cards to Python: A Case Study of a CS0 Core Course T Babbitt, C Schooler, K King Proceedings of the 50th ACM Technical Symposium on Computer Science …, 2019 | 13 | 2019 |
Self-selecting reliable path routing in diverse wireless sensor network environments T Babbitt, C Morrell, B Szymanski 2009 IEEE Symposium on Computers and Communications, 1-7, 2009 | 10 | 2009 |
Biologically inspired self selective routing with preferred path selection BK Szymanski, C Morrell, SC Geyik, T Babbitt Bio-Inspired Computing and Communication, 229-240, 2008 | 9 | 2008 |
Trust management in delay tolerant networks utilizing erasure coding TA Babbitt, BK Szymanski 2015 IEEE International Conference on Communications (ICC), 6331-6337, 2015 | 8 | 2015 |
Trust based secure routing in delay tolerant networks TA Babbitt, BK Szymanski 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2016 | 7 | 2016 |
Visualization in sensor network simulator, sense and its use in protocol verification C Morrell, T Babbitt, BK Szymanski Rensselaer Computer Science, 2008 | 7 | 2008 |
Designing a Raspberry Pi sensor network for remote observation of wildlife BH Curtin, RH David, ED Dunham, CD Johnson, N Shyamkumar, ... Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019 | 6 | 2019 |
Trust metric integration in resource constrained networks via data fusion TA Babbitt, BK Szymanski 2015 18th International Conference on Information Fusion (Fusion), 582-589, 2015 | 6 | 2015 |
A Raspberry Pi Mesh Sensor Network for Portable Perimeter Security C Johnson, B Curtin, N Shyamkumar, R David, E Dunham, PC Haney, ... 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile …, 2019 | 3 | 2019 |
Trust management in resource constraint networks TA Babbitt, BK Szymanski Proceedings of the 10th Annual Symposium on Information Assurance, 2-3, 2015 | 3 | 2015 |
Signals of Opportunity: Spoof Detection with Low-Cost Hardware and Edge Devices P Toth, T Babbitt, T Graziano 2023 IEEE 14th Annual Ubiquitous Computing, Electronics & Mobile …, 2023 | 1 | 2023 |
Hacking the Non-Technical Brain: Maximizing Retention in a Core Introductory IT Course EM Sturzinger, DS Hawthorne, TA Babbitt Proceedings of the 20th Annual SIG Conference on Information Technology …, 2019 | 1 | 2019 |
Airborne geo-location for search and rescue applications M Love, M Greene, H Burgess, M Luehrmann, S Mead, T Babbitt Proceedings of the 3rd International Conference on Computing for Geospatial …, 2012 | 1 | 2012 |
A raspberry Pi sensor network for wildlife conservation A Arnold, P Corapi, M Nasta, K Wolgast, TA Babbitt Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1-3, 2020 | | 2020 |
Information Assurance in Resource Constraint Networks TA Babbitt Rensselaer Polytechnic Institute, 2016 | | 2016 |
Self-selecting reliable path routing for all environments using SENSE with visualization TA Babbitt Rensselaer Theses and Dissertations Online Collection, 2009 | | 2009 |
The Importance of Using Hacker Contests and Mindset in Teaching Networks and Information Assurance TA Babbitt | | |