关注
Rusty Baldwin
Rusty Baldwin
在 udayton.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Intrinsic physical-layer authentication of integrated circuits
WE Cobb, ED Laspe, RO Baldwin, MA Temple, YC Kim
IEEE Transactions on Information Forensics and Security 7 (1), 14-24, 2011
1502011
Bluetooth inquiry time characterization and selection
BS Peterson, RO Baldwin, JP Kharoufeh
IEEE Transactions on mobile computing 5 (9), 1173-1187, 2006
1362006
Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting
HJ Patel, MA Temple, RO Baldwin
IEEE transactions on reliability 64 (1), 221-233, 2014
1272014
The use of attack and protection trees to analyze security for an online banking system
K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1132007
An analysis of XML compression efficiency
CJ Augeri, DA Bulutoglu, BE Mullins, RO Baldwin, LC Baird III
Proceedings of the 2007 workshop on Experimental computer science, 7-es, 2007
942007
Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles
MT Hyland, BE Mullins, RO Baldwin, MA Temple
21st International Conference on Advanced Information Networking and …, 2007
932007
Physical layer identification of embedded devices using RF-DNA fingerprinting
WE Cobb, EW Garcia, MA Temple, RO Baldwin, YC Kim
2010-Milcom 2010 Military Communications Conference, 2168-2173, 2010
922010
A real-time medium access control protocol for ad hoc wireless local area networks
RO Baldwin, NJ Davis IV, SF Midkiff
ACM SIGMOBILE Mobile Computing and Communications Review 3 (2), 20-27, 1999
911999
A survey of state-of-the-art in anonymity metrics
DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins
Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008
652008
Using relocatable bitstreams for fault tolerance
DP Montminy, RO Baldwin, PD Williams, BE Mullins
Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 701-708, 2007
642007
A novel communications protocol using geographic routing for swarming uavs performing a search mission
RL Lidowski, BE Mullins, RO Baldwin
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
622009
Improving cross-device attacks using zero-mean unit-variance normalization
DP Montminy, RO Baldwin, MA Temple, ED Laspe
Journal of cryptographic engineering 3, 99-110, 2013
572013
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins
IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011
572011
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations
CM Canadeo, MA Temple, RO Baldwin, RA Raines
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 1, 678-682, 2003
542003
Network intrusion detection: automated and manual methods prone to attack and evasion
DJ Chaboya, RA Raines, RO Baldwin, BE Mullins
IEEE security & privacy 4 (6), 36-43, 2006
522006
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol
RO Baldwin, NJ Davis IV, SF Midkiff, RA Raines
ACM SIGMOBILE Mobile Computing and Communications Review 5 (3), 11-25, 2001
482001
Improving the global information grid's performance through satellite communications layer enhancements
VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila
IEEE Communications Magazine 44 (11), 66-72, 2006
452006
Queueing network analysis: concepts, terminology, and methods
RO Baldwin, NJ Davis Iv, SF Midkiff, JE Kobza
Journal of systems and software 66 (2), 99-117, 2003
452003
Intrinsic physical layer authentication of integrated circuits
WE Cobb, MA Temple, RO Baldwin, EW Garcia, ED Laspe
US Patent 9,036,891, 2015
332015
Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process
SJ Stone, MA Temple, RO Baldwin
International Journal of Critical Infrastructure Protection 9, 41-51, 2015
312015
系统目前无法执行此操作,请稍后再试。
文章 1–20