Effects of denial-of-sleep attacks on wireless sensor network MAC protocols DR Raymond, RC Marchany, MI Brownfield, SF Midkiff IEEE transactions on vehicular technology 58 (1), 367-380, 2008 | 340 | 2008 |
Mt6d: A moving target ipv6 defense M Dunlop, S Groat, W Urbanski, R Marchany, J Tront 2011-MILCOM 2011 Military Communications Conference, 1321-1326, 2011 | 219 | 2011 |
E-commerce security issues RC Marchany, JG Tront Proceedings of the 35th Annual Hawaii International Conference on System …, 2002 | 124 | 2002 |
Mobile device profiling and intrusion detection using smart batteries TK Buennemeyer, TM Nelson, LM Clagett, JP Dunning, RC Marchany, ... Proceedings of the 41st Annual Hawaii International Conference on System …, 2008 | 117 | 2008 |
Battery exhaustion attack detection with small handheld mobile computers TK Buennemeyer, M Gora, RC Marchany, JG Tront 2007 IEEE International Conference on Portable Information Devices, 1-5, 2007 | 59 | 2007 |
Implementing moving target ipv6 defense to secure 6lowpan in the internet of things and smart grid M Sherburne, R Marchany, J Tront Proceedings of the 9th Annual Cyber and Information Security Research …, 2014 | 53 | 2014 |
Battery-based intrusion detection a first line of defense GA Jacoby, R Marchany, NJ Davis Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop …, 2004 | 50 | 2004 |
Using an IPv6 moving target defense to protect the Smart Grid S Groat, M Dunlop, W Urbanksi, R Marchany, J Tront 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-7, 2012 | 49 | 2012 |
Designing a micro-moving target ipv6 defense for the internet of things K Zeitz, M Cantrell, R Marchany, J Tront Proceedings of the Second International Conference on Internet-of-Things …, 2017 | 45 | 2017 |
Changing the game: A micro moving target IPv6 defense for the internet of things K Zeitz, M Cantrell, R Marchany, J Tront IEEE Wireless Communications Letters 7 (4), 578-581, 2018 | 38 | 2018 |
The blind man's bluff approach to security using IPv6 M Dunlop, S Groat, W Urbanski, R Marchany, J Tront IEEE Security & Privacy 10 (4), 35-43, 2012 | 38 | 2012 |
Scalable, cluster-based anti-replay protection for wireless sensor networks DR Raymond, RC Marchany, SF Midkiff 2007 IEEE SMC Information Assurance and Security Workshop, 127-134, 2007 | 35 | 2007 |
Advancing the defense in depth model S Groat, J Tront, R Marchany 2012 7th International Conference on System of Systems Engineering (SoSE …, 2012 | 27 | 2012 |
The privacy implications of stateless IPv6 addressing S Groat, M Dunlop, R Marchany, J Tront Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 27 | 2010 |
Implementing dynamic address changes in contikios T Preiss, M Sherburne, R Marchany, J Tront International Conference on Information Society (i-Society 2014), 222-227, 2014 | 25 | 2014 |
Scaling IPv6 address bindings in support of a moving target defense C Morrell, JS Ransbottom, R Marchany, JG Tront The 9th International Conference for Internet Technology and Secured …, 2014 | 23 | 2014 |
Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection TK Buennemeyer, F Munshi, RC Marchany, JG Tront 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 20 | 2007 |
How mobile host batteries can improve network security GA Jacoby, R Marchany, NJ Davis IV IEEE security & privacy 4 (05), 40-49, 2006 | 19 | 2006 |
Battery-sensing intrusion protection system Buennemeyer, Jacoby, Chiang, Marchany, Tront 2006 IEEE Information Assurance Workshop, 176-183, 2006 | 19 | 2006 |
What DHCPv6 says about you S Groat, M Dunlop, R Marchany, J Tront 2011 World Congress on Internet Security (WorldCIS-2011), 146-151, 2011 | 17 | 2011 |