Denial-of-service in wireless sensor networks: Attacks and defenses DR Raymond, SF Midkiff IEEE Pervasive Computing 7 (1), 74-81, 2008 | 676 | 2008 |
Effects of denial-of-sleep attacks on wireless sensor network MAC protocols DR Raymond, RC Marchany, MI Brownfield, SF Midkiff IEEE transactions on vehicular technology 58 (1), 367-380, 2008 | 340 | 2008 |
Performance evaluation of radio environment map-enabled cognitive spectrum-sharing networks Y Zhao, D Raymond, C da Silva, JH Reed, SF Midkiff MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 84 | 2007 |
Key terrain in cyberspace: Seeking the high ground D Raymond, T Cross, G Conti, M Nowatkowski 2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014 | 52 | 2014 |
Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks DR Raymond, SF Midkiff MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 49 | 2007 |
Towards a cyber common operating picture G Conti, J Nelson, D Raymond 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013 | 41 | 2013 |
Teaching introductory programming, problem solving and information technology with robots at West Point J Schumacher, D Welch, D Raymond 31st Annual Frontiers in Education Conference. Impact on Engineering and …, 2001 | 38 | 2001 |
On Cyber: Towards an operational art for cyber conflict G Conti, D Raymond Kopidion Press, 2017 | 37 | 2017 |
Scalable, cluster-based anti-replay protection for wireless sensor networks DR Raymond, RC Marchany, SF Midkiff 2007 IEEE SMC Information Assurance and Security Workshop, 127-134, 2007 | 35 | 2007 |
A control measure framework to limit collateral damage and propagation of cyber weapons D Raymond, G Conti, T Cross, R Fanelli 2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-16, 2013 | 27 | 2013 |
When good Ninjas turn bad: Preventing your students from becoming the threat T Cook, G Conti, D Raymond Proceedings of the 16th Colloquium for Information System Security Education …, 2012 | 25 | 2012 |
Leadership of cyber warriors: Enduring principles and new directions G Conti, D Raymond Small Wars Foundation, 2011 | 16 | 2011 |
Automatic IoT Device Classification using Traffic Behavioral Characteristics A Hsu, J Tront, D Raymond, G Wang, A Butt 2019 SoutheastCon, 1-7, 2019 | 12 | 2019 |
Denial-of-sleep vulnerabilities and defenses in wireless sensor network mac protocols DR Raymond Virginia Tech, 2008 | 12 | 2008 |
Integrating information technology and programming in a freshmen computer science course DR Raymond, DJ Welch 30th Annual Frontiers in Education Conference. Building on A Century of …, 2000 | 11 | 2000 |
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks P Kobezak, R Marchany, D Raymond, J Tront Proceedings of the 51st Hawaii International Conference on System Sciences, 2018 | 10 | 2018 |
Impact of Mobility Models on Simulated Ad Hoc Network Performance D Raymond, I Burbey, Y Zhao, S Midkiff, CP Koelling Proc. 9th International Symposium on Wireless Personal Multimedia …, 2006 | 9 | 2006 |
Annotated memory references: A mechanism for informed cache management AR Lebeck, DR Raymond, CL Yang, MS Thottethodi Euro-Par’99 Parallel Processing: 5th International Euro-Par Conference …, 1999 | 9 | 1999 |
The current state of cryptocurrency forensics S Dudani, I Baggili, D Raymond, R Marchany Forensic Science International: Digital Investigation 46, 301576, 2023 | 6 | 2023 |
Pen Testing a City G Conti, T Cross, D Raymond Black Hat USA, 2015 | 6 | 2015 |