


default search action
38th MILCOM 2019: Norfolk, VA, USA
- 2019 IEEE Military Communications Conference, MILCOM 2019, Norfolk, VA, USA, November 12-14, 2019. IEEE 2019, ISBN 978-1-7281-4280-7

- Erald Troja, Joshua Gitter:

Privacy-preserving Crowd-sensing for Dynamic Spectrum Access. 1-6 - Abel O. Gomez Rivera, Deepak K. Tosh

, Laurent Njilla:
Scalable Blockchain Implementation for Edge-based Internet of Things Platform. 1-6 - Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain

, Husnu S. Narman
:
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network. 1-6 - Gregory L. Frazier, Jacob A. McGill, Ruffy Zarookian, Seth Robertson, Benjamin Floyd, Patrick M. McNeely:

The NNBC Anti-DDoS Firewall. 1-7 - Manas Pradhan, Sushma Devaramani:

Enabling Interoperability for ROS-based Robotic Devices for Smart City HADR Operations. 1-6 - Qi Zhao, Xin Tian, Genshe Chen, Russell Harkanson, Yoohwan Kim, Khanh Pham:

Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication Systems. 1-6 - Tianyi Peng

, Wenhan Dai, Moe Z. Win:
Efficient and Robust Physical Layer Key Generation. 1-6 - J. Aaron Pendergrass, Nathan Hull, John Clemens, Sarah C. Helble, Mark Thober, Kathleen McGill, Machon Gregory, Peter A. Loscocco:

Runtime Detection of Userspace Implants. 1-6 - Ahmet Okutan, Fu-Yuan Cheng, Shao-Hsuan Su, Shanchieh Jay Yang:

Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features. 1-6 - Jack W. Stokes, Christian Seifert, Jerry Li, Nizar Hejazi:

Detection of Prevalent Malware Families with Deep Learning. 1-8 - Veikko Siukonen, Mari Ristolainen, Juha-Pekka Nikkarila, Juha Kukkola:

Are We There Yet?: Monitoring the Technical Deployment of the National Segments of the Internet. 1-5 - Patrik Eliardsson, Erik Axell, Arwid Komulainen, Kia Wiklundh, Sara Örn Tengstrand:

A Practical Method for BEP Estimation of Convolutional Coding in Impulse Noise Environments. 1-6 - Allen Starke, Zixiang Nie

, Morgan Hodges, Corey Baker
, Janise McNair
:
Denial of Service Detection & Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN). 1-6 - Janusz Kusyk, M. Ümit Uyar, Kelvin Ma, Joseph Plishka, Giorgio Bertoli, Jeffrey Boksiner:

AI and Game Theory based Autonomous UAV Swarm for Cybersecurity. 1-6 - Sarah Brown, Tamsin Moye, Rob Hubertse, Cezar Glavan:

Towards Mature Federated Cyber Incident Management and Information Sharing Capabilities in NATO and NATO Nations. 1-5 - Yongming Ben, Yanni Han, Ning Cai, Wei An

, Zhen Xu:
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel. 1-6 - Gabriel C. Fernandez, Shouhuai Xu:

A Case Study on using Deep Learning for Network Intrusion Detection. 1-6 - Eric van den Berg, Seth Robertson:

Game-Theoretic Planning to Counter DDoS in NEMESIS. 1-6 - Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:

Synthetic Intrusion Alert Generation through Generative Adversarial Networks. 1-6 - Manisha Parmar, Alberto Domingo:

On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary. 1-6 - Michael J. De Lucia, Chase Cotton:

Detection of Encrypted Malicious Network Traffic using Machine Learning. 1-6 - Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:

Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. 1-6 - Yu Wang, Jack W. Stokes, Mady Marinescu:

Neural Malware Control with Deep Reinforcement Learning. 1-8 - Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew J. Hausknecht:

ScriptNet: Neural Static Analysis for Malicious JavaScript Detection. 1-8 - Anil Kumar Yerrapragada, Patrick Ormond, Brian Kelley:

On the Application of Key-Based Physical Layer Security in 5G Heterogeneous Networks. 1-6 - Imtiaz Nasim, Seungmo Kim

:
Human EMF Exposure in Wearable Networks for Internet of Battlefield Things. 1-6 - Chandra Mouli Madhav Kotteti, Xishuang Dong, Lijun Qian:

Rumor Detection on Time-Series of Tweets via Deep Learning. 1-7 - Hyojin Lee, Wanjik Kim, Joonhyuk Kang:

Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems. 1-6 - Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo

, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. 1-6 - Henger Li, Zizhan Zheng:

Optimal Timing of Moving Target Defense: A Stackelberg Game Model. 1-6 - Liangdong Deng

, Yuzhou Feng, Dong Chen, Naphtali Rishe
:
IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic Data. 1-6 - Scott Arbiv, Rahul Amin, Tom Goff, Dow Street, Igor Pedan, Larry Bressler, Terrence Gibbons, Bow-Nan Cheng, Chayil Timmerman:

Data Collection and Analysis Framework for Mobile Ad Hoc Network Research. 1-6 - Hasan Cam:

Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations. 1-6 - Jason Dahlstrom, Jim Brock, Mekedem Tenaw, Matthew Shaver, Stephen Taylor:

Hardening Containers for Cross-Domain Applications. 1-6 - Sridhar Venkatesan, E. Allison Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, Cho-Yu Jason Chiang, Alexander Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, Ritu Chadha:

VulnerVAN: A Vulnerable Network Generation Tool. 1-6 - Cody Tinker, Kevin Millar, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:

Exploring the Application of Homomorphic Encryption to a Cross Domain Solution. 1-6 - Joseph Vanderpoorten, Gary Thompson, David Brunnenmeyer, Rajeev Gopal, David Meadows, Mark Dale, Kevin Zhang:

Flexible Modem Interface Demonstration for Military Terminals. 1-8 - Mainduddin Ahmad Jonas, Md. Shohrab Hossain

, Risul Islam, Husnu S. Narman
, Mohammed Atiquzzaman
:
An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. 1-6 - Aaron Walker

, Shamik Sengupta:
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning. 1-6 - Paul Théron, Alexander Kott:

When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense. 1-7 - Bryan Groves, Cong Pu

:
A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things. 1-6 - Baki Berkay Yilmaz, Elvan Mert Ugurlu, Milos Prvulovic, Alenka G. Zajic:

Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations. 1-6 - Brent E. Logan, Geoffrey G. Xie:

Automating Distributed Firewalls: A Case for Software Defined Tactical Networks. 1-6 - Kamrul Hasan, Sachin Shetty

, Amin Hassanzadeh, Sharif Ullah
:
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk. 1-8 - David Reyes, Jaime C. Acosta, Adriana Escobar De La Torre, Salamah Salamah:

A System for Analyzing Diversified Software Binaries. 1-6 - Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu

, Hongmei Deng, Tugba Erpek:
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification. 1-6 - Yang Liu, Biao Chen, Janek J. Mroczek, John E. Malowicki, Richard J. Michalak:

Robust MIMO Communications Against Antenna Blockage and Interference. 7-12 - Lino Gonzalez, Jerry Rippon:

On A Method to Evaluate Satellite Link Performance to Optimize Power. 9-12 - Lino Gonzalez, Jerry Rippon, John Besse:

Phase Noise, SATCOM and MIL-STD-188-165B. 13-16 - Chad Josephson, Erik Perrins, Michael Rice:

Space-Time Coded ARTM CPM for Aeronautical Telemetry. 13-18 - Matthias G. Schraml, Andreas Knopp, Kai-Uwe Storek:

Multi-User MIMO Satellite Communications with Secrecy Constraints. 17-22 - Alan J. Michaels, Michael Fletcher

:
Frequency-Selective High-Order Phase Shift Keying. 19-23 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:

Outage Probability and Performance of Moderate-Length Codes under Partial-Band Noise Jamming (PBNJ). 23-27 - Mohamad Alkadamani, Colin Brown, Pierre Bouchard, Jeff Pugh:

Multi-Cluster Frequency Correlation Modelling for Tactical VHF Channels in Mountainous Terrain. 24-29 - Yuriy Posherstnik, Edward Rocky Rocksvald, Bill Lussier, Mike Makowski:

Framework for Interoperable Command & Control of Joint Electromagnetic Spectrum Operations. 28-33 - Alessandro Morelli

, Michel Provosty, Roberto Fronteddu, Niranjan Suri:
Performance Evaluation of Transport Protocols in Tactical Network Environments. 30-36 - Mike Johnson, Terry D. May, Sean R. Thornton, Steve W. Boyd, Brent Merle:

Improving the Performance of Tactical Waveform Software using Free and Open-Source Tools. 34-39 - Davide Callegaro, Sabur Baidya

, Gowri Sankar Ramachandran
, Bhaskar Krishnamachari, Marco Levorato:
Information Autonomy: Self-Adaptive Information Management for Edge-Assisted Autonomous UAV Systems. 40-45 - Lorenzo Campioni, Mauro Tortonesi

, Bastiaan Wissingh, Niranjan Suri, Mariann Hauge, Lars Landmark:
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments. 43-48 - Colleen T. Rock

, Nathaniel Soule, Benjamin Toll, Emily H. Do, James R. Milligan, Matthew S. Paulini:
Efficiently Composing Validated Systems Integration Gateways for Dynamic, Diverse Data. 46-53 - Srijita Mukherjee, Kamesh Namuduri

:
Joint Flocking and Deconfliction in Unmanned Aerial Vehicle Swarms. 49-55 - Sofia Bergström, Tore Lindgren:

Effects from Mutual Coupling on Communication Link Reliability. 54-58 - Ryan C. Shoup, Steven Michael, James Glettler, Pablo I. Hopman:

Adding an on Off Keying (OOK) Communications Signal to a Free Space Optical Beacon Pointing Focal Plane Array System. 59-64 - Elliot Weiss, Linh-Thao Chung, Lan Nguyen:

A MBSE Approach to Satellite Clock Time and Frequency Adjustment in Highly Elliptical Orbit. 65-69 - Richard L. Gobbi, Jonathon Hay, Nathan Tanner, Larry Lipke, Scot Miller, John A. Kirk:

Wideband Automated Planning Tool (WAPT) Prototype Development. 70-75 - Eric Cross:

An Open Standard for Ka-band Interoperable Satellite Antennas. 76-81 - Armando J. Vigil, Dahesh A. Khalil:

SATCOM Digital IF Stream Rate Considerations for Earth Segment Transport. 82-88 - Lan K. Nguyen, Joseph W. Tringe, Clayton Bosler, David Brunnenmeyer:

An Algorithmic Approach to Highly Resilient SATCOM. 89-94 - Matthew Sherman, Nicholas Sherman, Matthew Rasa, Joseph Stepien:

Tiered Unassisted Neighbor Discovery in Directional Networks. 95-101 - Howard McDonald, Joy Cantalupo, Mike DiFrancisco, Anthony Rennier, Darcy Swain-Walsh, Jeffrey T. Correia, Venkatesh Ramaswamy, Cameron Patterson:

AWS-3 Interference Mitigation: Improving Spectrum Sharing with LTE & 5G Uplink Spectrum Control. 102-107 - Alexander Poylisher, Yitzchak M. Gottlieb, Latha A. Kant:

Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach. 108-112 - Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo

, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. 109-114 - Marcelo Camilo, David F. C. Moura, Ronaldo M. Salles

:
Combined Interference and Communications Strategy as a Defense Mechanism in Cognitive Radio Military Networks. 113-118 - F. Dell Kronewitter, Sumner Lee, Kenneth Oliphant:

A Cognitive ML Agent for Airborne Networking. 115-120 - Roberto Fronteddu, Daniel Duran, Adrien Moucheboeuf, Rita Lenzi, Alessandro Morelli

, Niranjan Suri:
Managing Video Streaming in Tactical Networks. 119-124 - Md Moin Uddin Chowdhury, Fatih Erden

, Ismail Güvenç:
RSS-Based Q-Learning for Indoor UAV Navigation. 121-126 - Darcy Swain-Walsh, Jeffrey T. Correia, Venkatesh Ramaswamy, Cameron Patterson, Howard McDonald, Josephine Cantalupo, Anthony Rennier, Mike DiFrancisco:

High-Fidelity LTE Waveform Modeling for Commercial-DoD Spectrum Sharing: Characteristics and Methods. 125-130 - Damilola Adesina, Olutobi Adagunodo, Xishuang Dong, Lijun Qian:

Aircraft Location Prediction using Deep Learning. 127-132 - Roberto Rigolin Ferreira Lopes

, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore
, Peter Sevenich:
Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF Network. 131-136 - Bryse Flowers, R. Michael Buehrer, William C. Headley

:
Communications Aware Adversarial Residual Networks for over the Air Evasion Attacks. 133-140 - Anthony Rennier, Howard McDonald, Joy Cantalupo, Kalle Kontson, Mike DiFrancisco, Jerry Hampton, Steve Jones, Jeffrey T. Correia:

Spectrum Sharing Test and Demonstration Program: Key Findings and Implications. 137-142 - Madhuprana Goswami, Vidhi Rana, Hyuck M. Kwon, Khanh Pham, James Lyke:

Satellite Digital Channelizer with Predistorted High-Power Amplifier. 141-144 - Alexei V. Nikitin, Ruslan L. Davidchack:

Complementary Intermittently Nonlinear Filtering for Mitigation of Hidden Outlier Interference. 145-152 - Nozhan Hosseini

, David W. Matolak:
Chirp Spread Spectrum Signaling for Future Air-Ground Communications. 153-158 - Parker D. White, R. Michael Buehrer, William C. Headley

:
FHSS Signal Separation using Constrained Clustering. 159-164 - Tianyu Li

, Mary L. Comer
, Edward J. Delp
, Sundip R. Desai, James L. Mathieson, Richard H. Foster, Moses W. Chan:
A Stacked Predictor and Dynamic Thresholding Algorithm for Anomaly Detection in Spacecraft. 165-170 - Enass Hriba, Matthew C. Valenti:

The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated Blocking. 171-176 - William H. Clark, Vanessa Arndorfer, Brook Tamir, Daniel Kim, Cristian Vives, Hunter Morris, Lauren J. Wong, William C. Headley

:
Developing RFML Intuition: An Automatic Modulation Classification Architecture Case Study. 292-298 - Lauren J. Wong, Parker D. White, Michael Fowler, William C. Headley

:
Distributed Automatic Modulation Classification with Compressed Data. 299-304 - Peng Wang, Manuel Vindiola:

Data Augmentation for Blind Signal Classification. 305-310 - Damilola Adesina, Joshua Bassey, Lijun Qian:

Practical Radio Frequency Learning for Future Wireless Communication Systems. 311-317 - Inna Valieva, Mats Björkman, Johan Åkerberg, Mikael Ekström, Iurii Voitenko:

Multiple Machine Learning Algorithms Comparison for Modulation Type Classification for Efficient Cognitive Radio. 318-323 - Piyush Sharma, Adrienne Raglin:

IoT: Smart City Parking Solutions with Metric-Chisini-Jensen-Shannon Divergence based Kernels. 324-330 - Yusuf Said Eroglu, Fatih Erden

, Ismail Güvenç:
Adaptive Kalman Tracking for Indoor Visible Light Positioning. 331-336 - Florian Meyer, Moe Z. Win:

Data Association for Tracking Extended Targets. 337-342 - Dmitry Kramarev, Ishtiaq Ahmad

, Kelvin J. Layton, Marc Lavenant, Hidayat Soetiyono, Gottfried Lechner, Hajime Suzuki, Ian Grivell, Stephen Leak:
Event-Triggered Synchronization for Mobile Distributed Transmit Beamforming. 343-348 - Xiangdong Liu, Dilip Gokhale:

An Acquisition Technique for LTE over Satellite. 349-354 - Brandon F. Lo, Scott Torborg, Chun Kin Au-Yeung:

HopSAC: Frequency Hopping Parameter Estimation Based on Random Sample Consensus for Counter-Unmanned Aircraft Systems. 355-360 - Ning Cai, Yanni Han, Yongming Ben, Wei An

, Zhen Xu:
An Effective Load Balanced Controller Placement Approach in Software-Defined WANs. 361-366 - Xin Wang, Qiao Xiang, Jeremy Tucker, Vinod K. Mishra, Yang Richard Yang:

Dandelion: A Novel, High-Level Programming System for Software Defined Coalitions with Local State Sharing. 367-372 - Qi Zhao, Adam J. Brown, Jae H. Kim, Mario Gerla:

An Integrated Software-Defined Battlefield Network Testbed for Tactical Scenario Emulation. 373-378 - Joshua Marker, John M. Shea

, Tan F. Wong, Eric Graves, Paul L. Yu:
Identifying Bottleneck Nodes using Packet Delay Statistics. 447-452 - Michael Fletcher

, Joseph D. Gaeddert, Alan J. Michaels:
Physical Layer Firewall Design using Co-Channel Underlay-Based Watermark Authentication. 453-457 - Y. Qiu, C. Brown, Li Li:

Deep Learning for an Anti-Jamming CPM Receiver. 458-463 - Yujung Roh, Seungjae Jung, Joonhyuk Kang:

Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and Trajectory. 464-469 - Bo Guan, Dennis L. Goeckel:

Achievable Information-Theoretic Secrecy in the Presence of a Radar. 476-481 - Feng Ouyang, Oscar F. Somerlock, Arnab Das, David E. Bengtson:

Assessing Anti-Jamming Performance of Directional Wireless Links. 482-489 - Cong Pu

:
Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks. 490-495 - Laura Poplawski Ma, Stephen Zabele, Christophe J. Merlin, Gregory Lauer, Stephen Dabideen:

QFloor: Queue Delay Reduction in Dynamic Backpressure Networks. 496-501 - Stephen Dabideen, Stephen Zabele, Christophe J. Merlin, Laura Poplawski Ma, Gregory Lauer:

G3M: A heuristic for low-latency multicast back-pressure forwarding. 502-507 - Wenjun Huang

, Xu Li, Hancheng Ma, Yanan Liang:
Modeling Resource Limited Cooperative Broadcasting using Hard Core Poisson Process. 508-513 - Arwid Komulainen, Jimmi Grönkvist, Ulf Sterner, Ulrika Uppman:

Improving Tactical Voice Communications using Cooperative Broadcast over a Narrowband Channel. 514-520 - Ayush Dusia

, Ram Ramanathan, Warren Ramanathan, Christophe Servaes, Adarshpal S. Sethi:
VINE: Zero-Control-Packet Routing for Ultra-Low-Capacity Mobile Ad Hoc Networks. 521-526 - Kevin Merchant, Bryan Nousain:

Securing IoT RF Fingerprinting Systems with Generative Adversarial Networks. 584-589 - Kevin Merchant, Bryan Nousain:

Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural Networks. 590-597 - Kunal Sankhe, Kaushik R. Chowdhury

, Francesco Restuccia, Salvatore D'Oro
, Tong Jian, Zifeng Wang, Amani Al-Shawabka
, Jennifer G. Dy, Tommaso Melodia
, Stratis Ioannidis
:
Impairment Shift Keying: Covert Signaling by Deep Learning of Controlled Radio Imperfections. 598-603 - Zejian Zhou

, Lijun Qian, Hao Xu:
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory. 604-609 - Nof Abuzainab, Volkan Isler, Aylin Yener, Tugba Erpek, Kemal Davaslioglu

, Yalin E. Sagduyu, Yi Shi
, Sharon J. Mackey, Mitesh P. Patel, Frank Panettieri, Muhammad A. Qureshi:
QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning. 610-615 - Zhong Guan, Gaopeng Gou, Yangyang Guan, Bingxu Wang:

An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel. 616-621 - Chérifa Boucetta, Aicha Dridi, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal:

Optimizing Drone Deployment for Cellular Communication Coverage During Crowded Events. 622-627 - Dan Shen, Khanh Pham, Genshe Chen:

SSB and DSB Enabled Hybrid Waveforms for the Space-Ground Link System. 628-633 - Wade Leonard, Alex Saunders, Michael Calabro, Katherine Olsen:

A Multi-waveform Radio Receiver, an Example of Machine Learning Enabled Radio Architecture and Design. 634-639 - Anil Kumar Yerrapragada, Brian Kelley:

Very High Throughput Internet of Things Networks with $K$ access points and $K$ devices. 640-645 - Hongzhi Guo, Bincy Ben:

Reinforcement Learning-Enabled Reliable Wireless Sensor Networks in Dynamic Underground Environments. 646-651 - Shaoran Li, Y. Thomas Hou

, Wenjing Lou, Brian Jalaian, Stephen Russell, Benjamin MacCall:
Optimal Power Control with Channel Uncertainty in Ad Hoc Networks. 652-657 - Asanka Kekirigoda, Kin-Ping Hui, Qingqing Cheng

, Zhipeng Lin
, J. Andrew Zhang
, Diep N. Nguyen
, Xiaojing Huang
:
Massive MIMO for Tactical Ad-hoc Networks in RF Contested Environments. 658-663 - Joseph P. Macker, Jeffery W. Weston

, David J. Claypool:
Autonomic Clustering in Temporal Network Graphs. 664-669 - Stephen Russell, Tarek F. Abdelzaher, Niranjan Suri:

Multi-Domain Effects and the Internet of Battlefield Things. 724-730 - Anthony J. McAuley, Yitzchak M. Gottlieb, Latha A. Kant, John Lee, Alexander Poylisher:

P4-Based Hybrid Error Control Booster Providing New Design Tradeoffs in Wireless Networks. 731-736 - Seungmo Kim

, Tsigigenet Dessalgn:
Mitigation of Civilian-to-Military Interference in DSRC for Urban Operations. 737-742 - Hoyong Choi

, Jihwan Bang, Namjo Ahn, Jinhwan Jung, Jungwook Choi, Soobum Park, Yung Yi:
CH-MAC: A Cluster-based, Hybrid TDMA MAC Protocol over Wireless Ad-hoc Networks. 743-748 - Chris Simpkin, Ian J. Taylor, Alun D. Preece, Graham A. Bent, Richard Tomsett, Raghu K. Ganti, Olwen Worthington:

Coalition C3 Information Exchange Using Binary Symbolic Vectors. 784-789 - Konrad S. Wrona

, Mauro Tortonesi
, Michal Marks, Niranjan Suri:
Leveraging and Fusing Civil and Military Sensors to support Disaster Relief Operations in Smart Environments. 790-797 - Lorenzo Campioni, Rita Lenzi, Filippo Poltronieri

, Manas Pradhan, Mauro Tortonesi
, Cesare Stefanelli, Niranjan Suri:
MARGOT: Dynamic IoT Resource Discovery for HADR Environments. 809-814 - Adrian E. Conway, Michael Wang, Emir Ljuca, P. David Lebling:

A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT. 815-820 - Joseph Noor, Ahmed Ali-Eldin, Luis Garcia, Chirag Rao, Venkat R. Dasari, Deepak Ganesan, Brian Jalaian, Prashant J. Shenoy

, Mani B. Srivastava
:
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability. 821-826 - Ioannis Agadakos

, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Jemin George, Nandi Leslie, James Michaelis:
Application of Trust Assessment Techniques to IoBT Systems. 833-840 - Erick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh

, Jaime C. Acosta, Laurent Njilla:
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security. 841-846 - Jongdeog Lee, Suk Min Hwang, Tarek F. Abdelzaher, Kelvin Marcus, Kevin Chan:

Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks. 847-852 - Jason A. Tran, Gowri Sankar Ramachandran

, Claudiu B. Danilov, Bhaskar Krishnamachari:
An Evaluation of Consensus Latency in Partitioning Networks. 853-858

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














