default search action
38th MILCOM 2019: Norfolk, VA, USA
- 2019 IEEE Military Communications Conference, MILCOM 2019, Norfolk, VA, USA, November 12-14, 2019. IEEE 2019, ISBN 978-1-7281-4280-7
- Erald Troja, Joshua Gitter:
Privacy-preserving Crowd-sensing for Dynamic Spectrum Access. 1-6 - Abel O. Gomez Rivera, Deepak K. Tosh, Laurent Njilla:
Scalable Blockchain Implementation for Edge-based Internet of Things Platform. 1-6 - Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman:
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network. 1-6 - Gregory L. Frazier, Jacob A. McGill, Ruffy Zarookian, Seth Robertson, Benjamin Floyd, Patrick M. McNeely:
The NNBC Anti-DDoS Firewall. 1-7 - Manas Pradhan, Sushma Devaramani:
Enabling Interoperability for ROS-based Robotic Devices for Smart City HADR Operations. 1-6 - Qi Zhao, Xin Tian, Genshe Chen, Russell Harkanson, Yoohwan Kim, Khanh D. Pham:
Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication Systems. 1-6 - Tianyi Peng, Wenhan Dai, Moe Z. Win:
Efficient and Robust Physical Layer Key Generation. 1-6 - J. Aaron Pendergrass, Nathan Hull, John Clemens, Sarah C. Helble, Mark Thober, Kathleen McGill, Machon Gregory, Peter A. Loscocco:
Runtime Detection of Userspace Implants. 1-6 - Ahmet Okutan, Fu-Yuan Cheng, Shao-Hsuan Su, Shanchieh Jay Yang:
Dynamic Generation of Empirical Cyberattack Models with Engineered Alert Features. 1-6 - Jack W. Stokes, Christian Seifert, Jerry Li, Nizar Hejazi:
Detection of Prevalent Malware Families with Deep Learning. 1-8 - Veikko Siukonen, Mari Ristolainen, Juha-Pekka Nikkarila, Juha Kukkola:
Are We There Yet?: Monitoring the Technical Deployment of the National Segments of the Internet. 1-5 - Patrik Eliardsson, Erik Axell, Arwid Komulainen, Kia Wiklundh, Sara Örn Tengstrand:
A Practical Method for BEP Estimation of Convolutional Coding in Impulse Noise Environments. 1-6 - Allen Starke, Zixiang Nie, Morgan Hodges, Corey Baker, Janise McNair:
Denial of Service Detection & Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN). 1-6 - Janusz Kusyk, M. Ümit Uyar, Kelvin Ma, Joseph Plishka, Giorgio Bertoli, Jeffrey Boksiner:
AI and Game Theory based Autonomous UAV Swarm for Cybersecurity. 1-6 - Sarah Brown, Tamsin Moye, Rob Hubertse, Cezar Glavan:
Towards Mature Federated Cyber Incident Management and Information Sharing Capabilities in NATO and NATO Nations. 1-5 - Yongming Ben, Yanni Han, Ning Cai, Wei An, Zhen Xu:
An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman Kernel. 1-6 - Gabriel C. Fernandez, Shouhuai Xu:
A Case Study on using Deep Learning for Network Intrusion Detection. 1-6 - Eric van den Berg, Seth Robertson:
Game-Theoretic Planning to Counter DDoS in NEMESIS. 1-6 - Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang:
Synthetic Intrusion Alert Generation through Generative Adversarial Networks. 1-6 - Manisha Parmar, Alberto Domingo:
On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary. 1-6 - Michael J. De Lucia, Chase Cotton:
Detection of Encrypted Malicious Network Traffic using Machine Learning. 1-6 - Eric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu:
Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study. 1-6 - Yu Wang, Jack W. Stokes, Mady Marinescu:
Neural Malware Control with Deep Reinforcement Learning. 1-8 - Jack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew J. Hausknecht:
ScriptNet: Neural Static Analysis for Malicious JavaScript Detection. 1-8 - Anil Kumar Yerrapragada, Patrick Ormond, Brian Kelley:
On the Application of Key-Based Physical Layer Security in 5G Heterogeneous Networks. 1-6 - Imtiaz Nasim, Seungmo Kim:
Human EMF Exposure in Wearable Networks for Internet of Battlefield Things. 1-6 - Chandra Mouli Madhav Kotteti, Xishuang Dong, Lijun Qian:
Rumor Detection on Time-Series of Tweets via Deep Learning. 1-7 - Hyojin Lee, Wanjik Kim, Joonhyuk Kang:
Secure Transmission via Lens Antenna Array in Millimeter Wave MISO Systems. 1-6 - Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation. 1-6 - Henger Li, Zizhan Zheng:
Optimal Timing of Moving Target Defense: A Stackelberg Game Model. 1-6 - Liangdong Deng, Yuzhou Feng, Dong Chen, Naphtali Rishe:
IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic Data. 1-6 - Scott Arbiv, Rahul Amin, Tom Goff, Dow Street, Igor Pedan, Larry Bressler, Terrence Gibbons, Bow-Nan Cheng, Chayil Timmerman:
Data Collection and Analysis Framework for Mobile Ad Hoc Network Research. 1-6 - Hasan Cam:
Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity Observations. 1-6 - Jason Dahlstrom, Jim Brock, Mekedem Tenaw, Matthew Shaver, Stephen Taylor:
Hardening Containers for Cross-Domain Applications. 1-6 - Sridhar Venkatesan, E. Allison Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, Cho-Yu Jason Chiang, Alexander Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, Ritu Chadha:
VulnerVAN: A Vulnerable Network Generation Tool. 1-6 - Cody Tinker, Kevin Millar, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Exploring the Application of Homomorphic Encryption to a Cross Domain Solution. 1-6 - Joseph Vanderpoorten, Gary Thompson, David Brunnenmeyer, Rajeev Gopal, David Meadows, Mark Dale, Kevin Zhang:
Flexible Modem Interface Demonstration for Military Terminals. 1-8 - Mainduddin Ahmad Jonas, Md. Shohrab Hossain, Risul Islam, Husnu S. Narman, Mohammed Atiquzzaman:
An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. 1-6 - Aaron Walker, Shamik Sengupta:
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning. 1-6 - Paul Théron, Alexander Kott:
When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber Defense. 1-7 - Bryan Groves, Cong Pu:
A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of Things. 1-6 - Baki Berkay Yilmaz, Elvan Mert Ugurlu, Milos Prvulovic, Alenka G. Zajic:
Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic Emanations. 1-6 - Brent E. Logan, Geoffrey G. Xie:
Automating Distributed Firewalls: A Case for Software Defined Tactical Networks. 1-6 - Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Sharif Ullah:
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk. 1-8 - David Reyes, Jaime C. Acosta, Adriana Escobar De La Torre, Salamah Salamah:
A System for Analyzing Diversified Software Binaries. 1-6 - Sohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek:
Real-Time and Embedded Deep Learning on FPGA for RF Signal Classification. 1-6 - Yang Liu, Biao Chen, Janek J. Mroczek, John E. Malowicki, Richard J. Michalak:
Robust MIMO Communications Against Antenna Blockage and Interference. 7-12 - Lino Gonzalez, Jerry Rippon:
On A Method to Evaluate Satellite Link Performance to Optimize Power. 9-12 - Lino Gonzalez, Jerry Rippon, John Besse:
Phase Noise, SATCOM and MIL-STD-188-165B. 13-16 - Chad Josephson, Erik Perrins, Michael Rice:
Space-Time Coded ARTM CPM for Aeronautical Telemetry. 13-18 - Matthias G. Schraml, Andreas Knopp, Kai-Uwe Storek:
Multi-User MIMO Satellite Communications with Secrecy Constraints. 17-22 - Alan J. Michaels, Michael Fletcher:
Frequency-Selective High-Order Phase Shift Keying. 19-23 - Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran:
Outage Probability and Performance of Moderate-Length Codes under Partial-Band Noise Jamming (PBNJ). 23-27 - Mohamad Alkadamani, Colin Brown, Pierre Bouchard, Jeff Pugh:
Multi-Cluster Frequency Correlation Modelling for Tactical VHF Channels in Mountainous Terrain. 24-29 - Yuriy Posherstnik, Edward Rocky Rocksvald, Bill Lussier, Mike Makowski:
Framework for Interoperable Command & Control of Joint Electromagnetic Spectrum Operations. 28-33 - Alessandro Morelli, Michel Provosty, Roberto Fronteddu, Niranjan Suri:
Performance Evaluation of Transport Protocols in Tactical Network Environments. 30-36 - Mike Johnson, Terry D. May, Sean R. Thornton, Steve W. Boyd, Brent Merle:
Improving the Performance of Tactical Waveform Software using Free and Open-Source Tools. 34-39 - Davide Callegaro, Sabur Baidya, Gowri Sankar Ramachandran, Bhaskar Krishnamachari, Marco Levorato:
Information Autonomy: Self-Adaptive Information Management for Edge-Assisted Autonomous UAV Systems. 40-45 - Lorenzo Campioni, Mauro Tortonesi, Bastiaan Wissingh, Niranjan Suri, Mariann Hauge, Lars Landmark:
Experimental Evaluation of Named Data Networking (NDN) in Tactical Environments. 43-48 - Colleen T. Rock, Nathaniel Soule, Benjamin Toll, Emily H. Do, James R. Milligan, Matthew S. Paulini:
Efficiently Composing Validated Systems Integration Gateways for Dynamic, Diverse Data. 46-53 - Srijita Mukherjee, Kamesh Namuduri:
Joint Flocking and Deconfliction in Unmanned Aerial Vehicle Swarms. 49-55 - Sofia Bergström, Tore Lindgren:
Effects from Mutual Coupling on Communication Link Reliability. 54-58 - Ryan C. Shoup, Steven Michael, James Glettler, Pablo I. Hopman:
Adding an on Off Keying (OOK) Communications Signal to a Free Space Optical Beacon Pointing Focal Plane Array System. 59-64 - Elliot Weiss, Linh-Thao Chung, Lan Nguyen:
A MBSE Approach to Satellite Clock Time and Frequency Adjustment in Highly Elliptical Orbit. 65-69 - Richard L. Gobbi, Jonathon Hay, Nathan Tanner, Larry Lipke, Scot Miller, John A. Kirk:
Wideband Automated Planning Tool (WAPT) Prototype Development. 70-75 - Eric Cross:
An Open Standard for Ka-band Interoperable Satellite Antennas. 76-81 - Armando J. Vigil, Dahesh A. Khalil:
SATCOM Digital IF Stream Rate Considerations for Earth Segment Transport. 82-88 - Lan K. Nguyen, Joseph W. Tringe, Clayton Bosler, David Brunnenmeyer:
An Algorithmic Approach to Highly Resilient SATCOM. 89-94 - Matthew Sherman, Nicholas Sherman, Matthew Rasa, Joseph Stepien:
Tiered Unassisted Neighbor Discovery in Directional Networks. 95-101 - Howard McDonald, Joy Cantalupo, Mike DiFrancisco, Anthony Rennier, Darcy Swain-Walsh, Jeffrey T. Correia, Venkatesh Ramaswamy, Cameron Patterson:
AWS-3 Interference Mitigation: Improving Spectrum Sharing with LTE & 5G Uplink Spectrum Control. 102-107 - Alexander Poylisher, Yitzchak M. Gottlieb, Latha A. Kant:
Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural Approach. 108-112 - Jianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu, Min Yu, Weiqing Huang, Prasant Mohapatra:
Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection. 109-114 - Marcelo Camilo, David F. C. Moura, Ronaldo M. Salles:
Combined Interference and Communications Strategy as a Defense Mechanism in Cognitive Radio Military Networks. 113-118 - F. Dell Kronewitter, Sumner Lee, Kenneth Oliphant:
A Cognitive ML Agent for Airborne Networking. 115-120 - Roberto Fronteddu, Daniel Duran, Adrien Moucheboeuf, Rita Lenzi, Alessandro Morelli, Niranjan Suri:
Managing Video Streaming in Tactical Networks. 119-124 - Md Moin Uddin Chowdhury, Fatih Erden, Ismail Güvenç:
RSS-Based Q-Learning for Indoor UAV Navigation. 121-126 - Darcy Swain-Walsh, Jeffrey T. Correia, Venkatesh Ramaswamy, Cameron Patterson, Howard McDonald, Josephine Cantalupo, Anthony Rennier, Mike DiFrancisco:
High-Fidelity LTE Waveform Modeling for Commercial-DoD Spectrum Sharing: Characteristics and Methods. 125-130 - Damilola Adesina, Olutobi Adagunodo, Xishuang Dong, Lijun Qian:
Aircraft Location Prediction using Deep Learning. 127-132 - Roberto Rigolin Ferreira Lopes, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore, Peter Sevenich:
Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF Network. 131-136 - Bryse Flowers, R. Michael Buehrer, William C. Headley:
Communications Aware Adversarial Residual Networks for over the Air Evasion Attacks. 133-140 - Anthony Rennier, Howard McDonald, Joy Cantalupo, Kalle Kontson, Mike DiFrancisco, Jerry Hampton, Steve Jones, Jeffrey T. Correia:
Spectrum Sharing Test and Demonstration Program: Key Findings and Implications. 137-142 - Madhuprana Goswami, Vidhi Rana, Hyuck M. Kwon, Khanh Pham, James Lyke:
Satellite Digital Channelizer with Predistorted High-Power Amplifier. 141-144 - Alexei V. Nikitin, Ruslan L. Davidchack:
Complementary Intermittently Nonlinear Filtering for Mitigation of Hidden Outlier Interference. 145-152 - Nozhan Hosseini, David W. Matolak:
Chirp Spread Spectrum Signaling for Future Air-Ground Communications. 153-158 - Parker D. White, R. Michael Buehrer, William C. Headley:
FHSS Signal Separation using Constrained Clustering. 159-164 - Tianyu Li, Mary L. Comer, Edward J. Delp, Sundip R. Desai, James L. Mathieson, Richard H. Foster, Moses W. Chan:
A Stacked Predictor and Dynamic Thresholding Algorithm for Anomaly Detection in Spacecraft. 165-170 - Enass Hriba, Matthew C. Valenti:
The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated Blocking. 171-176 - William H. Clark, Vanessa Arndorfer, Brook Tamir, Daniel Kim, Cristian Vives, Hunter Morris, Lauren J. Wong, William C. Headley:
Developing RFML Intuition: An Automatic Modulation Classification Architecture Case Study. 292-298 - Lauren J. Wong, Parker D. White, Michael Fowler, William C. Headley:
Distributed Automatic Modulation Classification with Compressed Data. 299-304 - Peng Wang, Manuel Vindiola:
Data Augmentation for Blind Signal Classification. 305-310 - Damilola Adesina, Joshua Bassey, Lijun Qian:
Practical Radio Frequency Learning for Future Wireless Communication Systems. 311-317 - Inna Valieva, Mats Björkman, Johan Åkerberg, Mikael Ekström, Iurii Voitenko:
Multiple Machine Learning Algorithms Comparison for Modulation Type Classification for Efficient Cognitive Radio. 318-323 - Piyush Sharma, Adrienne Raglin:
IoT: Smart City Parking Solutions with Metric-Chisini-Jensen-Shannon Divergence based Kernels. 324-330 - Yusuf Said Eroglu, Fatih Erden, Ismail Güvenç:
Adaptive Kalman Tracking for Indoor Visible Light Positioning. 331-336 - Florian Meyer, Moe Z. Win:
Data Association for Tracking Extended Targets. 337-342 - Dmitry Kramarev, Ishtiaq Ahmad, Kelvin J. Layton, Marc Lavenant, Hidayat Soetiyono, Gottfried Lechner, Hajime Suzuki, Ian Grivell, Stephen Leak:
Event-Triggered Synchronization for Mobile Distributed Transmit Beamforming. 343-348 - Xiangdong Liu, Dilip Gokhale:
An Acquisition Technique for LTE over Satellite. 349-354 - Brandon F. Lo, Scott Torborg, Chun Kin Au-Yeung:
HopSAC: Frequency Hopping Parameter Estimation Based on Random Sample Consensus for Counter-Unmanned Aircraft Systems. 355-360 - Ning Cai, Yanni Han, Yongming Ben, Wei An, Zhen Xu:
An Effective Load Balanced Controller Placement Approach in Software-Defined WANs. 361-366 - Xin Wang, Qiao Xiang, Jeremy Tucker, Vinod K. Mishra, Yang Richard Yang:
Dandelion: A Novel, High-Level Programming System for Software Defined Coalitions with Local State Sharing. 367-372 - Qi Zhao, Adam J. Brown, Jae H. Kim, Mario Gerla:
An Integrated Software-Defined Battlefield Network Testbed for Tactical Scenario Emulation. 373-378 - Joshua Marker, John M. Shea, Tan F. Wong, Eric Graves, Paul L. Yu:
Identifying Bottleneck Nodes using Packet Delay Statistics. 447-452 - Michael Fletcher, Joseph D. Gaeddert, Alan J. Michaels:
Physical Layer Firewall Design using Co-Channel Underlay-Based Watermark Authentication. 453-457 - Y. Qiu, C. Brown, L. Li:
Deep Learning for an Anti-Jamming CPM Receiver. 458-463 - Yujung Roh, Seungjae Jung, Joonhyuk Kang:
Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and Trajectory. 464-469 - Bo Guan, Dennis L. Goeckel:
Achievable Information-Theoretic Secrecy in the Presence of a Radar. 476-481 - Feng Ouyang, Oscar F. Somerlock, Arnab Das, David E. Bengtson:
Assessing Anti-Jamming Performance of Directional Wireless Links. 482-489 - Cong Pu:
Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks. 490-495 - Laura Poplawski Ma, Stephen Zabele, Christophe J. Merlin, Gregory Lauer, Stephen Dabideen:
QFloor: Queue Delay Reduction in Dynamic Backpressure Networks. 496-501 - Stephen Dabideen, Stephen Zabele, Christophe J. Merlin, Laura Poplawski Ma, Gregory Lauer:
G3M: A heuristic for low-latency multicast back-pressure forwarding. 502-507 - Wenjun Huang, Xu Li, Hancheng Ma, Yanan Liang:
Modeling Resource Limited Cooperative Broadcasting using Hard Core Poisson Process. 508-513 - Arwid Komulainen, Jimmi Grönkvist, Ulf Sterner, Ulrika Uppman:
Improving Tactical Voice Communications using Cooperative Broadcast over a Narrowband Channel. 514-520 - Ayush Dusia, Ram Ramanathan, Warren Ramanathan, Christophe Servaes, Adarshpal S. Sethi:
VINE: Zero-Control-Packet Routing for Ultra-Low-Capacity Mobile Ad Hoc Networks. 521-526 - Kevin Merchant, Bryan Nousain:
Securing IoT RF Fingerprinting Systems with Generative Adversarial Networks. 584-589 - Kevin Merchant, Bryan Nousain:
Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural Networks. 590-597 - Kunal Sankhe, Kaushik R. Chowdhury, Francesco Restuccia, Salvatore D'Oro, Tong Jian, Zifeng Wang, Amani Al-Shawabka, Jennifer G. Dy, Tommaso Melodia, Stratis Ioannidis:
Impairment Shift Keying: Covert Signaling by Deep Learning of Controlled Radio Imperfections. 598-603 - Zejian Zhou, Lijun Qian, Hao Xu:
Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game Theory. 604-609 - Nof Abuzainab, Volkan Isler, Aylin Yener, Tugba Erpek, Kemal Davaslioglu, Yalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Mitesh P. Patel, Frank Panettieri, Muhammad A. Qureshi:
QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement Learning. 610-615 - Zhong Guan, Gaopeng Gou, Yangyang Guan, Bingxu Wang:
An Empirical Analysis of Plugin-Based Tor Traffic over SSH Tunnel. 616-621 - Chérifa Boucetta, Aicha Dridi, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal:
Optimizing Drone Deployment for Cellular Communication Coverage During Crowded Events. 622-627 - Dan Shen, Khanh D. Pham, Genshe Chen:
SSB and DSB Enabled Hybrid Waveforms for the Space-Ground Link System. 628-633 - Wade Leonard, Alex Saunders, Michael Calabro, Katherine Olsen:
A Multi-waveform Radio Receiver, an Example of Machine Learning Enabled Radio Architecture and Design. 634-639 - Anil Kumar Yerrapragada, Brian Kelley:
Very High Throughput Internet of Things Networks with $K$ access points and $K$ devices. 640-645 - Hongzhi Guo, Bincy Ben:
Reinforcement Learning-Enabled Reliable Wireless Sensor Networks in Dynamic Underground Environments. 646-651 - Shaoran Li, Y. Thomas Hou, Wenjing Lou, Brian Jalaian, Stephen Russell, Benjamin MacCall:
Optimal Power Control with Channel Uncertainty in Ad Hoc Networks. 652-657 - Asanka Kekirigoda, Kin-Ping Hui, Qingqing Cheng, Zhipeng Lin, J. Andrew Zhang, Diep N. Nguyen, Xiaojing Huang:
Massive MIMO for Tactical Ad-hoc Networks in RF Contested Environments. 658-663 - Joseph P. Macker, Jeffery W. Weston, David J. Claypool:
Autonomic Clustering in Temporal Network Graphs. 664-669 - Stephen Russell, Tarek F. Abdelzaher, Niranjan Suri:
Multi-Domain Effects and the Internet of Battlefield Things. 724-730 - Anthony J. McAuley, Yitzchak M. Gottlieb, Latha A. Kant, John Lee, Alexander Poylisher:
P4-Based Hybrid Error Control Booster Providing New Design Tradeoffs in Wireless Networks. 731-736 - Seungmo Kim, Tsigigenet Dessalgn:
Mitigation of Civilian-to-Military Interference in DSRC for Urban Operations. 737-742 - Hoyong Choi, Jihwan Bang, Namjo Ahn, Jinhwan Jung, Jungwook Choi, Soobum Park, Yung Yi:
CH-MAC: A Cluster-based, Hybrid TDMA MAC Protocol over Wireless Ad-hoc Networks. 743-748 - Chris Simpkin, Ian J. Taylor, Alun D. Preece, Graham A. Bent, Richard Tomsett, Raghu K. Ganti, Olwen Worthington:
Coalition C3 Information Exchange Using Binary Symbolic Vectors. 784-789 - Konrad S. Wrona, Mauro Tortonesi, Michal Marks, Niranjan Suri:
Leveraging and Fusing Civil and Military Sensors to support Disaster Relief Operations in Smart Environments. 790-797 - Lorenzo Campioni, Rita Lenzi, Filippo Poltronieri, Manas Pradhan, Mauro Tortonesi, Cesare Stefanelli, Niranjan Suri:
MARGOT: Dynamic IoT Resource Discovery for HADR Environments. 809-814 - Adrian E. Conway, Michael Wang, Emir Ljuca, P. David Lebling:
A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBT. 815-820 - Joseph Noor, Ahmed Ali-Eldin, Luis Garcia, Chirag Rao, Venkat R. Dasari, Deepak Ganesan, Brian Jalaian, Prashant J. Shenoy, Mani B. Srivastava:
The Case for Robust Adaptation: Autonomic Resource Management is a Vulnerability. 821-826 - Ioannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Jemin George, Nandi Leslie, James Michaelis:
Application of Trust Assessment Techniques to IoBT Systems. 833-840 - Erick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, Laurent Njilla:
Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things Security. 841-846 - Jongdeog Lee, Suk Min Hwang, Tarek F. Abdelzaher, Kelvin Marcus, Kevin Chan:
Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric Networks. 847-852 - Jason A. Tran, Gowri Sankar Ramachandran, Claudiu B. Danilov, Bhaskar Krishnamachari:
An Evaluation of Consensus Latency in Partitioning Networks. 853-858
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.