default search action
ICMCIS 2015: Cracow, Poland
- International Conference on Military Communications and Information Systems, ICMCIS 2015, Cracow, Poland, May 18-19, 2015. IEEE 2015, ISBN 978-8-3934-8481-2
- Thomas Kudla, Markus Esch, Daniel Ota, Gerhard Schwarz:
An open process for software development in classified environments as prerequisite for military app stores. 1-9 - Jacek Jarmakiewicz, Krzysztof Maslanka, Krzysztof Parobczak:
Development of cyber security testbed for critical infrastructure. 1-10 - Wojciech Bednarczyk, Piotr Gajewski:
Performance of distributed clustering with weighted optimization algorithm for MANET Cognitive Radio. 1-5 - Bart Scheers, Djamel Teguig, Vincent Le Nir:
Wideband spectrum sensing technique based on Goodness-of-Fit testing. 1-6 - Hanna Werker, Stefan Couturier, Daniel Rauschen, Marc Adrat, Markus Antweiler:
Analysis of a modified Switchable Bayesian Learning Automaton for Cognitive Radio. 1-5 - Arild Bergh:
Distributing the disruption. 1-6 - Raymond Haakseth, Nils Agne Nordbotten, Oyvind Jonsson, Bengt Kristiansen:
A high assurance cross-domain guard for use in Service-Oriented Architectures. 1-8 - Grzegorz Szmit, Jerzy Lopatka:
Optimization of Cognitive Radio networks performance using policies definition. 1-7 - Sara Örn Tengstrand, Sara Linder, Karina M. Fors, Ulf Sterner:
Capacity benefits of airborne nodes in ad hoc networks with broadcast traffic. 1-6 - Frank T. Johnsen, Trude Hafsøe Bloebaum, Dag Ove Eggum:
Efficient SOAP messaging for Android. 1-9 - Djamel Teguig, Bart Scheers, Vincent Le Nir, François Horlin:
Consensus algorithms for distributed spectrum sensing based on goodness of fit test in cognitive radio networks. 1-5 - Wim Mees, Thibault Debatty:
An attempt at defining cyberdefense situation awareness in the context of command & control. 1-9 - Kyrre Wahl Kongsgård, Nils Agne Nordbotten, Stian Fauskanger:
Policy-based labelling: A flexible framework for trusted data labelling. 1-10 - Ewa Idzikowska:
Faults detection schemes for PP-2 cipher. 1-4 - Christoph Barz, Florian Quinkert:
Advanced security gateways for heterogeneous tactical ad hoc networks. 1-6 - Piotr Lubkowski, Mariann Hauge, Lars Landmark, Christoph Barz, Peter Sevenich:
On improving connectivity and network efficiency in a heterogeneous military environment. 1-9 - Joanna Sliwa, Tomasz Podlasek, Robert Matyszkiel, Boguslaw Grochowina:
Efficiency of the Single Sign On mechanism in a tactical network environment. 1-7 - Espen Flydahl, Mariann Hauge, Lars Landmark:
On the performance of packet-pair based path capacity estimation in wireless Ad Hoc networks. 1-9 - Leopoldo Santos, Mario de la Fuente Martin, Juan Jose Perez, Carlos Rodríguez-Solano, Miguel-Ángel Sicilia:
Representing multi-national rules of engagement using ontologies and rules as constraints for courses of action. 1-5 - Adam Kozakiewicz, Krzysztof Lasota:
Secure DRM mechanism for offline applications. 1-8 - Robert Wicik, Rafal Gliwa, Piotr Komorowski:
Cryptanalysis of alternating step generators. 1-6 - Wolfgang Koch, Felix Govaers:
Accumulated state densities and their use in decorrelated track-to-track fusion. 1-9 - Baher Mawlawi, Jean-Baptiste Dore, Vincent Berg:
Optimizing contention based access methods for FBMC waveforms. 1-6 - Feten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir:
Jamming mitigation in cognitive radio networks using a modified Q-learning algorithm. 1-7 - Joanna Glowacka, Marek Amanowicz, Marcin Glowacki:
Robustness of trust-based protection (TUBE) scheme to reputation attacks in military mobile ad-hoc networks. 1-10 - Patrik Eliardsson, Erik Axell, Peter F. Stenumgaard, Kia Wiklundh, Bjorn Johansson, Börje Asp:
Military HF communications considering unintentional platform-generated electromagnetic interference. 1-6 - James Nightingale, Qi Wang, José M. Alcaraz Calero, Ian Owens, Christos Grecos:
Enhancing visual communications capabilities in tactical networks. 1-9 - Mikko Kiviharju:
Attribute pooling for Cryptographic Access Control. 1-12 - Rafal Piotrowski, Joanna Sliwa:
Cyberspace situational awarness in national security system. 1-6 - Reginald Ford, Bjorn Jervell Hansen, David Hanz, Sven Kuehne, Mark Last, Vahid Mojtahedzadeh, Dariusz Nogalski, Leopoldo Santos, Fulya Tuncer, Michael Wunder:
Bridging Semantic Interoperability gaps with SILF. 1-11 - Topi Tuukkanen, Jukka Anteroinen:
Framework to develop military operational understanding of cognitive radio. 1-9 - Jan Nilsson, Ulf Sterner:
Performance of MPR-based broadcast methods in mobile ad hoc networks for rural terrains. 1-7 - Janusz Szmidt, Przemyslaw Dabrowski:
The construction of nonlinear feedback shift registers of small orders. 1-4 - Kimmo Heinäaro:
Cyber attacking tactical radio networks. 1-6 - Feten Slimeni, Bart Scheers, Zied Chtourou:
Security threats in military cognitive radio networks. 1-10 - Michal Kruczkowski, Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz:
Cross-layer analysis of malware datasets for malicious campaigns identification. 1-7 - Pierre Simon, Norbert Bret:
Technology-agnostic traffic engineering in a multinational network. 1-6 - Ronggong Song, J. David Brown, Helen Tang, Mazda Salmanian:
Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networks. 1-8 - Vincent Le Nir, Bart Scheers:
Evaluation of open-source software frameworks for high fidelity simulation of cognitive radio networks. 1-6 - Ole Ingar Bentstuen, Petter Kristiansen:
Towards a transport network for FMN based on the PCN concept. 1-6 - Frank T. Johnsen, Trude Hafsøe Bloebaum, Kristoffer R. Karud:
Recommendations for increased efficiency of Web services in the tactical domain. 1-11 - Wojciech Bednarczyk, Jerzy Dolowski, Jaroslaw Michalak:
An efficiency of broadcast mechanisms based on Cluster Heads in clusterized radio network. 1-6 - Federico Mancini, Anders Fongen:
Ephemeral classification of mobile terminals. 1-12 - Harri Saarnisaari:
Analysis of a CFAR correlation radiometer. 1-5 - Jacek Jarmakiewicz, Tomasz Podlasek:
Design and implementation of multilevel security subsystem based on XACML and WEB services. 1-8 - Philipp Steinmetz:
Measuring and limiting the covert channel risk of XML document transmission. 1-9 - Heshan Du, Natasha Alechina, Glen Hart, Michael Jackson:
A tool for matching crowd-sourced and authoritative geospatial data. 1-8 - Kamil Gleba, Henryk Wiacek, Robert Goniacz, Joanna Sliwa:
Distribution and interpretation of geo-referenced events for the purpose of road traffic shaping. 1-7 - Michael Gerz, Melissa Mulikita, Nico Bau, Fahrettin Gökgöz:
The MIP Information Model - A semantic reference for Command & Control. 1-11 - Stefan Couturier, Jaroslaw Krygier, Ole Ingar Bentstuen, Vincent Le Nir:
Challenges for network aspects of Cognitive Radio. 1-10 - Norman Jansen, Daniel Krämer, Christoph Barz, Julia Niewiejska, Marc Spielmann:
Middleware for coordinating a tactical router with SOA services. 1-7 - Ichrak Amdouni, Cédric Adjih, Thierry Plesse:
Network coding in military wireless ad hoc and sensor networks: Experimentation with GardiNet. 1-9
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.