default search action
Robert F. Mills
Person information
- affiliation: Wright-Patterson Air Force Base, OH, USA
- affiliation (PhD 1994): University of Kansas, KS, USA
Other persons with the same name
- Robert J. Mills (aka: Robert Mills 0002) — Utah State University, Logan, UT, USA
- Robert Mills 0003 — Royal Infirmary, Department of Otolaryngology, Edinburgh, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j22]Willie H. Mims, Michael A. Temple, Robert F. Mills:
Active 2D-DNA Fingerprinting of WirelessHART Adapters to Ensure Operational Integrity in Industrial Systems. Sensors 22(13): 4906 (2022) - 2021
- [j21]John Hannah, Robert Mills, Richard Dill, Douglas D. Hodson:
Traffic collision avoidance system: false injection viability. J. Supercomput. 77(11): 12666-12689 (2021) - 2020
- [j20]James S. Okolica, Gilbert L. Peterson, Robert F. Mills, Michael R. Grimaila:
Sequence Pattern Mining with Variables. IEEE Trans. Knowl. Data Eng. 32(1): 177-187 (2020) - [c30]Logan O. Mailloux, Robert F. Mills:
Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study. CNS 2020: 1-8 - [c29]Micah Hayden, Scott R. Graham, Addison Betances, Robert F. Mills:
Multi-channel Security Through Data Fragmentation. Critical Infrastructure Protection 2020: 137-155
2010 – 2019
- 2019
- [j19]Paul M. Beach, Logan O. Mailloux, Brent T. Langhals, Robert F. Mills:
Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems. IEEE Access 7: 101741-101757 (2019) - [c28]Daryl Schmitt, Scott R. Graham, Patrick Sweeney, Robert F. Mills:
Vulnerability Assessment of InfiniBand Networking. Critical Infrastructure Protection 2019: 179-205 - [c27]Logan O. Mailloux, Martin Trae Span, Robert F. Mills, William Bill Young:
A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System. SysCon 2019: 1-7 - 2018
- [j18]Martin Trae Span, Logan O. Mailloux, Robert F. Mills, William Bill Young:
Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study. IEEE Access 6: 46668-46682 (2018) - [c26]Clark Wolfe, Scott R. Graham, Robert Mills, Scott Nykl, Paul Simon:
Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications. Critical Infrastructure Protection 2018: 81-90 - 2017
- [c25]John M. Willis, Robert F. Mills, Logan O. Mailloux, Scott R. Graham:
Considerations for secure and resilient satellite architectures. CyCon U.S. 2017: 16-22 - 2014
- [c24]Sandra L. Vaughan, Robert F. Mills, Michael R. Grimaila, Gilbert L. Peterson, Steven K. Rogers:
Narratives as a Fundamental Component of Consciousness. CMN 2014: 246-250 - [c23]Adam J. Smith, Robert F. Mills, Adam R. Bryant, Gilbert L. Peterson, Michael R. Grimaila:
REDIR: Automated static detection of obfuscated anti-debugging techniques. CTS 2014: 173-180 - [c22]Richard Agbeyibor, Jonathan Butts, Michael R. Grimaila, Robert F. Mills:
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection. Critical Infrastructure Protection 2014: 245-261 - 2013
- [j17]Cindy Finke, Jonathan Butts, Robert F. Mills, Michael R. Grimaila:
Enhancing the security of aircraft surveillance in the next generation air traffic control system. Int. J. Crit. Infrastructure Prot. 6(1): 3-11 (2013) - [c21]Cindy Finke, Jonathan Butts, Robert F. Mills:
ADS-B encryption: confidentiality in the friendly skies. CSIIRW 2013: 9 - 2012
- [j16]Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers:
RIPsec - Using reputation-based multilayer security to protect MANETs. Comput. Secur. 31(1): 122-136 (2012) - [j15]Kris E. Barcomb, Dennis J. Krill, Robert F. Mills, Michael A. Saville:
Establishing Cyberspace Sovereignty. Int. J. Cyber Warf. Terror. 2(3): 26-38 (2012) - [c20]Adam R. Bryant, Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila:
Eliciting a Sensemaking Process from Verbal Protocols of Reverse Engineers. CogSci 2012 - 2011
- [j14]Donald McCallie, Jonathan Butts, Robert F. Mills:
Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Crit. Infrastructure Prot. 4(2): 78-87 (2011) - [c19]James L. Miller, Robert F. Mills, Michael R. Grimaila, Michael W. Haas:
A scalable architecture for improving the timeliness and relevance of cyber incident notifications. CICS 2011: 76-83 - [c18]Stephen M. Woskov, Michael R. Grimaila, Robert F. Mills, Michael W. Haas:
Design considerations for a case-based reasoning engine for scenario-based cyber incident notification. CICS 2011: 84-91 - [c17]Justin Myers, Michael R. Grimaila, Robert F. Mills:
Log-Based Distributed Security Event Detection Using Simple Event Correlator. HICSS 2011: 1-7 - [c16]Brennon Thomas, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
An FPGA System for Detecting Malicious DNS Network Traffic. IFIP Int. Conf. Digital Forensics 2011: 195-207 - [c15]Kris E. Barcomb, Jeffrey W. Humphries, Robert F. Mills:
A case for DoD application of public cloud computing services. MILCOM 2011: 1888-1893 - 2010
- [j13]George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines:
Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees. Int. J. Secur. Networks 5(2/3): 87-95 (2010) - [j12]Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols. Int. J. Secur. Networks 5(4): 236-247 (2010) - [c14]Justin Myers, Michael R. Grimaila, Robert F. Mills:
Adding value to log event correlation using distributed techniques. CSIIRW 2010: 32 - [c13]Michael R. Grimaila, Robert F. Mills, Michael W. Haas, Douglas J. Kelly:
Mission Assurance: Issues and Challenges. Security and Management 2010: 651-657
2000 – 2009
- 2009
- [j11]David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. J. Syst. Softw. 82(1): 101-111 (2009) - [c12]Justin Myers, Michael R. Grimaila, Robert F. Mills:
Towards insider threat detection using web server logs. CSIIRW 2009: 54 - [c11]Timothy H. Lacey, Gilbert L. Peterson, Robert F. Mills:
The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge. HICSS 2009: 1-9 - [c10]Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
Tracking Contraband Files Transmitted Using Bittorrent. IFIP Int. Conf. Digital Forensics 2009: 159-173 - 2008
- [j10]William C. Suski, Michael A. Temple, Michael J. Mendenhall, Robert F. Mills:
Radio frequency fingerprinting commercial communication devices to enhance electronic security. Int. J. Electron. Secur. Digit. Forensics 1(3): 301-322 (2008) - [j9]James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using PLSI-U to detect insider threats by datamining e-mail. Int. J. Secur. Networks 3(2): 114-121 (2008) - [c9]Michael R. Grimaila, Robert F. Mills, Larry W. Fortson:
Improving the cyber incident mission impact assessment (CIMIA) process. CSIIRW 2008: 32:1-32:2 - [c8]William C. Suski, Michael A. Temple, Michael J. Mendenhall, Robert F. Mills:
Using Spectral Fingerprints to Improve Wireless Network Security. GLOBECOM 2008: 2185-2189 - 2007
- [j8]James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using Author Topic to detect insider threats from email traffic. Digit. Investig. 4(3-4): 158-164 (2007) - [j7]Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass:
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum. IEEE Secur. Priv. 5(5): 40-49 (2007) - [j6]Marcus L. Roberts, Michael A. Temple, Richard A. Raines, Robert F. Mills, Mark E. Oxley:
Communication Waveform Design Using an Adaptive Spectrally Modulated, Spectrally Encoded (SMSE) Framework. J. Sel. Topics Signal Processing 1(1): 203-213 (2007) - [j5]Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. IEEE Netw. 21(4): 51-56 (2007) - [c7]Marcus L. Roberts, Michael A. Temple, Robert F. Mills, Richard A. Raines:
An SMSE Implementation of CDMA with Partial Band Interference Suppression. GLOBECOM 2007: 4424-4428 - [c6]Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass:
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. HICSS 2007: 271 - 2006
- [j4]Victor P. Hubenko Jr., Richard A. Raines, Robert F. Mills, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements. IEEE Commun. Mag. 44(11): 66-72 (2006) - [j3]Marcus L. Roberts, Michael A. Temple, Robert F. Mills, Richard A. Raines:
Evolution of the air interface of cellular communications systems toward 4G realization. IEEE Commun. Surv. Tutorials 8(1-4): 2-23 (2006) - [j2]Rusty O. Baldwin, Brian S. Peterson, Robert F. Mills:
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks. J. Syst. Softw. 79(12): 1782-1788 (2006) - [c5]James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using PLSI-U to Detect Insider Threats from Email Traffic. IFIP Int. Conf. Digital Forensics 2006: 91-103 - [c4]James S. Okolica, Gilbert L. Peterson, Robert F. Mills:
Using Author Topic to Detect Insider Threats from Email Traffic. ISI 2006: 642-643 - [c3]Marcus L. Roberts, Michael A. Temple, Mark E. Oxley, Robert F. Mills, Richard A. Raines:
A spectrally modulated, spectrally encoded analytic framework for carrier interferometry signals. IWCMC 2006: 1009-1014 - 2005
- [c2]Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin:
Developing an Insider Threat Model Using Functional Decomposition. MMM-ACNS 2005: 412-417 - [c1]Abel S. Nunez, Michael A. Temple, Robert F. Mills, Richard A. Raines:
Interference avoidance in spectrally encoded multiple access communications using MPSK modulation. WCNC 2005: 730-734 - 2000
- [j1]Robert F. Mills, Glenn E. Prescott:
Detectability models for multiple access low-probability-of-intercept networks. IEEE Trans. Aerosp. Electron. Syst. 36(3-1): 848-858 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint