default search action
ICMCIS 2019: Budva, Montenegro
- International Conference on Military Communications and Information Systems, ICMCIS 2019, Budva, Montenegro, May 14-15, 2019. IEEE 2019, ISBN 978-1-5386-9383-4
- Gunnar Eriksson, Anders Hansson:
Derivation of detection times for a simple follower-jammer model used in mobile ad hoc-network simulations. 1-5 - Romuald Hoffmann:
Markov Models of Cyber Kill Chains with Iterations. 1-6 - Harrie Bastiaansen, Casper van den Broek, Thomas Kudla, Anthony W. Isenor, Sean Webb, Niranjan Suri, Andrea Masini, Caglar Bilir, Mustafa Cocelli:
Adaptive Information Processing and Distribution to Support Command and Control in Situations of Disadvantaged Battlefield Network Connectivity. 1-7 - Madalina Georgiana Berceanu, Carmen Voicu, Simona Halunga:
The performance of an uplink Large Scale MIMO system with MMSE-SIC detector. 1-4 - Ewa Niewiadomska-Szynkiewicz, Andrzej Sikora:
Performance Analysis of Energy Conservation Techniques for Wireless Sensor Networks. 1-6 - Djabir Abdeldjalil Chekired, Lyes Khoukhi:
Distributed SDN-Based C4ISR Communications: A Delay-Tolerant Network for Trusted Tactical Cloudlets. 1-7 - Arvid Kok, Ivana Ilic Mestric, Michael Street:
Named Entity Extraction in a Military Context. 1-6 - Manas Pradhan, Filippo Poltronieri, Mauro Tortonesi:
Dynamic Resource Discovery and Management for Edge Computing Based on SPF for HADR Operations. 1-6 - Niranjan Suri, Kelvin M. Marcus, Casper van den Broek, Harrie Bastiaansen, Piotr Lubkowski, Mariann Hauge:
Extending the Anglova Scenario for Urban Operations. 1-7 - Daniel Rauschen, Dennis Gläsel, Hans Peter Such, Philipp Zimmermann, Markus Antweiler:
Commercial Of The Shelf Counter UAV. 1-5 - Robert Matyszkiel, Pawel Kaniewski, Rafal Polak, Dariusz Laskowski:
Selected methods of protecting wireless communications against interferences. 1-5 - Marc Adrat, Reinhardt Keller, Matthias Tschauner, Steffen Wilden, Vincent Le Nir, Taneli Riihonen, Mark D. J. Bowyer, Karel Pärlin:
Full-Duplex Radio - Increasing the Spectral Efficiency for Military Applications. 1-5 - Amílcar Soares, Renata Dividino, Fernando Henrique Oliveira Abreu, Matthew Brousseau, Anthony W. Isenor, Sean Webb, Stan Matwin:
CRISIS: Integrating AIS and Ocean Data Streams Using Semantic Web Standards for Event Detection. 1-7 - Janusz Szmidt:
Nonlinear Feedback Shift Registers and Zech's Logarithms. 1-4 - Joanna Sliwa:
SDN and NVF in support for making military networks more survivable. 1-6 - Roberto Rigolin Ferreira Lopes, Pooja Hanavadi Balaraju, Peter Sevenich:
Creating Ever-changing QoS-constrained Dataflows in Tactical Networks: An Exploratory Study. 1-8 - Alexandre Croix, Thibault Debatty, Wim Mees:
Training a multi-criteria decision system and application to the detection of PHP webshells. 1-8 - Jean-Frédéric Wagen, Victor Adalid, Gilles Waeber, François Buntschu, Gérôme Bovet:
Performance Profiling of Radio Models and Anglova Based Scenarios. 1-5 - Thorsten Aurisch, Andreas Jacke:
Replication Strategies of Mobile Agents for Autonomous Vulnerability Mitigation. 1-6 - Maximilian Hirsch, Andreas Becker, Fabian Angelstorf, Fabian Noth:
Performance Analysis of C2IS in Distributed Tactical Networks. 1-5 - Daniel Vogel, Daniel Rauschen, Dennis Gläsel:
Susceptibility of LTE to Downlink Jamming. 1-6 - Joakim Flathagen, Ole Ingar Bentstuen:
Proxy-based Optimization of Topology Discovery in Software Defined Networks. 1-5 - Krzysztof Malinowski, Andrzej Karbowski:
Hierarchical On-line Risk Assessment at National Level. 1-5 - Kuikka Vesa, Matti Syrjänen:
Modelling Utility of Networked Services in Military Environments. 1-6 - Taneli Riihonen, Dani Korpi, Matias Turunen, Tatu Peltola, Joni Saikanmäki, Mikko Valkama, Risto Wichman:
Military Full-Duplex Radio Shield for Protection Against Adversary Receivers. 1-6 - Sebastian Szwaczyk, Marek Amanowicz, Konrad S. Wrona, Andrzej Karbowski:
Risk-aware routing approach for software-defined networks. 1-7 - Federico Mancini, Solveig Bruvoll, Theo Verhoogt, René Wiegers, John Melrose, Robert Been, Raphael Ernst, Kellyn Rein, Frederick A. Leve:
Securing Autonomous and Unmanned Vehicles for Mission Assurance*. 1-8 - Joni Saikanmäki, Matias Turunen, Miikka Mäenpää, Antti-Pekka Saarinen, Taneli Riihonen:
Simultaneous Jamming and RC System Detection by Using Full-Duplex Radio Technology. 1-6 - Peter J. Lenk:
NATO as an Information Platform. 1-6 - Fikadu T. Dagefu, Jeffrey N. Twigg, Chirag Rao, Brian M. Sadler:
Directional Communication Enabled by Mobile Parasitic Elements. 1-7 - Karel Pärlin, Taneli Riihonen, Matias Turunen:
Sweep Jamming Mitigation Using Adaptive Filtering for Detecting Frequency Agile Systems. 1-6 - Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Laung Lau:
Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training. 1-6 - Robert J. Drost, Michael J. Weisman, Fikadu T. Dagefu, C. Hakan Arslan:
A Low-Complexity Approach to UV Communication Channel Model Evaluation. 1-7 - Markku Kiviranta, Ilkka Moilanen, Jussi Roivainen:
5G Radar: Scenarios, Numerology and Simulations. 1-6 - Souradip Saha, Matthias Tschauner, Marc Adrat:
EXIT Chart Analysis for Bit-Interleaved Polar Coded Modulation with Iterative Decoding. 1-5 - Ida M. Frøseth, Frank T. Johnsen, Trude Hafsoe Bloebaum:
Battery Efficient Location Strategy on Android. 1-7 - Mariusz Kamola, Przemyslaw Jaskóla, Marek Amanowicz:
Decision Support System for Identification and Security Management of Essential and Digital Services. 1-7 - Thibault Debatty, Wim Mees:
Building a Cyber Range for training CyberDefense Situation Awareness. 1-6 - Ronggong Song, Tricia J. Willink:
Machine Learning-Based Traffic Classification of Wireless Traffic. 1-8 - Niranjan Suri, Maggie R. Breedy, Kelvin M. Marcus, Roberto Fronteddu, Eelco Cramer, Alessandro Morelli, Lorenzo Campioni, Michael Provosty, Conner Enders, Mauro Tortonesi, Jan Nilsson:
Experimental Evaluation of Group Communications Protocols for Data Dissemination at the Tactical Edge. 1-8 - Erlend Larsen, Lars Landmark, Sondre A. Engebråten, Øivind Kure:
Practical Optimization Methods for UAV Relay Positions in an Adaptive Rate MANET. 1-8 - Mateusz Kustra, Krzysztof Kosmowski, Marek Suchanski:
Hybrid sensing method in mobile ad-hoc networks (MANET). 1-8 - Cezary Ziólkowski, Jan M. Kelner:
Angular Separation of Channels in 5G System Multi-Beam Antennas. 1-4 - Janusz Furtak, Zbigniew Zielinski, Jan Chudzikiewicz:
Security Domain for the Sensor Nodes with Strong Authentication. 1-6 - Lorenzo Campioni, Mariann Hauge, Lars Landmark, Niranjan Suri, Mauro Tortonesi:
Considerations on the Adoption of Named Data Networking (NDN) in Tactical Environments. 1-8 - Chryssalenia Koumpouzi, Predrag Spasojevic, Fikadu T. Dagefu:
Low Probability of Detection QS-MC-DS-CDMA for Low VHF. 1-6 - Ivana Ilic Mestric, Michael Street, Philip Eles:
Analysis of unstructured content using state of the art technology in NATO environment. 1-5 - Vesa Kuikka, Juha-Pekka Nikkarila:
Cooperation and Leadership in Military Organisations Modelled with Methods of Social Network Analysis. 1-7 - Marek Suchanski, Pawel Kaniewski, Janusz Romanik, Edward Golan, Krzysztof Zubel:
Radio Environment Maps for Military Cognitive Networks: Deployment of Sensors vs. Map Quality. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.