BibTeX records: Richard R. Brooks

download as .bib file

@article{DBLP:journals/annals/BrooksYOOT22,
  author       = {Richard R. Brooks and
                  Lu Yu and
                  Ilker {\"{O}}z{\c{c}}elik and
                  Jon Oakley and
                  Nathan Tusing},
  title        = {Distributed Denial of Service (DDoS): {A} History},
  journal      = {{IEEE} Ann. Hist. Comput.},
  volume       = {44},
  number       = {2},
  pages        = {44--54},
  year         = {2022},
  url          = {https://doi.org/10.1109/MAHC.2021.3072582},
  doi          = {10.1109/MAHC.2021.3072582},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/annals/BrooksYOOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/SunBCT22,
  author       = {Fei Sun and
                  Richard R. Brooks and
                  Gurcan Comert and
                  Nathan Tusing},
  title        = {Side-Channel Security Analysis of Connected Vehicle Communications
                  Using Hidden Markov Models},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {10},
  pages        = {17562--17574},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2022.3164779},
  doi          = {10.1109/TITS.2022.3164779},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/SunBCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/ZhongVB22,
  author       = {Xingsi Zhong and
                  Ganesh K. Venayagamoorthy and
                  Richard R. Brooks},
  editor       = {Hisao Ishibuchi and
                  Chee{-}Keong Kwoh and
                  Ah{-}Hwee Tan and
                  Dipti Srinivasan and
                  Chunyan Miao and
                  Anupam Trivedi and
                  Keeley A. Crockett},
  title        = {A Virtual Synchrophasor Network for Power System Resiliency Under
                  Concurrent DoS Attacks},
  booktitle    = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2022,
                  Singapore, December 4-7, 2022},
  pages        = {1342--1349},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SSCI51031.2022.10022104},
  doi          = {10.1109/SSCI51031.2022.10022104},
  timestamp    = {Wed, 08 Feb 2023 22:09:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ssci/ZhongVB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AltarawnehSBHYS21,
  author       = {Amani Altarawneh and
                  Fei Sun and
                  Richard R. Brooks and
                  Oluwakemi Hambolu and
                  Lu Yu and
                  Anthony Skjellum},
  title        = {Availability analysis of a permissioned blockchain with a lightweight
                  consensus protocol},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102098},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102098},
  doi          = {10.1016/J.COSE.2020.102098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AltarawnehSBHYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuFOHB21,
  author       = {Lu Yu and
                  Yu Fu and
                  Jonathan Oakley and
                  Oluwakemi Hambolu and
                  Richard R. Brooks},
  title        = {On accuracy and anonymity of privacy-preserving negative survey {(NS)}
                  algorithms},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102206},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102206},
  doi          = {10.1016/J.COSE.2021.102206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuFOHB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edoc/BlackGBY21,
  author       = {Paul Black and
                  Iqbal Gondal and
                  Richard R. Brooks and
                  Lu Yu},
  title        = {{AFES:} An Advanced Forensic Evidence System},
  booktitle    = {25th International Enterprise Distributed Object Computing Workshop,
                  {EDOC} Workshop 2021, Gold Coast, Australia, October 25-29, 2021},
  pages        = {67--74},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EDOCW52865.2021.00034},
  doi          = {10.1109/EDOCW52865.2021.00034},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edoc/BlackGBY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-05649,
  author       = {Jon Oakley and
                  Carl R. Worley and
                  Lu Yu and
                  Richard R. Brooks and
                  Ilker {\"{O}}z{\c{c}}elik and
                  Anthony Skjellum and
                  Jihad S. Obeid},
  title        = {Scrybe: {A} Secure Audit Trail for Clinical Trial Data Fusion},
  journal      = {CoRR},
  volume       = {abs/2109.05649},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.05649},
  eprinttype    = {arXiv},
  eprint       = {2109.05649},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-05649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OakleyYZVB20,
  author       = {Jonathan Oakley and
                  Lu Yu and
                  Xingsi Zhong and
                  Ganesh Kumar Venayagamoorthy and
                  Richard R. Brooks},
  title        = {Protocol Proxy: An FTE-based covert channel},
  journal      = {Comput. Secur.},
  volume       = {92},
  pages        = {101777},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101777},
  doi          = {10.1016/J.COSE.2020.101777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OakleyYZVB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfi/SenRWBT20,
  author       = {Satyabrata Sen and
                  Nageswara S. V. Rao and
                  Chase Q. Wu and
                  Richard R. Brooks and
                  Christopher Temples},
  title        = {Detecting Low-level Radiation Sources Using Border Monitoring Gamma
                  Sensors},
  booktitle    = {{IEEE} International Conference on Multisensor Fusion and Integration
                  for Intelligent Systems, {MFI} 2020, Karlsruhe, Germany, September
                  14-16, 2020},
  pages        = {342--347},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/MFI49285.2020.9235252},
  doi          = {10.1109/MFI49285.2020.9235252},
  timestamp    = {Thu, 05 Nov 2020 11:41:08 +0100},
  biburl       = {https://dblp.org/rec/conf/mfi/SenRWBT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Worley0BOSAMM20,
  author       = {Carl R. Worley and
                  Lu Yu and
                  Richard R. Brooks and
                  Jon Oakley and
                  Anthony Skjellum and
                  Amani Altarawneh and
                  Sai Medury and
                  Ujan Mukhopadhyay},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Scrybe: {A} Second-Generation Blockchain Technology with Lightweight
                  Mining for Secure Provenance and Related Applications},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_4},
  doi          = {10.1007/978-3-030-38181-3\_4},
  timestamp    = {Sun, 19 Jul 2020 18:58:53 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Worley0BOSAMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-10687,
  author       = {Jonathan Oakley and
                  Lu Yu and
                  Xingsi Zhong and
                  Ganesh Kumar Venayagamoorthy and
                  Richard R. Brooks},
  title        = {Protocol Proxy: An FTE-based Covert Channel},
  journal      = {CoRR},
  volume       = {abs/2002.10687},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.10687},
  eprinttype    = {arXiv},
  eprint       = {2002.10687},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-10687.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WuBGSRBC19,
  author       = {Chase Qishi Wu and
                  Mark L. Berry and
                  Kayla M. Grieme and
                  Satyabrata Sen and
                  Nageswara S. V. Rao and
                  Richard R. Brooks and
                  Guthrie Cordone},
  title        = {Network Detection of Radiation Sources Using Localization-Based Approaches},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {4},
  pages        = {2308--2320},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2019.2891253},
  doi          = {10.1109/TII.2019.2891253},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/WuBGSRBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/Tusing0B0WB19,
  author       = {Nathan Tusing and
                  Jonathan Oakley and
                  C. Geddings Barrineau and
                  Lu Yu and
                  Kuang{-}Ching Wang and
                  Richard R. Brooks},
  title        = {Traffic Analysis Resistant Network {(TARN)} Anonymity Analysis},
  booktitle    = {27th {IEEE} International Conference on Network Protocols, {ICNP}
                  2019, Chicago, IL, USA, October 8-10, 2019},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICNP.2019.8888134},
  doi          = {10.1109/ICNP.2019.8888134},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icnp/Tusing0B0WB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-07020,
  author       = {Lu Yu and
                  Oluwakemi Hambolu and
                  Yu Fu and
                  Jon Oakley and
                  Richard R. Brooks},
  title        = {Privacy Preserving Count Statistics},
  journal      = {CoRR},
  volume       = {abs/1910.07020},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.07020},
  eprinttype    = {arXiv},
  eprint       = {1910.07020},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-07020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BrooksYFHGOYB18,
  author       = {Richard R. Brooks and
                  Lu Yu and
                  Yu Fu and
                  Oluwakemi Hambolu and
                  John Gaynard and
                  Julie Owono and
                  Archippe Yepmou and
                  Felix Blanc},
  title        = {Internet freedom in West Africa: technical support for journalists
                  and democracy advocates},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {5},
  pages        = {72--82},
  year         = {2018},
  url          = {https://doi.org/10.1145/3199477},
  doi          = {10.1145/3199477},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/BrooksYFHGOYB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/BediVSBW18,
  author       = {Guneet Bedi and
                  Ganesh Kumar Venayagamoorthy and
                  Rajendra Singh and
                  Richard R. Brooks and
                  Kuang{-}Ching Wang},
  title        = {Review of Internet of Things (IoT) in Electric Power and Energy Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {5},
  number       = {2},
  pages        = {847--870},
  year         = {2018},
  url          = {https://doi.org/10.1109/JIOT.2018.2802704},
  doi          = {10.1109/JIOT.2018.2802704},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/BediVSBW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/WangBB0YW18,
  author       = {Kuang{-}Ching Wang and
                  Richard R. Brooks and
                  C. Geddings Barrineau and
                  Jonathan Oakley and
                  Lu Yu and
                  Qing Wang},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Internet Security Liberated via Software Defined Exchanges},
  booktitle    = {Proceedings of the 2018 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018},
  pages        = {19--22},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180465.3180475},
  doi          = {10.1145/3180465.3180475},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/WangBB0YW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LiZYOHB18,
  author       = {Hongda Li and
                  Fuqiang Zhang and
                  Lu Yu and
                  Jon Oakley and
                  Hongxin Hu and
                  Richard R. Brooks},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {Towards Efficient Traffic Monitoring for Science {DMZ} with Side-Channel
                  based Traffic Winnowing},
  booktitle    = {Proceedings of the 2018 {ACM} International Workshop on Security in
                  Software Defined Networks {\&} Network Function Virtualization,
                  SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018},
  pages        = {55--58},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180465.3180474},
  doi          = {10.1145/3180465.3180474},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/LiZYOHB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/WuLSRBC18,
  author       = {Chase Q. Wu and
                  Wuji Liu and
                  Satyabrata Sen and
                  Nageswara S. V. Rao and
                  Richard R. Brooks and
                  Guthrie Cordone},
  title        = {Two-Level Clustering-Based Target Detection Through Sensor Deployment
                  and Data Fusion},
  booktitle    = {21st International Conference on Information Fusion, {FUSION} 2018,
                  Cambridge, UK, July 10-13, 2018},
  pages        = {2376--2383},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ICIF.2018.8455623},
  doi          = {10.23919/ICIF.2018.8455623},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/WuLSRBC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/MedurySB018,
  author       = {Sai Medury and
                  Anthony Skjellum and
                  Richard R. Brooks and
                  Lu Yu},
  title        = {SCRaaPS: {X.509} Certificate Revocation Using the Blockchain-based
                  Scrybe Secure Provenance System},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {145--152},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659364},
  doi          = {10.1109/MALWARE.2018.8659364},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/MedurySB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/OakleyW0BS18,
  author       = {Jonathan Oakley and
                  Carl R. Worley and
                  Lu Yu and
                  Richard R. Brooks and
                  Anthony Skjellum},
  title        = {Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions},
  booktitle    = {13th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MALWARE.2018.8659357},
  doi          = {10.1109/MALWARE.2018.8659357},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/OakleyW0BS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-09886,
  author       = {Jay Aikat and
                  Ilya Baldin and
                  Mark Berman and
                  Joe Breen and
                  Richard R. Brooks and
                  Prasad Calyam and
                  Jeffrey S. Chase and
                  Wallace Chase and
                  Russ Clark and
                  Chip Elliott and
                  Jim Griffioen and
                  Dijiang Huang and
                  Julio Ibarra and
                  Tom Lehman and
                  Inder Monga and
                  Abraham Matta and
                  Christos Papadopoulos and
                  Mike Reiter and
                  Dipankar Raychaudhuri and
                  Glenn Ricart and
                  Robert Ricci and
                  Paul Ruth and
                  Ivan Seskar and
                  Jerry Sobieski and
                  Kobus van der Merwe and
                  Kuang{-}Ching Wang and
                  Tilman Wolf and
                  Michael Zink},
  title        = {The Future of {CISE} Distributed Research Infrastructure},
  journal      = {CoRR},
  volume       = {abs/1803.09886},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.09886},
  eprinttype    = {arXiv},
  eprint       = {1803.09886},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-09886.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetci/ZhongJVB17,
  author       = {Xingsi Zhong and
                  Iroshani Jayawardene and
                  Ganesh Kumar Venayagamoorthy and
                  Richard R. Brooks},
  title        = {Denial of Service Attack on Tie-Line Bias Control in a Power System
                  With {PV} Plant},
  journal      = {{IEEE} Trans. Emerg. Top. Comput. Intell.},
  volume       = {1},
  number       = {5},
  pages        = {375--390},
  year         = {2017},
  url          = {https://doi.org/10.1109/TETCI.2017.2739838},
  doi          = {10.1109/TETCI.2017.2739838},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetci/ZhongJVB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuYHOHSSDBB17,
  author       = {Yu Fu and
                  Lu Yu and
                  Oluwakemi Hambolu and
                  Ilker {\"{O}}z{\c{c}}elik and
                  Benafsh Husain and
                  Jingxuan Sun and
                  Karan Sapra and
                  Dan Du and
                  Christopher Tate Beasley and
                  Richard R. Brooks},
  title        = {Stealthy Domain Generation Algorithms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1430--1443},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2668361},
  doi          = {10.1109/TIFS.2017.2668361},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FuYHOHSSDBB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/CordoneBSRWBG17,
  author       = {Guthrie Cordone and
                  Richard R. Brooks and
                  Satyabrata Sen and
                  Nageswara S. V. Rao and
                  Chase Q. Wu and
                  Mark L. Berry and
                  Kayla M. Grieme},
  title        = {Improved multi-resolution method for MLE-based localization of radiation
                  sources},
  booktitle    = {20th International Conference on Information Fusion, {FUSION} 2017,
                  Xi'an, China, July 10-13, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICIF.2017.8009626},
  doi          = {10.23919/ICIF.2017.8009626},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/CordoneBSRWBG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/YuWBOBW17,
  author       = {Lu Yu and
                  Qing Wang and
                  C. Geddings Barrineau and
                  Jon Oakley and
                  Richard R. Brooks and
                  Kuang{-}Ching Wang},
  title        = {{TARN:} {A} SDN-based traffic analysis resistant network architecture},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323961},
  doi          = {10.1109/MALWARE.2017.8323961},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/malware/YuWBOBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhongFYB17,
  author       = {Xingsi Zhong and
                  Yu Fu and
                  Lu Yu and
                  Richard R. Brooks},
  title        = {Stealthy Malware Traffic - Not as Innocent as It Looks},
  journal      = {CoRR},
  volume       = {abs/1703.02200},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.02200},
  eprinttype    = {arXiv},
  eprint       = {1703.02200},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhongFYB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FuJYZB17,
  author       = {Yu Fu and
                  Zhe Jia and
                  Lu Yu and
                  Xingsi Zhong and
                  Richard R. Brooks},
  title        = {A Covert Data Transport Protocol},
  journal      = {CoRR},
  volume       = {abs/1703.02201},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.02201},
  eprinttype    = {arXiv},
  eprint       = {1703.02201},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FuJYZB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HamboluYOBMS17,
  author       = {Oluwakemi Hambolu and
                  Lu Yu and
                  Jon Oakley and
                  Richard R. Brooks and
                  Ujan Mukhopadhyay and
                  Anthony Skjellum},
  title        = {Provenance Threat Modeling},
  journal      = {CoRR},
  volume       = {abs/1703.03835},
  year         = {2017},
  url          = {http://arxiv.org/abs/1703.03835},
  eprinttype    = {arXiv},
  eprint       = {1703.03835},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HamboluYOBMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-00782,
  author       = {Lu Yu and
                  Qing Wang and
                  C. Geddings Barrineau and
                  Jon Oakley and
                  Richard R. Brooks and
                  Kuang{-}Ching Wang},
  title        = {{TARN:} {A} SDN-based Traffic Analysis Resistant Network Architecture},
  journal      = {CoRR},
  volume       = {abs/1709.00782},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.00782},
  eprinttype    = {arXiv},
  eprint       = {1709.00782},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-00782.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-07567,
  author       = {Lu Yu and
                  Richard R. Brooks},
  title        = {Stochastic Tools for Network Intrusion Detection},
  journal      = {CoRR},
  volume       = {abs/1709.07567},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.07567},
  eprinttype    = {arXiv},
  eprint       = {1709.07567},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-07567.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-07573,
  author       = {Richard R. Brooks and
                  Lu Yu and
                  Yu Fu and
                  Guthrie Cordone and
                  Jon Oakley and
                  Xingsi Zhong},
  title        = {Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect
                  Patterns in Raw Data},
  journal      = {CoRR},
  volume       = {abs/1709.07573},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.07573},
  eprinttype    = {arXiv},
  eprint       = {1709.07573},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-07573.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/AoWYBI16,
  author       = {Buke Ao and
                  Yongcai Wang and
                  Lu Yu and
                  Richard R. Brooks and
                  S. S. Iyengar},
  title        = {On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms},
  journal      = {{ACM} Comput. Surv.},
  volume       = {49},
  number       = {1},
  pages        = {5:1--5:23},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898984},
  doi          = {10.1145/2898984},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/AoWYBI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/SenRWBGBC16,
  author       = {Satyabrata Sen and
                  Nageswara S. V. Rao and
                  Chase Q. Wu and
                  Mark L. Berry and
                  Kayla M. Grieme and
                  Richard R. Brooks and
                  Guthrie Cordone},
  title        = {Performance analysis of Wald-statistic based network detection methods
                  for radiation sources},
  booktitle    = {19th International Conference on Information Fusion, {FUSION} 2016,
                  Heidelberg, Germany, July 5-8, 2016},
  pages        = {820--827},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7527971/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/SenRWBGBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/FuJYZB16,
  author       = {Yu Fu and
                  Zhe Jia and
                  Lu Yu and
                  Xingsi Zhong and
                  Richard R. Brooks},
  title        = {A covert data transport protocol},
  booktitle    = {11th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016},
  pages        = {93--100},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MALWARE.2016.7888734},
  doi          = {10.1109/MALWARE.2016.7888734},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/FuJYZB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfi/WuBGSRBC16,
  author       = {Chase Q. Wu and
                  Mark L. Berry and
                  Kayla M. Grieme and
                  Satyabrata Sen and
                  Nageswara S. V. Rao and
                  Richard R. Brooks and
                  Guthrie Cordone},
  title        = {A source-attractor approach to network detection of radiation sources},
  booktitle    = {2016 {IEEE} International Conference on Multisensor Fusion and Integration
                  for Intelligent Systems, {MFI} 2016, Baden-Baden, Germany, September
                  19-21, 2016},
  pages        = {394--399},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/MFI.2016.7849520},
  doi          = {10.1109/MFI.2016.7849520},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mfi/WuBGSRBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/HamboluYOBMS16,
  author       = {Oluwakemi Hambolu and
                  Lu Yu and
                  Jon Oakley and
                  Richard R. Brooks and
                  Ujan Mukhopadhyay and
                  Anthony Skjellum},
  title        = {Provenance threat modeling},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {384--387},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906960},
  doi          = {10.1109/PST.2016.7906960},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/HamboluYOBMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/MukhopadhyaySHO16,
  author       = {Ujan Mukhopadhyay and
                  Anthony Skjellum and
                  Oluwakemi Hambolu and
                  Jon Oakley and
                  Lu Yu and
                  Richard R. Brooks},
  title        = {A brief survey of Cryptocurrency systems},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {745--752},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906988},
  doi          = {10.1109/PST.2016.7906988},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/MukhopadhyaySHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OzcelikB15,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Richard R. Brooks},
  title        = {Deceiving entropy based DoS detection},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {234--245},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.013},
  doi          = {10.1016/J.COSE.2014.10.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OzcelikB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZhongAABV15,
  author       = {Xingsi Zhong and
                  Paranietharan Arunagirinathan and
                  Afshin Ahmadi and
                  Richard R. Brooks and
                  Ganesh Kumar Venayagamoorthy},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  Robert A. Bridges and
                  John R. Goodall},
  title        = {Side-Channels in Electric Power Synchrophasor Network Data Traffic},
  booktitle    = {Proceedings of the 10th Annual Cyber and Information Security Research
                  Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages        = {3:1--3:8},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746266.2746269},
  doi          = {10.1145/2746266.2746269},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZhongAABV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/DuYB15,
  author       = {Dan Du and
                  Lu Yu and
                  Richard R. Brooks},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  Robert A. Bridges and
                  John R. Goodall},
  title        = {Semantic Similarity Detection For Data Leak Prevention},
  booktitle    = {Proceedings of the 10th Annual Cyber and Information Security Research
                  Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages        = {4:1--4:6},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746266.2746270},
  doi          = {10.1145/2746266.2746270},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/DuYB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/FuHB15,
  author       = {Yu Fu and
                  Benafsh Husain and
                  Richard R. Brooks},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  Robert A. Bridges and
                  John R. Goodall},
  title        = {Analysis of Botnet Counter-Counter-Measures},
  booktitle    = {Proceedings of the 10th Annual Cyber and Information Security Research
                  Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages        = {9:1--9:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746266.2746275},
  doi          = {10.1145/2746266.2746275},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/FuHB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YuDBY15,
  author       = {Lu Yu and
                  Juan Deng and
                  Richard R. Brooks and
                  SeokBae Yun},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  Robert A. Bridges and
                  John R. Goodall},
  title        = {Automobile {ECU} Design to Avoid Data Tampering},
  booktitle    = {Proceedings of the 10th Annual Cyber and Information Security Research
                  Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015},
  pages        = {10:1--10:4},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746266.2746276},
  doi          = {10.1145/2746266.2746276},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/YuDBY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/ZhongFYBV15,
  author       = {Xingsi Zhong and
                  Yu Fu and
                  Lu Yu and
                  Richard R. Brooks and
                  Ganesh Kumar Venayagamoorthy},
  title        = {Stealthy malware traffic - Not as innocent as it looks},
  booktitle    = {10th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015},
  pages        = {110--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MALWARE.2015.7413691},
  doi          = {10.1109/MALWARE.2015.7413691},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/ZhongFYBV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LuSCYBG13,
  author       = {Chen Lu and
                  Jason M. Schwier and
                  Ryan Craven and
                  Lu Yu and
                  Richard R. Brooks and
                  Christopher Griffin},
  title        = {A Normalized Statistical Metric Space for Hidden Markov Models},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {43},
  number       = {3},
  pages        = {806--819},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSMCB.2012.2216872},
  doi          = {10.1109/TSMCB.2012.2216872},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/LuSCYBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YuSCBG13,
  author       = {Lu Yu and
                  Jason M. Schwier and
                  Ryan Craven and
                  Richard R. Brooks and
                  Christopher Griffin},
  title        = {Inferring Statistically Significant Hidden Markov Models},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {25},
  number       = {7},
  pages        = {1548--1558},
  year         = {2013},
  url          = {https://doi.org/10.1109/TKDE.2012.93},
  doi          = {10.1109/TKDE.2012.93},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/YuSCBG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BrooksHYD13,
  author       = {Richard R. Brooks and
                  Benafsh Husain and
                  SeokBae Yun and
                  Juan Deng},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Security and performance evaluation of security protocols},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459979},
  doi          = {10.1145/2459976.2459979},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BrooksHYD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LuB13,
  author       = {Chen Lu and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Timing analysis in {P2P} botnet traffic using probabilistic context-free
                  grammars},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {14},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459992},
  doi          = {10.1145/2459976.2459992},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/LuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CameronBD13,
  author       = {Katherine C. Cameron and
                  Richard R. Brooks and
                  Juan Deng},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Cost-effective quality assurance of wireless network security},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {15},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459993},
  doi          = {10.1145/2459976.2459993},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/CameronBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/ZhaoB13,
  author       = {Lianyu Zhao and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Tailoring trusted semantic information},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {17},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2459995},
  doi          = {10.1145/2459976.2459995},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/ZhaoB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YuB13,
  author       = {Lu Yu and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Applying {POMDP} to moving target optimization},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {49},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460032},
  doi          = {10.1145/2459976.2460032},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/YuB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BrooksHMFB13,
  author       = {Richard R. Brooks and
                  Oluwakemi Hambolu and
                  Paul Marusich and
                  Yu Fu and
                  Saiprasad Balachandran},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Creating a tailored trustworthy space for democracy advocates using
                  hostile host},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {50},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460033},
  doi          = {10.1145/2459976.2460033},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BrooksHMFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OzcelikB13,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Annarita Giani and
                  Axel W. Krings and
                  Robert K. Abercrombie},
  title        = {Operational system testing for designed in security},
  booktitle    = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge,
                  TN, USA, January 8-10, 2013},
  pages        = {55},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2459976.2460038},
  doi          = {10.1145/2459976.2460038},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/OzcelikB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gree/OzcelikFB13,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Yu Fu and
                  Richard R. Brooks},
  title        = {DoS Detection is Easier Now},
  booktitle    = {2013 Second {GENI} Research and Educational Experiment Workshop, Salt
                  Lake City, UT, USA, March 20-22, 2013},
  pages        = {50--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/GREE.2013.18},
  doi          = {10.1109/GREE.2013.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gree/OzcelikFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/SapraHBS13,
  author       = {Karan Sapra and
                  Benafsh Husain and
                  Richard R. Brooks and
                  Melissa C. Smith},
  title        = {Circumventing keyloggers and screendumps},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {103--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703691},
  doi          = {10.1109/MALWARE.2013.6703691},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/SapraHBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ait/BhanuSCBHGG11,
  author       = {Harakrishnan Bhanu and
                  Jason M. Schwier and
                  Ryan Craven and
                  Richard R. Brooks and
                  Kathryn Hempstalk and
                  Daniele Gunetti and
                  Christopher Griffin},
  title        = {Side-Channel Analysis for Detecting Protocol Tunneling},
  journal      = {Adv. Internet Things},
  volume       = {1},
  number       = {2},
  pages        = {13--26},
  year         = {2011},
  url          = {https://doi.org/10.4236/ait.2011.12003},
  doi          = {10.4236/AIT.2011.12003},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ait/BhanuSCBHGG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/GriffinBS11,
  author       = {Christopher Griffin and
                  Richard R. Brooks and
                  Jason M. Schwier},
  title        = {A Hybrid Statistical Technique for Modeling Recurrent Tracks in a
                  Compact Set},
  journal      = {{IEEE} Trans. Autom. Control.},
  volume       = {56},
  number       = {8},
  pages        = {1926--1931},
  year         = {2011},
  url          = {https://doi.org/10.1109/TAC.2011.2137490},
  doi          = {10.1109/TAC.2011.2137490},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tac/GriffinBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/DingankarKBG11,
  author       = {Chinar Dingankar and
                  Sampada Karandikar and
                  Richard R. Brooks and
                  Christopher Griffin},
  title        = {On Bandwidth-Limited Sum-of-Games Problems},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {A}},
  volume       = {41},
  number       = {2},
  pages        = {341--349},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSMCA.2010.2064302},
  doi          = {10.1109/TSMCA.2010.2064302},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/DingankarKBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/SchwierBG11,
  author       = {Jason M. Schwier and
                  Richard R. Brooks and
                  Christopher Griffin},
  title        = {Methods to Window Data to Differentiate Between Markov Models},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {41},
  number       = {3},
  pages        = {650--663},
  year         = {2011},
  url          = {https://doi.org/10.1109/TSMCB.2010.2076325},
  doi          = {10.1109/TSMCB.2010.2076325},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/SchwierBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/LuB11,
  author       = {Chen Lu and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Botnet traffic detection using hidden Markov models},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {31},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179332},
  doi          = {10.1145/2179298.2179332},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/LuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/OzcelikB11,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Security experimentation using operational systems},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {79},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179388},
  doi          = {10.1145/2179298.2179388},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/OzcelikB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/YuB11,
  author       = {Lu Yu and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Observable subspace solution for irreducible POMDPs with infinite
                  horizon},
  booktitle    = {Proceedings of the 7th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14,
                  2011},
  pages        = {83},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2179298.2179392},
  doi          = {10.1145/2179298.2179392},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/YuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/BhanuSCOGB11,
  author       = {Harakrishnan Bhanu and
                  Jason M. Schwier and
                  Ryan Craven and
                  Ilker {\"{O}}z{\c{c}}elik and
                  Christopher Griffin and
                  Richard R. Brooks},
  title        = {Noise tolerant symbolic learning of Markov models of tunneled protocols},
  booktitle    = {Proceedings of the 7th International Wireless Communications and Mobile
                  Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011},
  pages        = {1310--1314},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWCMC.2011.5982729},
  doi          = {10.1109/IWCMC.2011.5982729},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwcmc/BhanuSCOGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuDWBRI10,
  author       = {Mengxia Zhu and
                  Song Ding and
                  Qishi Wu and
                  Richard R. Brooks and
                  Nageswara S. V. Rao and
                  S. Sitharama Iyengar},
  title        = {Fusion of threshold rules for target detection in wireless sensor
                  networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {6},
  number       = {2},
  pages        = {18:1--18:7},
  year         = {2010},
  url          = {https://doi.org/10.1145/1689239.1689248},
  doi          = {10.1145/1689239.1689248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuDWBRI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/CravenABDB10,
  author       = {Ryan Craven and
                  Christopher Abbott and
                  Harikrishnan Bhanu and
                  Juan Deng and
                  Richard R. Brooks},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Orwell was an optimist},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {57},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852729},
  doi          = {10.1145/1852666.1852729},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/CravenABDB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/BrooksD10,
  author       = {Richard R. Brooks and
                  Juan Deng},
  editor       = {Frederick T. Sheldon and
                  Stacy J. Prowell and
                  Robert K. Abercrombie and
                  Axel W. Krings},
  title        = {Lies and the lying liars that tell them: a fair and balanced look
                  at {TLS}},
  booktitle    = {Proceedings of the 6th Cyber Security and Information Intelligence
                  Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23,
                  2010},
  pages        = {59},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1852666.1852732},
  doi          = {10.1145/1852666.1852732},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/BrooksD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BrooksPPW09,
  author       = {Richard R. Brooks and
                  Brijesh Pillai and
                  Matthew Pirretti and
                  Michele C. Weigle},
  title        = {Multicast Encryption Infrastructure for Security in Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {2},
  pages        = {139--157},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320601062114},
  doi          = {10.1080/15501320601062114},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BrooksPPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BrooksS09,
  author       = {Richard R. Brooks and
                  Hemanth Siddulugari},
  title        = {Adaptive Optimizations for Surveillance Sensor Network Longevity},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {2},
  pages        = {158--184},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320601062189},
  doi          = {10.1080/15501320601062189},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BrooksS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/Brooks09,
  author       = {Richard R. Brooks},
  title        = {Sensor Network Self-Organization Using Random Graphs},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {3},
  pages        = {201--208},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320802498307},
  doi          = {10.1080/15501320802498307},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/Brooks09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BrooksGPVK09,
  author       = {Richard R. Brooks and
                  P. Y. Govindaraju and
                  Matthew Pirretti and
                  Narayanan Vijaykrishnan and
                  Mahmut T. Kandemir},
  title        = {Clone Detection in Sensor Networks with \emph{Ad Hoc} and Grid Topologies},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {3},
  pages        = {209--223},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320701863460},
  doi          = {10.1080/15501320701863460},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BrooksGPVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/ZhuB09,
  author       = {Mengxia Zhu and
                  Richard R. Brooks},
  title        = {Comparison of Petri Net and Finite State Machine Discrete Event Control
                  of Distributed Surveillance Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {5},
  number       = {5},
  pages        = {480--501},
  year         = {2009},
  url          = {https://doi.org/10.1080/15501320903048753},
  doi          = {10.1080/15501320903048753},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/ZhuB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/SchwierBGB09,
  author       = {Jason M. Schwier and
                  Richard R. Brooks and
                  Christopher Griffin and
                  Satish T. S. Bukkapatnam},
  title        = {Zero knowledge hidden Markov model inference},
  journal      = {Pattern Recognit. Lett.},
  volume       = {30},
  number       = {14},
  pages        = {1273--1280},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.patrec.2009.06.008},
  doi          = {10.1016/J.PATREC.2009.06.008},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/SchwierBGB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/BrooksSG09,
  author       = {Richard R. Brooks and
                  Jason M. Schwier and
                  Christopher Griffin},
  title        = {Markovian Search Games in Heterogeneous Spaces},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {39},
  number       = {3},
  pages        = {626--635},
  year         = {2009},
  url          = {https://doi.org/10.1109/TSMCB.2008.2007743},
  doi          = {10.1109/TSMCB.2008.2007743},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/BrooksSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/BrooksSG09a,
  author       = {Richard R. Brooks and
                  Jason M. Schwier and
                  Christopher Griffin},
  title        = {Behavior Detection Using Confidence Intervals of Hidden Markov Models},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {39},
  number       = {6},
  pages        = {1484--1492},
  year         = {2009},
  url          = {https://doi.org/10.1109/TSMCB.2009.2019732},
  doi          = {10.1109/TSMCB.2009.2019732},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/BrooksSG09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vtm/BrooksSDT09,
  author       = {Richard R. Brooks and
                  S. Sander and
                  Juan Deng and
                  Joachim Taiber},
  title        = {Automobile security concerns},
  journal      = {{IEEE} Veh. Technol. Mag.},
  volume       = {4},
  number       = {2},
  pages        = {52--64},
  year         = {2009},
  url          = {https://doi.org/10.1109/MVT.2009.932539},
  doi          = {10.1109/MVT.2009.932539},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vtm/BrooksSDT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/IyengarBK08,
  author       = {S. Sitharama Iyengar and
                  Richard R. Brooks and
                  G{\"{u}}nter Karjoth},
  title        = {International Journal of Distributed Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {4},
  number       = {1},
  pages        = {1--3},
  year         = {2008},
  url          = {https://doi.org/10.1080/15501320701810297},
  doi          = {10.1080/15501320701810297},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/IyengarBK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/BrooksPG08,
  author       = {Richard R. Brooks and
                  Jing{-}En Pang and
                  Christopher Griffin},
  title        = {Game and Information Theory Analysis of Electronic Countermeasures
                  in Pursuit-Evasion Games},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {A}},
  volume       = {38},
  number       = {6},
  pages        = {1281--1294},
  year         = {2008},
  url          = {https://doi.org/10.1109/TSMCA.2008.2003970},
  doi          = {10.1109/TSMCA.2008.2003970},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/BrooksPG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcc/0001BS08,
  author       = {Christopher Griffin and
                  Richard R. Brooks and
                  Jason M. Schwier},
  title        = {Determining a purely symbolic transfer function from symbol streams:
                  Theory and algorithms},
  booktitle    = {American Control Conference, {ACC} 2008, Seattle, WA, USA, 11-13 June
                  2008},
  pages        = {4065--4067},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACC.2008.4587129},
  doi          = {10.1109/ACC.2008.4587129},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/amcc/0001BS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/BrooksPWP07,
  author       = {Richard R. Brooks and
                  Brijesh Pillai and
                  Michele C. Weigle and
                  Matthew Pirretti},
  title        = {Optimal Layout of Multicast Groups Using Network Embedded Multicast
                  Security in \emph{Ad Hoc} Sensor Networks},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {3},
  number       = {3},
  pages        = {273--287},
  year         = {2007},
  url          = {https://doi.org/10.1080/15501320601062080},
  doi          = {10.1080/15501320601062080},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/BrooksPWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/BrooksPRR07,
  author       = {Richard R. Brooks and
                  Brijesh Pillai and
                  Stephen A. Racunas and
                  Suresh Rai},
  title        = {Mobile Network Analysis Using Probabilistic Connectivity Matrices},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {37},
  number       = {4},
  pages        = {694--702},
  year         = {2007},
  url          = {https://doi.org/10.1109/TSMCC.2007.897484},
  doi          = {10.1109/TSMCC.2007.897484},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/BrooksPRR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/BrooksGPVK07,
  author       = {Richard R. Brooks and
                  P. Y. Govindaraju and
                  Matthew Pirretti and
                  Narayanan Vijaykrishnan and
                  Mahmut T. Kandemir},
  title        = {On the Detection of Clones in Sensor Networks Using Random Key Predistribution},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {37},
  number       = {6},
  pages        = {1246--1258},
  year         = {2007},
  url          = {https://doi.org/10.1109/TSMCC.2007.905824},
  doi          = {10.1109/TSMCC.2007.905824},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/BrooksGPVK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/NarayananKB07,
  author       = {Sri Hari Krishna Narayanan and
                  Mahmut T. Kandemir and
                  Richard R. Brooks},
  editor       = {Rudy Lauwereins and
                  Jan Madsen},
  title        = {Performance aware secure code partitioning},
  booktitle    = {2007 Design, Automation and Test in Europe Conference and Exposition,
                  {DATE} 2007, Nice, France, April 16-20, 2007},
  pages        = {1122--1127},
  publisher    = {{EDA} Consortium, San Jose, CA, {USA}},
  year         = {2007},
  url          = {https://dl.acm.org/citation.cfm?id=1266609},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/NarayananKB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CarlBR06,
  author       = {Glenn Carl and
                  Richard R. Brooks and
                  Suresh Rai},
  title        = {Wavelet based Denial-of-Service detection},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {8},
  pages        = {600--615},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.08.017},
  doi          = {10.1016/J.COSE.2006.08.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CarlBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BrooksV06,
  author       = {Richard R. Brooks and
                  Christopher N. Vutsinas},
  title        = {Kafka in the academy: a note on ethics in {IA} education},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {4},
  pages        = {50--53},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.96},
  doi          = {10.1109/MSP.2006.96},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BrooksV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/Brooks06,
  author       = {Richard R. Brooks},
  title        = {A Review of: "Wireless Sensor Networks: An Information Processing."},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2},
  number       = {1},
  pages        = {101--102},
  year         = {2006},
  url          = {https://doi.org/10.1080/15501320500354802},
  doi          = {10.1080/15501320500354802},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/Brooks06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/PirrettiZVMKB06,
  author       = {Matthew Pirretti and
                  Sencun Zhu and
                  Narayanan Vijaykrishnan and
                  Patrick D. McDaniel and
                  Mahmut T. Kandemir and
                  Richard R. Brooks},
  title        = {The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods
                  of Defense},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {2},
  number       = {3},
  pages        = {267--287},
  year         = {2006},
  url          = {https://doi.org/10.1080/15501320600642718},
  doi          = {10.1080/15501320600642718},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/PirrettiZVMKB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/CarlKBR06,
  author       = {Glenn Carl and
                  George Kesidis and
                  Richard R. Brooks and
                  Suresh Rai},
  title        = {Denial-of-Service Attack-Detection Techniques},
  journal      = {{IEEE} Internet Comput.},
  volume       = {10},
  number       = {1},
  pages        = {82--89},
  year         = {2006},
  url          = {https://doi.org/10.1109/MIC.2006.5},
  doi          = {10.1109/MIC.2006.5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/CarlKBR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/GriffinB06,
  author       = {Christopher Griffin and
                  Richard R. Brooks},
  title        = {A note on the spread of worms in scale-free networks},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {B}},
  volume       = {36},
  number       = {1},
  pages        = {198--202},
  year         = {2006},
  url          = {https://doi.org/10.1109/TSMCB.2005.854498},
  doi          = {10.1109/TSMCB.2005.854498},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/GriffinB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adaEurope/NarayananKBK06,
  author       = {Sri Hari Krishna Narayanan and
                  Mahmut T. Kandemir and
                  Richard R. Brooks and
                  Ibrahim Kolcu},
  editor       = {Lu{\'{\i}}s Miguel Pinho and
                  Michael Gonz{\'{a}}lez Harbour},
  title        = {Secure Execution of Computations in Untrusted Hosts},
  booktitle    = {Reliable Software Technologies - Ada-Europe 2006, 11th Ada-Europe
                  International Conference on Reliable Software Technologies, Porto,
                  Portugal, June 5-9, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4006},
  pages        = {106--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11767077\_9},
  doi          = {10.1007/11767077\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adaEurope/NarayananKBK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fusion/CerutiDARBSCW06,
  author       = {Marion G. Ceruti and
                  Subrata Das and
                  Adam Ashenfelter and
                  Gary Raven and
                  Richard R. Brooks and
                  Moises Sudit and
                  Genshe Chen and
                  Edward Wright},
  title        = {Pedigree Information for Enhanced Situation and Threat Assessment},
  booktitle    = {9th International Conference on Information Fusion, {FUSION} 2006,
                  Florence, Italy, July 10-13, 2006},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICIF.2006.301797},
  doi          = {10.1109/ICIF.2006.301797},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fusion/CerutiDARBSCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/SwankoskiVBKI05,
  author       = {Eric J. Swankoski and
                  Narayanan Vijaykrishnan and
                  Richard R. Brooks and
                  Mahmut T. Kandemir and
                  Mary Jane Irwin},
  title        = {Symmetric encryption in reconfigurable and custom hardware},
  journal      = {Int. J. Embed. Syst.},
  volume       = {1},
  number       = {3/4},
  pages        = {205--217},
  year         = {2005},
  url          = {https://doi.org/10.1504/IJES.2005.009950},
  doi          = {10.1504/IJES.2005.009950},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/SwankoskiVBKI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cc/LiCKB05,
  author       = {Feihui Li and
                  Guilin Chen and
                  Mahmut T. Kandemir and
                  Richard R. Brooks},
  editor       = {Rastislav Bod{\'{\i}}k},
  title        = {A Compiler-Based Approach to Data Security},
  booktitle    = {Compiler Construction, 14th International Conference, {CC} 2005, Held
                  as Part of the Joint European Conferences on Theory and Practice of
                  Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3443},
  pages        = {188--203},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31985-6\_13},
  doi          = {10.1007/978-3-540-31985-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/cc/LiCKB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/SaputraOVKB05,
  author       = {Hendra Saputra and
                  Ozcan Ozturk and
                  Narayanan Vijaykrishnan and
                  Mahmut T. Kandemir and
                  Richard R. Brooks},
  title        = {A Data-Driven Approach for Embedded Security},
  booktitle    = {2005 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI}
                  2005), New Frontiers in {VLSI} Design, 11-12 May 2005, Tampa, FL,
                  {USA}},
  pages        = {104--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISVLSI.2005.4},
  doi          = {10.1109/ISVLSI.2005.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/SaputraOVKB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/BrooksGP04,
  author       = {Richard R. Brooks and
                  Christopher Griffin and
                  T. Alan Payne},
  title        = {A cellular automata model can quickly approximate {UDP} and {TCP}
                  network traffic},
  journal      = {Complex.},
  volume       = {9},
  number       = {3},
  pages        = {32--40},
  year         = {2004},
  url          = {https://doi.org/10.1002/cplx.10119},
  doi          = {10.1002/CPLX.10119},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/complexity/BrooksGP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Brooks04,
  author       = {Richard R. Brooks},
  title        = {Mobile Code Paradigms and Security Issues},
  journal      = {{IEEE} Internet Comput.},
  volume       = {8},
  number       = {3},
  pages        = {54--59},
  year         = {2004},
  url          = {https://doi.org/10.1109/MIC.2004.1297274},
  doi          = {10.1109/MIC.2004.1297274},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Brooks04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/BrooksK04,
  author       = {Richard R. Brooks and
                  Thomas E. Keiser},
  title        = {Mobile Code Daemons for Networks of Embedded Systems},
  journal      = {{IEEE} Internet Comput.},
  volume       = {8},
  number       = {4},
  pages        = {72--79},
  year         = {2004},
  url          = {https://doi.org/10.1109/MIC.2004.20},
  doi          = {10.1109/MIC.2004.20},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/BrooksK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/IyengarB04,
  author       = {S. Sitharama Iyengar and
                  Richard R. Brooks},
  title        = {Special issue introduction--the road map for distributed sensor networks
                  in the context of computing and communication},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {64},
  number       = {7},
  pages        = {785--787},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jpdc.2004.04.001},
  doi          = {10.1016/J.JPDC.2004.04.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/IyengarB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/BrooksZLI04,
  author       = {Richard R. Brooks and
                  Mengxia Zhu and
                  Jacob Lamb and
                  S. Sitharama Iyengar},
  title        = {Aspect-oriented design of sensor networks},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {64},
  number       = {7},
  pages        = {853--865},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jpdc.2003.12.003},
  doi          = {10.1016/J.JPDC.2003.12.003},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/BrooksZLI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/BrooksFKP04,
  author       = {Richard R. Brooks and
                  David Friedlander and
                  John Koch and
                  Shashi Phoha},
  title        = {Tracking multiple targets with self-organizing distributed ground
                  sensors},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {64},
  number       = {7},
  pages        = {874--884},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jpdc.2003.12.005},
  doi          = {10.1016/J.JPDC.2003.12.005},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/BrooksFKP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/PirrettiLBVKI04,
  author       = {Matthew Pirretti and
                  Greg M. Link and
                  Richard R. Brooks and
                  Narayanan Vijaykrishnan and
                  Mahmut T. Kandemir and
                  Mary Jane Irwin},
  title        = {Fault Tolerant Algorithms for Network-On-Chip Interconnect},
  booktitle    = {2004 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI}
                  2004), Emerging Trends in {VLSI} Systems Design, 19-20 February 2004,
                  Lafayette, LA, {USA}},
  pages        = {46--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ISVLSI.2004.1339507},
  doi          = {10.1109/ISVLSI.2004.1339507},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/PirrettiLBVKI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lctrts/SaputraCBVKI04,
  author       = {Hendra Saputra and
                  Guangyu Chen and
                  Richard R. Brooks and
                  Narayanan Vijaykrishnan and
                  Mahmut T. Kandemir and
                  Mary Jane Irwin},
  editor       = {David B. Whalley and
                  Ron Cytron},
  title        = {Code protection for resource-constrained embedded devices},
  booktitle    = {Proceedings of the 2004 {ACM} {SIGPLAN/SIGBED} Conference on Languages,
                  Compilers, and Tools for Embedded Systems (LCTES'04), Washington,
                  DC, USA, June 11-13, 2004},
  pages        = {240--248},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/997163.997198},
  doi          = {10.1145/997163.997198},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lctrts/SaputraCBVKI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/04/WuRBIZ04,
  author       = {Qishi Wu and
                  Nageswara S. V. Rao and
                  Richard R. Brooks and
                  S. Sitharama Iyengar and
                  Mengxia Zhu},
  editor       = {Mohammad Ilyas and
                  Imad Mahgoub},
  title        = {Computational andNetworking Problemsin Distributed Sensor Networks},
  booktitle    = {Handbook of Sensor Networks},
  publisher    = {{CRC} Press},
  year         = {2004},
  url          = {https://doi.org/10.1201/9780203489635.ch25},
  doi          = {10.1201/9780203489635.CH25},
  timestamp    = {Tue, 21 Mar 2023 20:50:54 +0100},
  biburl       = {https://dblp.org/rec/books/crc/04/WuRBIZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/FriedlanderGJPB03,
  author       = {David Friedlander and
                  Christopher Griffin and
                  Noah Jacobson and
                  Shashi Phoha and
                  Richard R. Brooks},
  title        = {Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic
                  Sensor Network},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2003},
  number       = {4},
  pages        = {371--377},
  year         = {2003},
  url          = {https://doi.org/10.1155/S1110865703212099},
  doi          = {10.1155/S1110865703212099},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejasp/FriedlanderGJPB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZacharyB03,
  author       = {John Zachary and
                  Richard R. Brooks},
  title        = {Bidirectional Mobile Code Trust Management Using Tamper Resistant
                  Hardware},
  journal      = {Mob. Networks Appl.},
  volume       = {8},
  number       = {2},
  pages        = {137--143},
  year         = {2003},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ZacharyB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/BrooksRS03,
  author       = {Richard R. Brooks and
                  Parameswaran Ramanathan and
                  Akbar M. Sayeed},
  title        = {Distributed target classification and tracking in sensor networks},
  journal      = {Proc. {IEEE}},
  volume       = {91},
  number       = {8},
  pages        = {1163--1171},
  year         = {2003},
  url          = {https://doi.org/10.1109/JPROC.2003.814923},
  doi          = {10.1109/JPROC.2003.814923},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/BrooksRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/SaputraVKIBKZ03,
  author       = {Hendra Saputra and
                  Narayanan Vijaykrishnan and
                  Mahmut T. Kandemir and
                  Mary Jane Irwin and
                  Richard R. Brooks and
                  Soontae Kim and
                  Wei Zhang},
  title        = {Masking the Energy Behavior of {DES} Encryption},
  booktitle    = {2003 Design, Automation and Test in Europe Conference and Exposition
                  {(DATE} 2003), 3-7 March 2003, Munich, Germany},
  pages        = {10084--10089},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DATE.2003.10112},
  doi          = {10.1109/DATE.2003.10112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/date/SaputraVKIBKZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PhohaJFB03,
  author       = {Shashi Phoha and
                  Noah Jacobson and
                  David Friedlander and
                  Richard R. Brooks},
  title        = {Sensor network based localization and target tracking through hybridization
                  in the operational domains of beamforming and dynamic space-time clustering},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {2952--2956},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258775},
  doi          = {10.1109/GLOCOM.2003.1258775},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PhohaJFB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/BrooksPZI03,
  author       = {Richard R. Brooks and
                  Matthew Pirretti and
                  Mengxia Zhu and
                  S. Sitharama Iyengar},
  title        = {Distributed adaptation methods for wireless sensor networks},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {2967--2971},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258778},
  doi          = {10.1109/GLOCOM.2003.1258778},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/BrooksPZI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpca/BrooksGF02,
  author       = {Richard R. Brooks and
                  Christopher Griffin and
                  David Friedlander},
  title        = {Self-Organized Distributed Sensor Network Entity Tracking},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {16},
  number       = {3},
  pages        = {207--219},
  year         = {2002},
  url          = {https://doi.org/10.1177/10943420020160030201},
  doi          = {10.1177/10943420020160030201},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhpca/BrooksGF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpca/BrooksG02,
  author       = {Richard R. Brooks and
                  Christopher Griffin},
  title        = {Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms},
  journal      = {Int. J. High Perform. Comput. Appl.},
  volume       = {16},
  number       = {3},
  pages        = {221--234},
  year         = {2002},
  url          = {https://doi.org/10.1177/10943420020160030301},
  doi          = {10.1177/10943420020160030301},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhpca/BrooksG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ChenBIRB02,
  author       = {Ying Chen and
                  Richard R. Brooks and
                  S. Sitharama Iyengar and
                  Nageswara S. V. Rao and
                  Jacob Barhen},
  title        = {Efficient Global Optimization for Image Registration},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {14},
  number       = {1},
  pages        = {79--92},
  year         = {2002},
  url          = {https://doi.org/10.1109/69.979974},
  doi          = {10.1109/69.979974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ChenBIRB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/BrooksO02,
  author       = {Richard R. Brooks and
                  Nathan Orr},
  title        = {A Model for Mobile Code Using Interacting Automata},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {1},
  number       = {4},
  pages        = {313--326},
  year         = {2002},
  url          = {https://doi.org/10.1109/TMC.2002.1175545},
  doi          = {10.1109/TMC.2002.1175545},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/BrooksO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jei/BrooksGI01,
  author       = {Richard R. Brooks and
                  Lynne L. Grewe and
                  S. Sitharama Iyengar},
  title        = {Recognition in the wavelet domain: {A} survey},
  journal      = {J. Electronic Imaging},
  volume       = {10},
  number       = {3},
  pages        = {757--784},
  year         = {2001},
  url          = {https://doi.org/10.1117/1.1381560},
  doi          = {10.1117/1.1381560},
  timestamp    = {Sun, 22 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jei/BrooksGI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dars/BrooksGKMGKK00,
  author       = {Richard R. Brooks and
                  Eric Grele and
                  Wojtek Klimkiewicz and
                  Jamila Moore and
                  Christopher Griffin and
                  Brian Kovak and
                  John Koch},
  editor       = {Lynne E. Parker and
                  George A. Bekey and
                  Jacob Barhen},
  title        = {Reactive Sensor Networks},
  booktitle    = {Distributed Autonomous Robotic Systems 4, Proceedings of the 5th International
                  Symposium on Distributed Autonomous Robotic Systems, {DARS} 2000,
                  October 4-6, 2000, Knoxville, Tennessee, {USA}},
  pages        = {471--472},
  publisher    = {Springer},
  year         = {2000},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dars/BrooksGKMGKK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rsfdgrc/EberbachBP99,
  author       = {Eugene Eberbach and
                  Richard R. Brooks and
                  Shashi Phoha},
  editor       = {Ning Zhong and
                  Andrzej Skowron and
                  Setsuo Ohsuga},
  title        = {Flexible Optimization and Evolution of Underwater Autonomous Agents},
  booktitle    = {New Directions in Rough Sets, Data Mining, and Granular-Soft Computing,
                  7th International Workshop, RSFDGrC '99, Yamaguchi, Japan, November
                  9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1711},
  pages        = {519--527},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48061-7\_64},
  doi          = {10.1007/978-3-540-48061-7\_64},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rsfdgrc/EberbachBP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/BrooksRI97,
  author       = {Richard R. Brooks and
                  Nageswara S. V. Rao and
                  S. Sitharama Iyengar},
  title        = {Resolution of Contradictory Sensor Data},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {3},
  number       = {3},
  pages        = {287--299},
  year         = {1997},
  url          = {https://doi.org/10.1080/10798587.1997.10750709},
  doi          = {10.1080/10798587.1997.10750709},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/BrooksRI97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cira/GreweB97,
  author       = {Lynne L. Grewe and
                  Richard R. Brooks},
  title        = {On localization of objects in the wavelet domain},
  booktitle    = {Proceedings 1997 {IEEE} International Symposium on Computational Intelligence
                  in Robotics and Automation CIRA'97 - Towards New Computational Principles
                  for Robotics and Automation, July 10-11, 1997, Monterey, California,
                  {USA}},
  pages        = {412--418},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CIRA.1997.613889},
  doi          = {10.1109/CIRA.1997.613889},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cira/GreweB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/BrooksIC96,
  author       = {Richard R. Brooks and
                  S. Sitharama Iyengar and
                  Jianhua Chen},
  title        = {Automatic Correlation and Calibration of Noisy Sensor Readings Using
                  Elite Genetic Algorithms},
  journal      = {Artif. Intell.},
  volume       = {84},
  number       = {1-2},
  pages        = {339--354},
  year         = {1996},
  url          = {https://doi.org/10.1016/0004-3702(96)00012-4},
  doi          = {10.1016/0004-3702(96)00012-4},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/BrooksIC96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BrooksI96,
  author       = {Richard R. Brooks and
                  S. Sitharama Iyengar},
  title        = {Robust Distributed Comupting and Sensing Algorithm},
  journal      = {Computer},
  volume       = {29},
  number       = {6},
  pages        = {53--60},
  year         = {1996},
  url          = {https://doi.org/10.1109/2.507632},
  doi          = {10.1109/2.507632},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BrooksI96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics