Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Richard R. Brooks
@article{DBLP:journals/annals/BrooksYOOT22, author = {Richard R. Brooks and Lu Yu and Ilker {\"{O}}z{\c{c}}elik and Jon Oakley and Nathan Tusing}, title = {Distributed Denial of Service (DDoS): {A} History}, journal = {{IEEE} Ann. Hist. Comput.}, volume = {44}, number = {2}, pages = {44--54}, year = {2022}, url = {https://doi.org/10.1109/MAHC.2021.3072582}, doi = {10.1109/MAHC.2021.3072582}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/annals/BrooksYOOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/SunBCT22, author = {Fei Sun and Richard R. Brooks and Gurcan Comert and Nathan Tusing}, title = {Side-Channel Security Analysis of Connected Vehicle Communications Using Hidden Markov Models}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {10}, pages = {17562--17574}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3164779}, doi = {10.1109/TITS.2022.3164779}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/SunBCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssci/ZhongVB22, author = {Xingsi Zhong and Ganesh K. Venayagamoorthy and Richard R. Brooks}, editor = {Hisao Ishibuchi and Chee{-}Keong Kwoh and Ah{-}Hwee Tan and Dipti Srinivasan and Chunyan Miao and Anupam Trivedi and Keeley A. Crockett}, title = {A Virtual Synchrophasor Network for Power System Resiliency Under Concurrent DoS Attacks}, booktitle = {{IEEE} Symposium Series on Computational Intelligence, {SSCI} 2022, Singapore, December 4-7, 2022}, pages = {1342--1349}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SSCI51031.2022.10022104}, doi = {10.1109/SSCI51031.2022.10022104}, timestamp = {Wed, 08 Feb 2023 22:09:16 +0100}, biburl = {https://dblp.org/rec/conf/ssci/ZhongVB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AltarawnehSBHYS21, author = {Amani Altarawneh and Fei Sun and Richard R. Brooks and Oluwakemi Hambolu and Lu Yu and Anthony Skjellum}, title = {Availability analysis of a permissioned blockchain with a lightweight consensus protocol}, journal = {Comput. Secur.}, volume = {102}, pages = {102098}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102098}, doi = {10.1016/J.COSE.2020.102098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AltarawnehSBHYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuFOHB21, author = {Lu Yu and Yu Fu and Jonathan Oakley and Oluwakemi Hambolu and Richard R. Brooks}, title = {On accuracy and anonymity of privacy-preserving negative survey {(NS)} algorithms}, journal = {Comput. Secur.}, volume = {105}, pages = {102206}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102206}, doi = {10.1016/J.COSE.2021.102206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuFOHB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/BlackGBY21, author = {Paul Black and Iqbal Gondal and Richard R. Brooks and Lu Yu}, title = {{AFES:} An Advanced Forensic Evidence System}, booktitle = {25th International Enterprise Distributed Object Computing Workshop, {EDOC} Workshop 2021, Gold Coast, Australia, October 25-29, 2021}, pages = {67--74}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EDOCW52865.2021.00034}, doi = {10.1109/EDOCW52865.2021.00034}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/BlackGBY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-05649, author = {Jon Oakley and Carl R. Worley and Lu Yu and Richard R. Brooks and Ilker {\"{O}}z{\c{c}}elik and Anthony Skjellum and Jihad S. Obeid}, title = {Scrybe: {A} Secure Audit Trail for Clinical Trial Data Fusion}, journal = {CoRR}, volume = {abs/2109.05649}, year = {2021}, url = {https://arxiv.org/abs/2109.05649}, eprinttype = {arXiv}, eprint = {2109.05649}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-05649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OakleyYZVB20, author = {Jonathan Oakley and Lu Yu and Xingsi Zhong and Ganesh Kumar Venayagamoorthy and Richard R. Brooks}, title = {Protocol Proxy: An FTE-based covert channel}, journal = {Comput. Secur.}, volume = {92}, pages = {101777}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101777}, doi = {10.1016/J.COSE.2020.101777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OakleyYZVB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfi/SenRWBT20, author = {Satyabrata Sen and Nageswara S. V. Rao and Chase Q. Wu and Richard R. Brooks and Christopher Temples}, title = {Detecting Low-level Radiation Sources Using Border Monitoring Gamma Sensors}, booktitle = {{IEEE} International Conference on Multisensor Fusion and Integration for Intelligent Systems, {MFI} 2020, Karlsruhe, Germany, September 14-16, 2020}, pages = {342--347}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/MFI49285.2020.9235252}, doi = {10.1109/MFI49285.2020.9235252}, timestamp = {Thu, 05 Nov 2020 11:41:08 +0100}, biburl = {https://dblp.org/rec/conf/mfi/SenRWBT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Worley0BOSAMM20, author = {Carl R. Worley and Lu Yu and Richard R. Brooks and Jon Oakley and Anthony Skjellum and Amani Altarawneh and Sai Medury and Ujan Mukhopadhyay}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Scrybe: {A} Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {51--67}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_4}, doi = {10.1007/978-3-030-38181-3\_4}, timestamp = {Sun, 19 Jul 2020 18:58:53 +0200}, biburl = {https://dblp.org/rec/series/ais/Worley0BOSAMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-10687, author = {Jonathan Oakley and Lu Yu and Xingsi Zhong and Ganesh Kumar Venayagamoorthy and Richard R. Brooks}, title = {Protocol Proxy: An FTE-based Covert Channel}, journal = {CoRR}, volume = {abs/2002.10687}, year = {2020}, url = {https://arxiv.org/abs/2002.10687}, eprinttype = {arXiv}, eprint = {2002.10687}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-10687.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WuBGSRBC19, author = {Chase Qishi Wu and Mark L. Berry and Kayla M. Grieme and Satyabrata Sen and Nageswara S. V. Rao and Richard R. Brooks and Guthrie Cordone}, title = {Network Detection of Radiation Sources Using Localization-Based Approaches}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {4}, pages = {2308--2320}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2891253}, doi = {10.1109/TII.2019.2891253}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/WuBGSRBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/Tusing0B0WB19, author = {Nathan Tusing and Jonathan Oakley and C. Geddings Barrineau and Lu Yu and Kuang{-}Ching Wang and Richard R. Brooks}, title = {Traffic Analysis Resistant Network {(TARN)} Anonymity Analysis}, booktitle = {27th {IEEE} International Conference on Network Protocols, {ICNP} 2019, Chicago, IL, USA, October 8-10, 2019}, pages = {1--2}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICNP.2019.8888134}, doi = {10.1109/ICNP.2019.8888134}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnp/Tusing0B0WB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-07020, author = {Lu Yu and Oluwakemi Hambolu and Yu Fu and Jon Oakley and Richard R. Brooks}, title = {Privacy Preserving Count Statistics}, journal = {CoRR}, volume = {abs/1910.07020}, year = {2019}, url = {http://arxiv.org/abs/1910.07020}, eprinttype = {arXiv}, eprint = {1910.07020}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-07020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BrooksYFHGOYB18, author = {Richard R. Brooks and Lu Yu and Yu Fu and Oluwakemi Hambolu and John Gaynard and Julie Owono and Archippe Yepmou and Felix Blanc}, title = {Internet freedom in West Africa: technical support for journalists and democracy advocates}, journal = {Commun. {ACM}}, volume = {61}, number = {5}, pages = {72--82}, year = {2018}, url = {https://doi.org/10.1145/3199477}, doi = {10.1145/3199477}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/BrooksYFHGOYB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/BediVSBW18, author = {Guneet Bedi and Ganesh Kumar Venayagamoorthy and Rajendra Singh and Richard R. Brooks and Kuang{-}Ching Wang}, title = {Review of Internet of Things (IoT) in Electric Power and Energy Systems}, journal = {{IEEE} Internet Things J.}, volume = {5}, number = {2}, pages = {847--870}, year = {2018}, url = {https://doi.org/10.1109/JIOT.2018.2802704}, doi = {10.1109/JIOT.2018.2802704}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/BediVSBW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/WangBB0YW18, author = {Kuang{-}Ching Wang and Richard R. Brooks and C. Geddings Barrineau and Jonathan Oakley and Lu Yu and Qing Wang}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Internet Security Liberated via Software Defined Exchanges}, booktitle = {Proceedings of the 2018 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {19--22}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180465.3180475}, doi = {10.1145/3180465.3180475}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/WangBB0YW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiZYOHB18, author = {Hongda Li and Fuqiang Zhang and Lu Yu and Jon Oakley and Hongxin Hu and Richard R. Brooks}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {Towards Efficient Traffic Monitoring for Science {DMZ} with Side-Channel based Traffic Winnowing}, booktitle = {Proceedings of the 2018 {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {55--58}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180465.3180474}, doi = {10.1145/3180465.3180474}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LiZYOHB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/WuLSRBC18, author = {Chase Q. Wu and Wuji Liu and Satyabrata Sen and Nageswara S. V. Rao and Richard R. Brooks and Guthrie Cordone}, title = {Two-Level Clustering-Based Target Detection Through Sensor Deployment and Data Fusion}, booktitle = {21st International Conference on Information Fusion, {FUSION} 2018, Cambridge, UK, July 10-13, 2018}, pages = {2376--2383}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ICIF.2018.8455623}, doi = {10.23919/ICIF.2018.8455623}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/WuLSRBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/MedurySB018, author = {Sai Medury and Anthony Skjellum and Richard R. Brooks and Lu Yu}, title = {SCRaaPS: {X.509} Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {145--152}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659364}, doi = {10.1109/MALWARE.2018.8659364}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/MedurySB018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/OakleyW0BS18, author = {Jonathan Oakley and Carl R. Worley and Lu Yu and Richard R. Brooks and Anthony Skjellum}, title = {Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {161--166}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659357}, doi = {10.1109/MALWARE.2018.8659357}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/OakleyW0BS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-09886, author = {Jay Aikat and Ilya Baldin and Mark Berman and Joe Breen and Richard R. Brooks and Prasad Calyam and Jeffrey S. Chase and Wallace Chase and Russ Clark and Chip Elliott and Jim Griffioen and Dijiang Huang and Julio Ibarra and Tom Lehman and Inder Monga and Abraham Matta and Christos Papadopoulos and Mike Reiter and Dipankar Raychaudhuri and Glenn Ricart and Robert Ricci and Paul Ruth and Ivan Seskar and Jerry Sobieski and Kobus van der Merwe and Kuang{-}Ching Wang and Tilman Wolf and Michael Zink}, title = {The Future of {CISE} Distributed Research Infrastructure}, journal = {CoRR}, volume = {abs/1803.09886}, year = {2018}, url = {http://arxiv.org/abs/1803.09886}, eprinttype = {arXiv}, eprint = {1803.09886}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-09886.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetci/ZhongJVB17, author = {Xingsi Zhong and Iroshani Jayawardene and Ganesh Kumar Venayagamoorthy and Richard R. Brooks}, title = {Denial of Service Attack on Tie-Line Bias Control in a Power System With {PV} Plant}, journal = {{IEEE} Trans. Emerg. Top. Comput. Intell.}, volume = {1}, number = {5}, pages = {375--390}, year = {2017}, url = {https://doi.org/10.1109/TETCI.2017.2739838}, doi = {10.1109/TETCI.2017.2739838}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetci/ZhongJVB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuYHOHSSDBB17, author = {Yu Fu and Lu Yu and Oluwakemi Hambolu and Ilker {\"{O}}z{\c{c}}elik and Benafsh Husain and Jingxuan Sun and Karan Sapra and Dan Du and Christopher Tate Beasley and Richard R. Brooks}, title = {Stealthy Domain Generation Algorithms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1430--1443}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2668361}, doi = {10.1109/TIFS.2017.2668361}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FuYHOHSSDBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/CordoneBSRWBG17, author = {Guthrie Cordone and Richard R. Brooks and Satyabrata Sen and Nageswara S. V. Rao and Chase Q. Wu and Mark L. Berry and Kayla M. Grieme}, title = {Improved multi-resolution method for MLE-based localization of radiation sources}, booktitle = {20th International Conference on Information Fusion, {FUSION} 2017, Xi'an, China, July 10-13, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICIF.2017.8009626}, doi = {10.23919/ICIF.2017.8009626}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/CordoneBSRWBG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/YuWBOBW17, author = {Lu Yu and Qing Wang and C. Geddings Barrineau and Jon Oakley and Richard R. Brooks and Kuang{-}Ching Wang}, title = {{TARN:} {A} SDN-based traffic analysis resistant network architecture}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323961}, doi = {10.1109/MALWARE.2017.8323961}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/malware/YuWBOBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ZhongFYB17, author = {Xingsi Zhong and Yu Fu and Lu Yu and Richard R. Brooks}, title = {Stealthy Malware Traffic - Not as Innocent as It Looks}, journal = {CoRR}, volume = {abs/1703.02200}, year = {2017}, url = {http://arxiv.org/abs/1703.02200}, eprinttype = {arXiv}, eprint = {1703.02200}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ZhongFYB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FuJYZB17, author = {Yu Fu and Zhe Jia and Lu Yu and Xingsi Zhong and Richard R. Brooks}, title = {A Covert Data Transport Protocol}, journal = {CoRR}, volume = {abs/1703.02201}, year = {2017}, url = {http://arxiv.org/abs/1703.02201}, eprinttype = {arXiv}, eprint = {1703.02201}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FuJYZB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HamboluYOBMS17, author = {Oluwakemi Hambolu and Lu Yu and Jon Oakley and Richard R. Brooks and Ujan Mukhopadhyay and Anthony Skjellum}, title = {Provenance Threat Modeling}, journal = {CoRR}, volume = {abs/1703.03835}, year = {2017}, url = {http://arxiv.org/abs/1703.03835}, eprinttype = {arXiv}, eprint = {1703.03835}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HamboluYOBMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-00782, author = {Lu Yu and Qing Wang and C. Geddings Barrineau and Jon Oakley and Richard R. Brooks and Kuang{-}Ching Wang}, title = {{TARN:} {A} SDN-based Traffic Analysis Resistant Network Architecture}, journal = {CoRR}, volume = {abs/1709.00782}, year = {2017}, url = {http://arxiv.org/abs/1709.00782}, eprinttype = {arXiv}, eprint = {1709.00782}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-00782.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-07567, author = {Lu Yu and Richard R. Brooks}, title = {Stochastic Tools for Network Intrusion Detection}, journal = {CoRR}, volume = {abs/1709.07567}, year = {2017}, url = {http://arxiv.org/abs/1709.07567}, eprinttype = {arXiv}, eprint = {1709.07567}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-07567.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-07573, author = {Richard R. Brooks and Lu Yu and Yu Fu and Guthrie Cordone and Jon Oakley and Xingsi Zhong}, title = {Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data}, journal = {CoRR}, volume = {abs/1709.07573}, year = {2017}, url = {http://arxiv.org/abs/1709.07573}, eprinttype = {arXiv}, eprint = {1709.07573}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-07573.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/AoWYBI16, author = {Buke Ao and Yongcai Wang and Lu Yu and Richard R. Brooks and S. S. Iyengar}, title = {On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms}, journal = {{ACM} Comput. Surv.}, volume = {49}, number = {1}, pages = {5:1--5:23}, year = {2016}, url = {https://doi.org/10.1145/2898984}, doi = {10.1145/2898984}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/AoWYBI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/SenRWBGBC16, author = {Satyabrata Sen and Nageswara S. V. Rao and Chase Q. Wu and Mark L. Berry and Kayla M. Grieme and Richard R. Brooks and Guthrie Cordone}, title = {Performance analysis of Wald-statistic based network detection methods for radiation sources}, booktitle = {19th International Conference on Information Fusion, {FUSION} 2016, Heidelberg, Germany, July 5-8, 2016}, pages = {820--827}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7527971/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/SenRWBGBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/FuJYZB16, author = {Yu Fu and Zhe Jia and Lu Yu and Xingsi Zhong and Richard R. Brooks}, title = {A covert data transport protocol}, booktitle = {11th International Conference on Malicious and Unwanted Software, {MALWARE} 2016, Fajardo, PR, USA, October 18-21, 2016}, pages = {93--100}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/MALWARE.2016.7888734}, doi = {10.1109/MALWARE.2016.7888734}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/FuJYZB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfi/WuBGSRBC16, author = {Chase Q. Wu and Mark L. Berry and Kayla M. Grieme and Satyabrata Sen and Nageswara S. V. Rao and Richard R. Brooks and Guthrie Cordone}, title = {A source-attractor approach to network detection of radiation sources}, booktitle = {2016 {IEEE} International Conference on Multisensor Fusion and Integration for Intelligent Systems, {MFI} 2016, Baden-Baden, Germany, September 19-21, 2016}, pages = {394--399}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/MFI.2016.7849520}, doi = {10.1109/MFI.2016.7849520}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfi/WuBGSRBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/HamboluYOBMS16, author = {Oluwakemi Hambolu and Lu Yu and Jon Oakley and Richard R. Brooks and Ujan Mukhopadhyay and Anthony Skjellum}, title = {Provenance threat modeling}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {384--387}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906960}, doi = {10.1109/PST.2016.7906960}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/HamboluYOBMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/MukhopadhyaySHO16, author = {Ujan Mukhopadhyay and Anthony Skjellum and Oluwakemi Hambolu and Jon Oakley and Lu Yu and Richard R. Brooks}, title = {A brief survey of Cryptocurrency systems}, booktitle = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016, Auckland, New Zealand, December 12-14, 2016}, pages = {745--752}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/PST.2016.7906988}, doi = {10.1109/PST.2016.7906988}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/MukhopadhyaySHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OzcelikB15, author = {Ilker {\"{O}}z{\c{c}}elik and Richard R. Brooks}, title = {Deceiving entropy based DoS detection}, journal = {Comput. Secur.}, volume = {48}, pages = {234--245}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.013}, doi = {10.1016/J.COSE.2014.10.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OzcelikB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZhongAABV15, author = {Xingsi Zhong and Paranietharan Arunagirinathan and Afshin Ahmadi and Richard R. Brooks and Ganesh Kumar Venayagamoorthy}, editor = {Joseph P. Trien and Stacy J. Prowell and Robert A. Bridges and John R. Goodall}, title = {Side-Channels in Electric Power Synchrophasor Network Data Traffic}, booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015}, pages = {3:1--3:8}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746266.2746269}, doi = {10.1145/2746266.2746269}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/ZhongAABV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/DuYB15, author = {Dan Du and Lu Yu and Richard R. Brooks}, editor = {Joseph P. Trien and Stacy J. Prowell and Robert A. Bridges and John R. Goodall}, title = {Semantic Similarity Detection For Data Leak Prevention}, booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015}, pages = {4:1--4:6}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746266.2746270}, doi = {10.1145/2746266.2746270}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/DuYB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/FuHB15, author = {Yu Fu and Benafsh Husain and Richard R. Brooks}, editor = {Joseph P. Trien and Stacy J. Prowell and Robert A. Bridges and John R. Goodall}, title = {Analysis of Botnet Counter-Counter-Measures}, booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015}, pages = {9:1--9:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746266.2746275}, doi = {10.1145/2746266.2746275}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/FuHB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YuDBY15, author = {Lu Yu and Juan Deng and Richard R. Brooks and SeokBae Yun}, editor = {Joseph P. Trien and Stacy J. Prowell and Robert A. Bridges and John R. Goodall}, title = {Automobile {ECU} Design to Avoid Data Tampering}, booktitle = {Proceedings of the 10th Annual Cyber and Information Security Research Conference, {CISR} '15, Oak Ridge, TN, USA, April 7-9, 2015}, pages = {10:1--10:4}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746266.2746276}, doi = {10.1145/2746266.2746276}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/YuDBY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/ZhongFYBV15, author = {Xingsi Zhong and Yu Fu and Lu Yu and Richard R. Brooks and Ganesh Kumar Venayagamoorthy}, title = {Stealthy malware traffic - Not as innocent as it looks}, booktitle = {10th International Conference on Malicious and Unwanted Software, {MALWARE} 2015, Fajardo, PR, USA, October 20-22, 2015}, pages = {110--116}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/MALWARE.2015.7413691}, doi = {10.1109/MALWARE.2015.7413691}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/ZhongFYBV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/LuSCYBG13, author = {Chen Lu and Jason M. Schwier and Ryan Craven and Lu Yu and Richard R. Brooks and Christopher Griffin}, title = {A Normalized Statistical Metric Space for Hidden Markov Models}, journal = {{IEEE} Trans. Cybern.}, volume = {43}, number = {3}, pages = {806--819}, year = {2013}, url = {https://doi.org/10.1109/TSMCB.2012.2216872}, doi = {10.1109/TSMCB.2012.2216872}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcyb/LuSCYBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/YuSCBG13, author = {Lu Yu and Jason M. Schwier and Ryan Craven and Richard R. Brooks and Christopher Griffin}, title = {Inferring Statistically Significant Hidden Markov Models}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {25}, number = {7}, pages = {1548--1558}, year = {2013}, url = {https://doi.org/10.1109/TKDE.2012.93}, doi = {10.1109/TKDE.2012.93}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/YuSCBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BrooksHYD13, author = {Richard R. Brooks and Benafsh Husain and SeokBae Yun and Juan Deng}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Security and performance evaluation of security protocols}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2459979}, doi = {10.1145/2459976.2459979}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BrooksHYD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LuB13, author = {Chen Lu and Richard R. Brooks}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Timing analysis in {P2P} botnet traffic using probabilistic context-free grammars}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2459992}, doi = {10.1145/2459976.2459992}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/LuB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CameronBD13, author = {Katherine C. Cameron and Richard R. Brooks and Juan Deng}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Cost-effective quality assurance of wireless network security}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {15}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2459993}, doi = {10.1145/2459976.2459993}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/CameronBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/ZhaoB13, author = {Lianyu Zhao and Richard R. Brooks}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Tailoring trusted semantic information}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {17}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2459995}, doi = {10.1145/2459976.2459995}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/ZhaoB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YuB13, author = {Lu Yu and Richard R. Brooks}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Applying {POMDP} to moving target optimization}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {49}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2460032}, doi = {10.1145/2459976.2460032}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/YuB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BrooksHMFB13, author = {Richard R. Brooks and Oluwakemi Hambolu and Paul Marusich and Yu Fu and Saiprasad Balachandran}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Creating a tailored trustworthy space for democracy advocates using hostile host}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {50}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2460033}, doi = {10.1145/2459976.2460033}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BrooksHMFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OzcelikB13, author = {Ilker {\"{O}}z{\c{c}}elik and Richard R. Brooks}, editor = {Frederick T. Sheldon and Annarita Giani and Axel W. Krings and Robert K. Abercrombie}, title = {Operational system testing for designed in security}, booktitle = {Cyber Security and Information Intelligence, {CSIIRW} '13, Oak Ridge, TN, USA, January 8-10, 2013}, pages = {55}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2459976.2460038}, doi = {10.1145/2459976.2460038}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/OzcelikB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gree/OzcelikFB13, author = {Ilker {\"{O}}z{\c{c}}elik and Yu Fu and Richard R. Brooks}, title = {DoS Detection is Easier Now}, booktitle = {2013 Second {GENI} Research and Educational Experiment Workshop, Salt Lake City, UT, USA, March 20-22, 2013}, pages = {50--55}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/GREE.2013.18}, doi = {10.1109/GREE.2013.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gree/OzcelikFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/SapraHBS13, author = {Karan Sapra and Benafsh Husain and Richard R. Brooks and Melissa C. Smith}, title = {Circumventing keyloggers and screendumps}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {103--108}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703691}, doi = {10.1109/MALWARE.2013.6703691}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/SapraHBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ait/BhanuSCBHGG11, author = {Harakrishnan Bhanu and Jason M. Schwier and Ryan Craven and Richard R. Brooks and Kathryn Hempstalk and Daniele Gunetti and Christopher Griffin}, title = {Side-Channel Analysis for Detecting Protocol Tunneling}, journal = {Adv. Internet Things}, volume = {1}, number = {2}, pages = {13--26}, year = {2011}, url = {https://doi.org/10.4236/ait.2011.12003}, doi = {10.4236/AIT.2011.12003}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ait/BhanuSCBHGG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tac/GriffinBS11, author = {Christopher Griffin and Richard R. Brooks and Jason M. Schwier}, title = {A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set}, journal = {{IEEE} Trans. Autom. Control.}, volume = {56}, number = {8}, pages = {1926--1931}, year = {2011}, url = {https://doi.org/10.1109/TAC.2011.2137490}, doi = {10.1109/TAC.2011.2137490}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tac/GriffinBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/DingankarKBG11, author = {Chinar Dingankar and Sampada Karandikar and Richard R. Brooks and Christopher Griffin}, title = {On Bandwidth-Limited Sum-of-Games Problems}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {A}}, volume = {41}, number = {2}, pages = {341--349}, year = {2011}, url = {https://doi.org/10.1109/TSMCA.2010.2064302}, doi = {10.1109/TSMCA.2010.2064302}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/DingankarKBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/SchwierBG11, author = {Jason M. Schwier and Richard R. Brooks and Christopher Griffin}, title = {Methods to Window Data to Differentiate Between Markov Models}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {41}, number = {3}, pages = {650--663}, year = {2011}, url = {https://doi.org/10.1109/TSMCB.2010.2076325}, doi = {10.1109/TSMCB.2010.2076325}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/SchwierBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/LuB11, author = {Chen Lu and Richard R. Brooks}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Botnet traffic detection using hidden Markov models}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {31}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179332}, doi = {10.1145/2179298.2179332}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/LuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/OzcelikB11, author = {Ilker {\"{O}}z{\c{c}}elik and Richard R. Brooks}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Security experimentation using operational systems}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {79}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179388}, doi = {10.1145/2179298.2179388}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/OzcelikB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/YuB11, author = {Lu Yu and Richard R. Brooks}, editor = {Frederick T. Sheldon and Robert K. Abercrombie and Axel W. Krings}, title = {Observable subspace solution for irreducible POMDPs with infinite horizon}, booktitle = {Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2011, Oak Ridge, TN, USA, October 12-14, 2011}, pages = {83}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2179298.2179392}, doi = {10.1145/2179298.2179392}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/YuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/BhanuSCOGB11, author = {Harakrishnan Bhanu and Jason M. Schwier and Ryan Craven and Ilker {\"{O}}z{\c{c}}elik and Christopher Griffin and Richard R. Brooks}, title = {Noise tolerant symbolic learning of Markov models of tunneled protocols}, booktitle = {Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011}, pages = {1310--1314}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWCMC.2011.5982729}, doi = {10.1109/IWCMC.2011.5982729}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwcmc/BhanuSCOGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuDWBRI10, author = {Mengxia Zhu and Song Ding and Qishi Wu and Richard R. Brooks and Nageswara S. V. Rao and S. Sitharama Iyengar}, title = {Fusion of threshold rules for target detection in wireless sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {6}, number = {2}, pages = {18:1--18:7}, year = {2010}, url = {https://doi.org/10.1145/1689239.1689248}, doi = {10.1145/1689239.1689248}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ZhuDWBRI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/CravenABDB10, author = {Ryan Craven and Christopher Abbott and Harikrishnan Bhanu and Juan Deng and Richard R. Brooks}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Orwell was an optimist}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {57}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852729}, doi = {10.1145/1852666.1852729}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/CravenABDB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/BrooksD10, author = {Richard R. Brooks and Juan Deng}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {Lies and the lying liars that tell them: a fair and balanced look at {TLS}}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {59}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852732}, doi = {10.1145/1852666.1852732}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/BrooksD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BrooksPPW09, author = {Richard R. Brooks and Brijesh Pillai and Matthew Pirretti and Michele C. Weigle}, title = {Multicast Encryption Infrastructure for Security in Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {2}, pages = {139--157}, year = {2009}, url = {https://doi.org/10.1080/15501320601062114}, doi = {10.1080/15501320601062114}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BrooksPPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BrooksS09, author = {Richard R. Brooks and Hemanth Siddulugari}, title = {Adaptive Optimizations for Surveillance Sensor Network Longevity}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {2}, pages = {158--184}, year = {2009}, url = {https://doi.org/10.1080/15501320601062189}, doi = {10.1080/15501320601062189}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BrooksS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/Brooks09, author = {Richard R. Brooks}, title = {Sensor Network Self-Organization Using Random Graphs}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {3}, pages = {201--208}, year = {2009}, url = {https://doi.org/10.1080/15501320802498307}, doi = {10.1080/15501320802498307}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/Brooks09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BrooksGPVK09, author = {Richard R. Brooks and P. Y. Govindaraju and Matthew Pirretti and Narayanan Vijaykrishnan and Mahmut T. Kandemir}, title = {Clone Detection in Sensor Networks with \emph{Ad Hoc} and Grid Topologies}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {3}, pages = {209--223}, year = {2009}, url = {https://doi.org/10.1080/15501320701863460}, doi = {10.1080/15501320701863460}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BrooksGPVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/ZhuB09, author = {Mengxia Zhu and Richard R. Brooks}, title = {Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {5}, number = {5}, pages = {480--501}, year = {2009}, url = {https://doi.org/10.1080/15501320903048753}, doi = {10.1080/15501320903048753}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/ZhuB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/SchwierBGB09, author = {Jason M. Schwier and Richard R. Brooks and Christopher Griffin and Satish T. S. Bukkapatnam}, title = {Zero knowledge hidden Markov model inference}, journal = {Pattern Recognit. Lett.}, volume = {30}, number = {14}, pages = {1273--1280}, year = {2009}, url = {https://doi.org/10.1016/j.patrec.2009.06.008}, doi = {10.1016/J.PATREC.2009.06.008}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/SchwierBGB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/BrooksSG09, author = {Richard R. Brooks and Jason M. Schwier and Christopher Griffin}, title = {Markovian Search Games in Heterogeneous Spaces}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {39}, number = {3}, pages = {626--635}, year = {2009}, url = {https://doi.org/10.1109/TSMCB.2008.2007743}, doi = {10.1109/TSMCB.2008.2007743}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/BrooksSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/BrooksSG09a, author = {Richard R. Brooks and Jason M. Schwier and Christopher Griffin}, title = {Behavior Detection Using Confidence Intervals of Hidden Markov Models}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {39}, number = {6}, pages = {1484--1492}, year = {2009}, url = {https://doi.org/10.1109/TSMCB.2009.2019732}, doi = {10.1109/TSMCB.2009.2019732}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/BrooksSG09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vtm/BrooksSDT09, author = {Richard R. Brooks and S. Sander and Juan Deng and Joachim Taiber}, title = {Automobile security concerns}, journal = {{IEEE} Veh. Technol. Mag.}, volume = {4}, number = {2}, pages = {52--64}, year = {2009}, url = {https://doi.org/10.1109/MVT.2009.932539}, doi = {10.1109/MVT.2009.932539}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vtm/BrooksSDT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/IyengarBK08, author = {S. Sitharama Iyengar and Richard R. Brooks and G{\"{u}}nter Karjoth}, title = {International Journal of Distributed Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {4}, number = {1}, pages = {1--3}, year = {2008}, url = {https://doi.org/10.1080/15501320701810297}, doi = {10.1080/15501320701810297}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/IyengarBK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/BrooksPG08, author = {Richard R. Brooks and Jing{-}En Pang and Christopher Griffin}, title = {Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {A}}, volume = {38}, number = {6}, pages = {1281--1294}, year = {2008}, url = {https://doi.org/10.1109/TSMCA.2008.2003970}, doi = {10.1109/TSMCA.2008.2003970}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/BrooksPG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/0001BS08, author = {Christopher Griffin and Richard R. Brooks and Jason M. Schwier}, title = {Determining a purely symbolic transfer function from symbol streams: Theory and algorithms}, booktitle = {American Control Conference, {ACC} 2008, Seattle, WA, USA, 11-13 June 2008}, pages = {4065--4067}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ACC.2008.4587129}, doi = {10.1109/ACC.2008.4587129}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcc/0001BS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/BrooksPWP07, author = {Richard R. Brooks and Brijesh Pillai and Michele C. Weigle and Matthew Pirretti}, title = {Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in \emph{Ad Hoc} Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {3}, number = {3}, pages = {273--287}, year = {2007}, url = {https://doi.org/10.1080/15501320601062080}, doi = {10.1080/15501320601062080}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/BrooksPWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/BrooksPRR07, author = {Richard R. Brooks and Brijesh Pillai and Stephen A. Racunas and Suresh Rai}, title = {Mobile Network Analysis Using Probabilistic Connectivity Matrices}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {37}, number = {4}, pages = {694--702}, year = {2007}, url = {https://doi.org/10.1109/TSMCC.2007.897484}, doi = {10.1109/TSMCC.2007.897484}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/BrooksPRR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/BrooksGPVK07, author = {Richard R. Brooks and P. Y. Govindaraju and Matthew Pirretti and Narayanan Vijaykrishnan and Mahmut T. Kandemir}, title = {On the Detection of Clones in Sensor Networks Using Random Key Predistribution}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {37}, number = {6}, pages = {1246--1258}, year = {2007}, url = {https://doi.org/10.1109/TSMCC.2007.905824}, doi = {10.1109/TSMCC.2007.905824}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/BrooksGPVK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/NarayananKB07, author = {Sri Hari Krishna Narayanan and Mahmut T. Kandemir and Richard R. Brooks}, editor = {Rudy Lauwereins and Jan Madsen}, title = {Performance aware secure code partitioning}, booktitle = {2007 Design, Automation and Test in Europe Conference and Exposition, {DATE} 2007, Nice, France, April 16-20, 2007}, pages = {1122--1127}, publisher = {{EDA} Consortium, San Jose, CA, {USA}}, year = {2007}, url = {https://dl.acm.org/citation.cfm?id=1266609}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/NarayananKB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CarlBR06, author = {Glenn Carl and Richard R. Brooks and Suresh Rai}, title = {Wavelet based Denial-of-Service detection}, journal = {Comput. Secur.}, volume = {25}, number = {8}, pages = {600--615}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.08.017}, doi = {10.1016/J.COSE.2006.08.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CarlBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BrooksV06, author = {Richard R. Brooks and Christopher N. Vutsinas}, title = {Kafka in the academy: a note on ethics in {IA} education}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {4}, pages = {50--53}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.96}, doi = {10.1109/MSP.2006.96}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BrooksV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/Brooks06, author = {Richard R. Brooks}, title = {A Review of: "Wireless Sensor Networks: An Information Processing."}, journal = {Int. J. Distributed Sens. Networks}, volume = {2}, number = {1}, pages = {101--102}, year = {2006}, url = {https://doi.org/10.1080/15501320500354802}, doi = {10.1080/15501320500354802}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/Brooks06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/PirrettiZVMKB06, author = {Matthew Pirretti and Sencun Zhu and Narayanan Vijaykrishnan and Patrick D. McDaniel and Mahmut T. Kandemir and Richard R. Brooks}, title = {The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense}, journal = {Int. J. Distributed Sens. Networks}, volume = {2}, number = {3}, pages = {267--287}, year = {2006}, url = {https://doi.org/10.1080/15501320600642718}, doi = {10.1080/15501320600642718}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/PirrettiZVMKB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/CarlKBR06, author = {Glenn Carl and George Kesidis and Richard R. Brooks and Suresh Rai}, title = {Denial-of-Service Attack-Detection Techniques}, journal = {{IEEE} Internet Comput.}, volume = {10}, number = {1}, pages = {82--89}, year = {2006}, url = {https://doi.org/10.1109/MIC.2006.5}, doi = {10.1109/MIC.2006.5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/CarlKBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/GriffinB06, author = {Christopher Griffin and Richard R. Brooks}, title = {A note on the spread of worms in scale-free networks}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {B}}, volume = {36}, number = {1}, pages = {198--202}, year = {2006}, url = {https://doi.org/10.1109/TSMCB.2005.854498}, doi = {10.1109/TSMCB.2005.854498}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsmc/GriffinB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adaEurope/NarayananKBK06, author = {Sri Hari Krishna Narayanan and Mahmut T. Kandemir and Richard R. Brooks and Ibrahim Kolcu}, editor = {Lu{\'{\i}}s Miguel Pinho and Michael Gonz{\'{a}}lez Harbour}, title = {Secure Execution of Computations in Untrusted Hosts}, booktitle = {Reliable Software Technologies - Ada-Europe 2006, 11th Ada-Europe International Conference on Reliable Software Technologies, Porto, Portugal, June 5-9, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4006}, pages = {106--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11767077\_9}, doi = {10.1007/11767077\_9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adaEurope/NarayananKBK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fusion/CerutiDARBSCW06, author = {Marion G. Ceruti and Subrata Das and Adam Ashenfelter and Gary Raven and Richard R. Brooks and Moises Sudit and Genshe Chen and Edward Wright}, title = {Pedigree Information for Enhanced Situation and Threat Assessment}, booktitle = {9th International Conference on Information Fusion, {FUSION} 2006, Florence, Italy, July 10-13, 2006}, pages = {1--8}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICIF.2006.301797}, doi = {10.1109/ICIF.2006.301797}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fusion/CerutiDARBSCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/SwankoskiVBKI05, author = {Eric J. Swankoski and Narayanan Vijaykrishnan and Richard R. Brooks and Mahmut T. Kandemir and Mary Jane Irwin}, title = {Symmetric encryption in reconfigurable and custom hardware}, journal = {Int. J. Embed. Syst.}, volume = {1}, number = {3/4}, pages = {205--217}, year = {2005}, url = {https://doi.org/10.1504/IJES.2005.009950}, doi = {10.1504/IJES.2005.009950}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/SwankoskiVBKI05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cc/LiCKB05, author = {Feihui Li and Guilin Chen and Mahmut T. Kandemir and Richard R. Brooks}, editor = {Rastislav Bod{\'{\i}}k}, title = {A Compiler-Based Approach to Data Security}, booktitle = {Compiler Construction, 14th International Conference, {CC} 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2005, Edinburgh, UK, April 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3443}, pages = {188--203}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31985-6\_13}, doi = {10.1007/978-3-540-31985-6\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/cc/LiCKB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/SaputraOVKB05, author = {Hendra Saputra and Ozcan Ozturk and Narayanan Vijaykrishnan and Mahmut T. Kandemir and Richard R. Brooks}, title = {A Data-Driven Approach for Embedded Security}, booktitle = {2005 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI} 2005), New Frontiers in {VLSI} Design, 11-12 May 2005, Tampa, FL, {USA}}, pages = {104--109}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ISVLSI.2005.4}, doi = {10.1109/ISVLSI.2005.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/SaputraOVKB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/BrooksGP04, author = {Richard R. Brooks and Christopher Griffin and T. Alan Payne}, title = {A cellular automata model can quickly approximate {UDP} and {TCP} network traffic}, journal = {Complex.}, volume = {9}, number = {3}, pages = {32--40}, year = {2004}, url = {https://doi.org/10.1002/cplx.10119}, doi = {10.1002/CPLX.10119}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/complexity/BrooksGP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Brooks04, author = {Richard R. Brooks}, title = {Mobile Code Paradigms and Security Issues}, journal = {{IEEE} Internet Comput.}, volume = {8}, number = {3}, pages = {54--59}, year = {2004}, url = {https://doi.org/10.1109/MIC.2004.1297274}, doi = {10.1109/MIC.2004.1297274}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Brooks04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/BrooksK04, author = {Richard R. Brooks and Thomas E. Keiser}, title = {Mobile Code Daemons for Networks of Embedded Systems}, journal = {{IEEE} Internet Comput.}, volume = {8}, number = {4}, pages = {72--79}, year = {2004}, url = {https://doi.org/10.1109/MIC.2004.20}, doi = {10.1109/MIC.2004.20}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/BrooksK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/IyengarB04, author = {S. Sitharama Iyengar and Richard R. Brooks}, title = {Special issue introduction--the road map for distributed sensor networks in the context of computing and communication}, journal = {J. Parallel Distributed Comput.}, volume = {64}, number = {7}, pages = {785--787}, year = {2004}, url = {https://doi.org/10.1016/j.jpdc.2004.04.001}, doi = {10.1016/J.JPDC.2004.04.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/IyengarB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/BrooksZLI04, author = {Richard R. Brooks and Mengxia Zhu and Jacob Lamb and S. Sitharama Iyengar}, title = {Aspect-oriented design of sensor networks}, journal = {J. Parallel Distributed Comput.}, volume = {64}, number = {7}, pages = {853--865}, year = {2004}, url = {https://doi.org/10.1016/j.jpdc.2003.12.003}, doi = {10.1016/J.JPDC.2003.12.003}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/BrooksZLI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/BrooksFKP04, author = {Richard R. Brooks and David Friedlander and John Koch and Shashi Phoha}, title = {Tracking multiple targets with self-organizing distributed ground sensors}, journal = {J. Parallel Distributed Comput.}, volume = {64}, number = {7}, pages = {874--884}, year = {2004}, url = {https://doi.org/10.1016/j.jpdc.2003.12.005}, doi = {10.1016/J.JPDC.2003.12.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/BrooksFKP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/PirrettiLBVKI04, author = {Matthew Pirretti and Greg M. Link and Richard R. Brooks and Narayanan Vijaykrishnan and Mahmut T. Kandemir and Mary Jane Irwin}, title = {Fault Tolerant Algorithms for Network-On-Chip Interconnect}, booktitle = {2004 {IEEE} Computer Society Annual Symposium on {VLSI} {(ISVLSI} 2004), Emerging Trends in {VLSI} Systems Design, 19-20 February 2004, Lafayette, LA, {USA}}, pages = {46--51}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ISVLSI.2004.1339507}, doi = {10.1109/ISVLSI.2004.1339507}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/PirrettiLBVKI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/SaputraCBVKI04, author = {Hendra Saputra and Guangyu Chen and Richard R. Brooks and Narayanan Vijaykrishnan and Mahmut T. Kandemir and Mary Jane Irwin}, editor = {David B. Whalley and Ron Cytron}, title = {Code protection for resource-constrained embedded devices}, booktitle = {Proceedings of the 2004 {ACM} {SIGPLAN/SIGBED} Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES'04), Washington, DC, USA, June 11-13, 2004}, pages = {240--248}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/997163.997198}, doi = {10.1145/997163.997198}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/SaputraCBVKI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/04/WuRBIZ04, author = {Qishi Wu and Nageswara S. V. Rao and Richard R. Brooks and S. Sitharama Iyengar and Mengxia Zhu}, editor = {Mohammad Ilyas and Imad Mahgoub}, title = {Computational andNetworking Problemsin Distributed Sensor Networks}, booktitle = {Handbook of Sensor Networks}, publisher = {{CRC} Press}, year = {2004}, url = {https://doi.org/10.1201/9780203489635.ch25}, doi = {10.1201/9780203489635.CH25}, timestamp = {Tue, 21 Mar 2023 20:50:54 +0100}, biburl = {https://dblp.org/rec/books/crc/04/WuRBIZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/FriedlanderGJPB03, author = {David Friedlander and Christopher Griffin and Noah Jacobson and Shashi Phoha and Richard R. Brooks}, title = {Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2003}, number = {4}, pages = {371--377}, year = {2003}, url = {https://doi.org/10.1155/S1110865703212099}, doi = {10.1155/S1110865703212099}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/FriedlanderGJPB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ZacharyB03, author = {John Zachary and Richard R. Brooks}, title = {Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware}, journal = {Mob. Networks Appl.}, volume = {8}, number = {2}, pages = {137--143}, year = {2003}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ZacharyB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/BrooksRS03, author = {Richard R. Brooks and Parameswaran Ramanathan and Akbar M. Sayeed}, title = {Distributed target classification and tracking in sensor networks}, journal = {Proc. {IEEE}}, volume = {91}, number = {8}, pages = {1163--1171}, year = {2003}, url = {https://doi.org/10.1109/JPROC.2003.814923}, doi = {10.1109/JPROC.2003.814923}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/BrooksRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/SaputraVKIBKZ03, author = {Hendra Saputra and Narayanan Vijaykrishnan and Mahmut T. Kandemir and Mary Jane Irwin and Richard R. Brooks and Soontae Kim and Wei Zhang}, title = {Masking the Energy Behavior of {DES} Encryption}, booktitle = {2003 Design, Automation and Test in Europe Conference and Exposition {(DATE} 2003), 3-7 March 2003, Munich, Germany}, pages = {10084--10089}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.ieeecomputersociety.org/10.1109/DATE.2003.10112}, doi = {10.1109/DATE.2003.10112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/date/SaputraVKIBKZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PhohaJFB03, author = {Shashi Phoha and Noah Jacobson and David Friedlander and Richard R. Brooks}, title = {Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {2952--2956}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258775}, doi = {10.1109/GLOCOM.2003.1258775}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PhohaJFB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/BrooksPZI03, author = {Richard R. Brooks and Matthew Pirretti and Mengxia Zhu and S. Sitharama Iyengar}, title = {Distributed adaptation methods for wireless sensor networks}, booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM} '03, San Francisco, CA, USA, 1-5 December 2003}, pages = {2967--2971}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/GLOCOM.2003.1258778}, doi = {10.1109/GLOCOM.2003.1258778}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/BrooksPZI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpca/BrooksGF02, author = {Richard R. Brooks and Christopher Griffin and David Friedlander}, title = {Self-Organized Distributed Sensor Network Entity Tracking}, journal = {Int. J. High Perform. Comput. Appl.}, volume = {16}, number = {3}, pages = {207--219}, year = {2002}, url = {https://doi.org/10.1177/10943420020160030201}, doi = {10.1177/10943420020160030201}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhpca/BrooksGF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpca/BrooksG02, author = {Richard R. Brooks and Christopher Griffin}, title = {Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms}, journal = {Int. J. High Perform. Comput. Appl.}, volume = {16}, number = {3}, pages = {221--234}, year = {2002}, url = {https://doi.org/10.1177/10943420020160030301}, doi = {10.1177/10943420020160030301}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijhpca/BrooksG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ChenBIRB02, author = {Ying Chen and Richard R. Brooks and S. Sitharama Iyengar and Nageswara S. V. Rao and Jacob Barhen}, title = {Efficient Global Optimization for Image Registration}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {14}, number = {1}, pages = {79--92}, year = {2002}, url = {https://doi.org/10.1109/69.979974}, doi = {10.1109/69.979974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ChenBIRB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/BrooksO02, author = {Richard R. Brooks and Nathan Orr}, title = {A Model for Mobile Code Using Interacting Automata}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {1}, number = {4}, pages = {313--326}, year = {2002}, url = {https://doi.org/10.1109/TMC.2002.1175545}, doi = {10.1109/TMC.2002.1175545}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/BrooksO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jei/BrooksGI01, author = {Richard R. Brooks and Lynne L. Grewe and S. Sitharama Iyengar}, title = {Recognition in the wavelet domain: {A} survey}, journal = {J. Electronic Imaging}, volume = {10}, number = {3}, pages = {757--784}, year = {2001}, url = {https://doi.org/10.1117/1.1381560}, doi = {10.1117/1.1381560}, timestamp = {Sun, 22 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jei/BrooksGI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dars/BrooksGKMGKK00, author = {Richard R. Brooks and Eric Grele and Wojtek Klimkiewicz and Jamila Moore and Christopher Griffin and Brian Kovak and John Koch}, editor = {Lynne E. Parker and George A. Bekey and Jacob Barhen}, title = {Reactive Sensor Networks}, booktitle = {Distributed Autonomous Robotic Systems 4, Proceedings of the 5th International Symposium on Distributed Autonomous Robotic Systems, {DARS} 2000, October 4-6, 2000, Knoxville, Tennessee, {USA}}, pages = {471--472}, publisher = {Springer}, year = {2000}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dars/BrooksGKMGKK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rsfdgrc/EberbachBP99, author = {Eugene Eberbach and Richard R. Brooks and Shashi Phoha}, editor = {Ning Zhong and Andrzej Skowron and Setsuo Ohsuga}, title = {Flexible Optimization and Evolution of Underwater Autonomous Agents}, booktitle = {New Directions in Rough Sets, Data Mining, and Granular-Soft Computing, 7th International Workshop, RSFDGrC '99, Yamaguchi, Japan, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1711}, pages = {519--527}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48061-7\_64}, doi = {10.1007/978-3-540-48061-7\_64}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rsfdgrc/EberbachBP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/BrooksRI97, author = {Richard R. Brooks and Nageswara S. V. Rao and S. Sitharama Iyengar}, title = {Resolution of Contradictory Sensor Data}, journal = {Intell. Autom. Soft Comput.}, volume = {3}, number = {3}, pages = {287--299}, year = {1997}, url = {https://doi.org/10.1080/10798587.1997.10750709}, doi = {10.1080/10798587.1997.10750709}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/BrooksRI97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cira/GreweB97, author = {Lynne L. Grewe and Richard R. Brooks}, title = {On localization of objects in the wavelet domain}, booktitle = {Proceedings 1997 {IEEE} International Symposium on Computational Intelligence in Robotics and Automation CIRA'97 - Towards New Computational Principles for Robotics and Automation, July 10-11, 1997, Monterey, California, {USA}}, pages = {412--418}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CIRA.1997.613889}, doi = {10.1109/CIRA.1997.613889}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cira/GreweB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/BrooksIC96, author = {Richard R. Brooks and S. Sitharama Iyengar and Jianhua Chen}, title = {Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms}, journal = {Artif. Intell.}, volume = {84}, number = {1-2}, pages = {339--354}, year = {1996}, url = {https://doi.org/10.1016/0004-3702(96)00012-4}, doi = {10.1016/0004-3702(96)00012-4}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/BrooksIC96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BrooksI96, author = {Richard R. Brooks and S. Sitharama Iyengar}, title = {Robust Distributed Comupting and Sensing Algorithm}, journal = {Computer}, volume = {29}, number = {6}, pages = {53--60}, year = {1996}, url = {https://doi.org/10.1109/2.507632}, doi = {10.1109/2.507632}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BrooksI96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.