Остановите войну!
for scientists:
default search action
Rusty O. Baldwin
- > Home > Persons > Rusty O. Baldwin
Publications
- 2012
- [j27]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Michael R. Grimaila, Barry E. Mullins:
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics. IEEE Commun. Surv. Tutorials 14(2): 579-606 (2012) - 2010
- [j25]Cory J. Antosh, Barry E. Mullins, Rusty O. Baldwin, Richard A. Raines:
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 350-368 (2010) - 2009
- [j24]David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. J. Syst. Softw. 82(1): 101-111 (2009) - [j23]Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles. Secur. Commun. Networks 2(1): 55-69 (2009) - [c25]Douglas J. Kelly, Richard A. Raines, Rusty Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Tree-Based Taxonomy of Anonymous Networks. CCNC 2009: 1-2 - [c23]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Taxonomy of Wired and Wireless Anonymous Networks. ICC 2009: 1-8 - [c22]Robert L. Lidowski, Barry E. Mullins, Rusty O. Baldwin:
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission. PerCom 2009: 1-7 - 2008
- [j21]Gustav J. Jordt, Rusty O. Baldwin, John F. Raquet, Barry E. Mullins:
Energy cost and error performance of range-aware, anchor-free localization algorithms. Ad Hoc Networks 6(4): 539-559 (2008) - [j20]Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter:
Hindering Reverse Engineering: Thinking Outside the Box. IEEE Secur. Priv. 6(2): 58-65 (2008) - [j19]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
A queueing approach to optimal resource replication in wireless sensor networks. Perform. Evaluation 65(10): 689-700 (2008) - [j18]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries. ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(2): 31-39 (2008) - [c21]Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins:
A survey of state-of-the-art in anonymity metrics. NDA 2008: 31-40 - [c20]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. IPCCC 2008: 524-531 - 2007
- [j17]Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. IEEE Netw. 21(4): 51-56 (2007) - [j16]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks. Telecommun. Syst. 35(1-2): 67-86 (2007) - [j15]George R. Roelke, Rusty O. Baldwin, Barry E. Mullins, Yong C. Kim:
A Cache Architecture for Extremely Unreliable Nanotechnologies. IEEE Trans. Reliab. 56(2): 182-197 (2007) - [c19]Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington:
Program Fragmentation as a Metamorphic Software Protection. IAS 2007: 369-374 - [c18]David P. Montminy, Rusty O. Baldwin, Paul D. Williams, Barry E. Mullins:
Using Relocatable Bitstreams for Fault Tolerance. AHS 2007: 701-708 - [c17]M. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple:
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles. AINA Workshops (2) 2007: 249-256 - [c16]Christopher J. Augeri, Dursun A. Bulutoglu, Barry E. Mullins, Rusty O. Baldwin, Leemon C. Baird III:
An analysis of XML compression efficiency. Experimental Computer Science 2007: 7 - [c13]Justin T. Kautz, Barry E. Mullins, Rusty O. Baldwin, Scott R. Graham:
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks. HICSS 2007: 292 - [c12]Nicholas A. Fraser, Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. ICC 2007: 1197-1202 - [c11]Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Christopher B. Mayer, Rusty O. Baldwin:
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. MobiQuitous 2007: 1-8 - [c10]Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Rusty O. Baldwin, Christopher B. Mayer:
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network. NCA 2007: 273-282 - [c9]Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers:
Alert Verification Evasion Through Server Response Forging. RAID 2007: 256-275 - [c8]Christopher R. Mann, Rusty O. Baldwin, Barry E. Mullins:
Wireless sensor networks: guidelines for design and a survey of current research. SpringSim (1) 2007: 41-50 - 2006
- [j14]Victor P. Hubenko Jr., Richard A. Raines, Robert F. Mills, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements. IEEE Commun. Mag. 44(11): 66-72 (2006) - [j13]David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. IEEE Secur. Priv. 4(6): 36-43 (2006) - [j11]Sean A. Jeffers, Rusty O. Baldwin, Barry E. Mullins:
Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards. Simul. 82(8): 549-558 (2006)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 17:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint