


Остановите войну!
for scientists:


default search action
34th MILCOM 2015: Tampa, FL, USA
- Qinqing Zhang, Jerry Brand, Thomas G. MacDonald, Bharat T. Doshi, Bonnie L. Gorsic:
34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. IEEE 2015, ISBN 978-1-5090-0073-9 - Welcome message.
- Roberto Pagliari, Abhrajit Ghosh, Yitzchak M. Gottlieb, Ritu Chadha, Akshay Vashist, Gregory Hadynski:
Insider attack detection using weak indicators over network flow data. 1-6 - Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls:
Enforcing agile access control policies in relational databases using views. 7-12 - Ritu Chadha, Abhrajit Ghosh, Alexander Poylisher, Constantin Serban:
TREND: Trust estimation system for wireless networks via multi-pronged detection. 13-18 - Zhiyong Shan, Iulian Neamtiu, Zhiyun Qian
, Don J. Torrieri:
Proactive restart as cyber maneuver for Android. 19-24 - Xiaotao Feng, Zizhan Zheng, Pengfei Hu
, Derya Cansever, Prasant Mohapatra:
Stealthy attacks meets insider threats: A three-player game model. 25-30 - Lisa M. Marvel, Scott E. Brown, Iulian Neamtiu, Richard E. Harang, David Harman, Brian Henz:
A framework to evaluate cyber agility. 31-36 - Mazda Salmanian, J. David Brown, Susan Watson, Ronggong Song, Helen Tang, Darcy Simmelink:
An architecture for secure interoperability between coalition tactical MANETs. 37-42 - Matthew Kelly, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski:
Customizable sponge-based authenticated encryption using 16-bit S-boxes. 43-48 - Christopher A. Wood, Stanislaw P. Radziszowski, Marcin Lukowiak:
Constructing large S-boxes with area minimized implementations. 49-54 - Rasheed Hussain, Donghyun Kim, Alade O. Tokuta, Hayk M. Melikyan, Heekuck Oh:
Covert communication based privacy preservation in mobile vehicular networks. 55-60 - Reece Johnston, Sun-il Kim:
Secure distributed storage for information dissemination and retrieval at the tactical edge. 61-66 - Krzysztof Sawicki
, Zbigniew Piotrowski
, Damian Bachmat:
Effective steganographic filter based on Raspberry Pi 2 architecture. 67-72 - Venkatesh Ramaswamy, Jeffrey T. Correia:
Understanding the impact of RADAR interference on IEEE 802.11 MAC in spectrum sharing environments. 73-78 - Victor Sandoval-Curmina, Ramón Parra-Michel, Aldo G. Orozco-Lugo:
Multi-round transmission protocol with multipacket reception for multirate IEEE802.11 WLANs. 79-84 - Yunseong Lee, Jinseok Lee, Jaesung Lim, Hong-Jun Noh, Hyungwon Park:
MR-CRDSA: Multiple reservation-contention resolution diversity slotted ALOHA for battle-field communication. 85-90 - Venkatesh Ramaswamy:
Investigations on network-wide load balancing for proportional fair scheduling based TDMA cellular systems. 91-96 - Hemant Saggar, Yi Jiang, Babak Daneshrad, Greg Pottie:
A Concurrent CSMA MAC protocol for Mobile Ad Hoc Networks using beamnulling. 97-102 - Osama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networks. 103-108 - Syamsul Rizal
, Dwi Agung Nugroho, Seung-Hwan Kim, Dong-Seong Kim:
Rate adaptation algorithm for multicast communication in tactical networks. 109-114 - Rahul Amin
, Greg Kuperman:
PIM-MANET: Extension to PIM for multicast routing in MANETs. 115-120 - Li Li, Humphrey Rutagemwa
, J. Hu, Phil Hugg, Philip J. Vigneron, Colin Brown, Thomas Kunz:
Networking for next generation NBWF radios. 121-126 - Carrie Spiker, Rodolfo Santiago, Thomas Goff, Claudiu Danilov, Jae H. Kim, Brian Adamson, David Shur, Kyriakos Manousakis:
Experiment and field demonstration of serverless group communication. 127-132 - Raheleh B. Dilmaghani, Dae Kwon:
Evaluation of OpenFlow load balancing for navy. 133-138 - George F. Elmasry, Brian Aanderud, Wayne Kraus, Robert J. McCabe:
Software-defined dynamic power-control and directional-reuse protocol for TDMA radios. 139-144 - Seok-Ho Chang, Jihwan P. Choi, Pamela C. Cosman
, Laurence B. Milstein:
Scalable multimedia optimization in MIMO systems. 145-150 - Qixuan Zhu, Xi Zhang:
Statistical-QoS based gaming for optimal power allocations over virtualized wireless relay networks supporting multimedia services. 151-156 - Jun Xu, Xiaoqiang Guo, Qin Tu, Cuiwei Li, Aidong Men:
A novel video saliency map detection model in compressed domain. 157-162 - Balachander Ramamurthy, William G. Cowley, Linda M. Davis, Gerald Bolding:
On MIMO SATCOM capacity analysis: Utilising polarization and spatial multiplexing. 163-168 - John Sucec, Mariusz A. Fecko, Baron Ong, Wei Liu, Sheetal Doshi, Kurt A. Turck:
Distributed policy enforcement for priority awareness in tactical SATCOM networks. 169-174 - Thomas C. Royster IV, James Streitman:
Performance considerations for protected wideband satcom. 175-180 - Brian J. Wolf, Jacob C. Huang:
Implementation and testing of the Protected Tactical Waveform (PTW). 181-186 - Jonathon Cheah:
Contributions to MUOS communication link assessments at the Arctic Circle locations. 187-192 - Luis Bastos, Hermann Wietgrefe:
Next-generation wireless WAN transmission systems in support of NATO Expeditionary Operations. 193-198 - Steven Kay, Fuat Cogun:
Multimodal target detection via integrated GLRT. 199-203 - David Boutte, Hua Lee, Vincent Radzicki, Allan R. Hunt:
A portable SIMO radar for through wall detection and imaging. 204-209 - Azril Haniz, Gia Khanh Tran, Kei Sakaguchi, Jun-ichi Takada
, Daisuke Hayashi, Toshihiro Yamaguchi, Shintaro Arata:
Localization of illegal radios utilizing cross-correlation of channel impulse response with interpolation in urban scenarios. 210-215 - Na Wu, Qilian Liang:
Underwater DoA estimation based on nested array. 216-221 - Yiu Tong Chan, François Chan, William Read, Robert J. Inkol, Brad R. Jackson, B. Haynes Lee:
Probable regions for emitter localization. 222-227 - Hyunwoo Cho, Xiaoli Ma:
Threshold estimation for UWB single pulse radar. 228-232 - Intae Shin, Wonju Lee, Jinkyu Kang
, Joonhyuk Kang, Saleh R. Al-Araji:
Quantization bit allocation for reporting-throughput tradeoff in cooperative cognitive radio networks. 233-237 - Alireza Zaeemzadeh
, Mohsen Joneidi, Behzad Shahrasbi, Nazanin Rahnavard:
Missing spectrum-data recovery in cognitive radio networks using piecewise constant Nonnegative Matrix Factorization. 238-243 - Gang Wang, Khanh D. Pham, Erik Blasch, Tien Manh Nguyen, Dan Shen, Xin Tian, Genshe Chen:
Cognitive radio unified Spectral efficiency and Energy Efficiency trade-off analysis. 244-249 - Nilesh Khambekar, Vipin Chaudhary
, Chad M. Spooner:
Estimating the use of spectrum for defining and enforcing the spectrum access rights. 250-257 - Yanbo Wang, Caili Guo, Xuekang Sun, Chunyan Feng:
Compressed spectrum sensing based on correlation of spectrum occupation states between sensing periods. 258-262 - Dong Li, John Ellinger, Zhiqiang Liu, Zhiqiang Wu, Zhiping Zhang:
Mixed signal detection and symbol rate estimation based on spectral coherent features. 263-268 - Marc Lichtman, Jeffrey H. Reed:
Anomaly-based intrusion detection of protocol-aware jamming. 269-274 - Jasmin A. Mahal, Chowdhury Shahriar, T. Charles Clancy:
Emulated CP jamming and nulling attacks on SC-FDMA and two novel countermeasures. 275-280 - Louis Sibomana, Hung Tran, Hans-Jürgen Zepernick
:
On physical layer security for cognitive radio networks with primary user interference. 281-286 - Arslan Javaid Majid, Hussein Moradi, Behrouz Farhang-Boroujeny:
Secure information transmission in filter bank multi-carrier spread spectrum systems. 287-293 - Eric R. Tollefson, Bruce R. Jordan, Joseph D. Gaeddert:
Out-phased array linearized signaling (OPALS): A practical approach to physical layer encryption. 294-299 - Leemon C. Baird III, Bill Parks:
Exhaustive attack analysis of BBC with glowworm for unkeyed jam resistance. 300-305 - Prithwish Basu, Chi-Kin Chau
, Andrei Iu. Bejan, Richard J. Gibbens, Saikat Guha, Matthew P. Johnson:
Efficient multicast in hybrid wireless networks. 306-311 - Chang Liu, Ting He, Ananthram Swami, Don Towsley
, Theodoros Salonidis, Andrei Iu. Bejan, Paul L. Yu:
Multicast vs. unicast for loss tomography on tree topologies. 312-317 - Alessandro Oltramari, Lorrie Faith Cranor
, Robert J. Walls, Patrick D. McDaniel:
Computational ontology of network operations. 318-323 - Nathaniel Lageman, Mark Lindsey, William J. Glodek:
Detecting malicious Android applications from runtime behavior. 324-329 - Z. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami:
Malware traffic detection using tamper resistant features. 330-335 - James R. Morris-King, Hasan Cam:
Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edge. 336-341 - Devin J. Pohly, Charles Sestito, Patrick D. McDaniel:
Adaptive protocol switching using Dynamically Insertable Bumps in the stack. 342-347 - Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy
, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. 348-353 - Peter Kruus, David Challener:
On reporting of the time of attestation measurements. 354-359 - Trevor J. Bihl
, Kenneth W. Bauer Jr., Michael A. Temple, Benjamin W. P. Ramsey:
Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devices. 360-365 - Ang Li, Qinghua Li, Vincent C. Hu
, Jia Di:
Evaluating the capability and performance of access control policy verification tools. 366-371 - Hector M. Lugo-Cordero, Ratan K. Guha:
A secured distribution of server loads to clients. 372-377 - Hiren J. Patel, Benjamin W. P. Ramsey:
Comparison of parametric and non-parametric statistical features for Z-Wave fingerprinting. 378-382 - Tuan Le, Mario Gerla:
A Load Balanced Social-Tie Routing strategy for DTNs based on queue length control. 383-387 - Lars Landmark, Erlend Larsen, Mariann Hauge, Øivind Kure:
Resilient internetwork routing over heterogeneous mobile military networks. 388-394 - Tyler Ulinskas, Walt Golonka, David Duran:
On the problem of routing in mobile ad hoc wireless networks with directional antennas. 395-400 - George F. Elmasry, Ben Haan, Robert J. McCabe:
Augmenting OLSR with Priority Aware Dynamic Routing for heterogeneous networking. 401-406 - Joy Na Wang, Joshua Van Hook, Patricia Deutsch:
Inter-domain routing for military mobile networks. 407-412 - Chowdhury Sayeed Hyder, Thomas D. Jeitschko
, Li Xiao:
Towards a truthful online spectrum auction with dynamic demand and supply. 413-418 - Harsha Chenji, Zygmunt J. Haas, Panfeng Xue:
Low complexity QoE-aware bandwidth allocation for wireless content delivery. 419-425 - Grzegorz Szmit, Jerzy Dolowski
, Jerzy Lopatka
:
Distributed channel selection for hierarchical cognitive radio networks. 426-431 - Suman Bhunia
, Vahid Behzadan, Shamik Sengupta:
Enhancement of spectrum utilization in non-contiguous DSA with online defragmentation. 432-437 - Sohraab Soltani, Yalin Evren Sagduyu, Yi Shi, Jason H. Li, Jared Feldman, John D. Matyjas:
Distributed cognitive radio network architecture, SDR implementation and emulation testbed. 438-443 - Mariusz A. Fecko, Kyriakos Manousakis, Kenneth Young, Jaewon Kang, Andrew Pachulski, Wayne G. Phoel:
Mitigation of control plane attacks at the network layer. 444-449 - Judson C. Dressler, Christopher Bronk, Daniel S. Wallach:
Exploiting military OpSec through open-source vulnerabilities. 450-458 - Jaewon Kang, Mariusz A. Fecko, Kyriakos Manousakis, Kenneth Young:
Mitigating control plane attacks on TDMA-based MAC protocols in mobile wireless networks. 459-464 - Alberto Domingo, Hermann Wietgrefe:
An applied model for secure information release between federated military and non-military networks. 465-470 - Paul W. Garver, Randal T. Abler, Edward J. Coyle:
Theory and development of cross-layer techniques for localization in environments with Extreme Emitter Densities. 471-476 - Harmish Modi, Peter Athanas:
In-system testing of Xilinx 7-Series FPGAs: Part 1-logic. 477-482 - Fulvio Arreghini, Roberto Agrone, Paolo Danielli, Alessandro Pigni:
Heterogeneous network testbed for tactical communication in shore scenario. 483-488 - Constantin Serban, Alexander Poylisher, Angelo Sapello, Yitzchak M. Gottlieb, C. Jason Chiang, Ritu Chadha:
Testing android devices for tactical networks: A hybrid emulation testbed approach. 489-494 - Marko Jacovic, James Chacko, Doug Pfeil, Nagarajan Kandasamy, Kapil R. Dandekar
:
Hardware implementation of low-overhead data aided timing and Carrier Frequency Offset correction for OFDM signals. 495-500 - Chengjie Li, Lidong Zhu, Anhong Xie, Zhongqiang Luo:
Weak signal blind source separation in Passive Radar System with strong interference. 501-505 - Brian Millikan, Aritra Dutta
, Nazanin Rahnavard, Qiyu Sun, Hassan Foroosh:
Initialized iterative reweighted least squares for automatic target recognition. 506-510 - John R. Krier, Marissa C. Norko, Jeremy T. Reed, Robert J. Baxley, Aaron D. Lanterman, Xiaoli Ma, John R. Barry:
Performance bounds for an OFDM-based joint radar and communications system. 511-516 - Lorenz Weiland, Thomas Wiese, Wolfgang Utschick
:
Coherent MIMO radar range imaging with block sparse recovery. 517-522 - Can Uysal
, Tansu Filik:
A joint detection and localization method for non-cooperative DS-SS signals. 523-528 - Joshua P. Bruckmeyer, Ivica Kostanic:
Adaptive calibration of wideband digital beam formers with injection calibration. 529-533 - Lan K. Nguyen, Richard B. Wells, Tho Le-Ngoc:
Power allocation for shared and frequency hopped transponder. 534-540 - Earl W. McCune Jr., Dubravko Babic, Richard Booth, Douglas A. Kirkpatrick:
Decade bandwidth agile GaN power amplifier exceeding 50% efficiency. 541-546 - Ergin Dinc, Özgür B. Akan:
Limited feedback multi-stage beam-forming method for beyond-Line-of-Sight ducting channels. 547-552 - Nam Nicholas Ma, Kristopher Buchanan, Jeffrey Jensen, Gregory H. Huff
:
Distributed beamforming from triangular planar random antenna arrays. 553-558 - Zheng Chang
, Qianqian Zhang, Xijuan Guo, Zhenyu Zhou
, Tapani Ristaniemi:
Energy efficient resource allocation for OFDMA two-way relay networks with channel estimation error. 559-564 - Zhanji Wu, Xiang Gao, Yongtao Shi:
A novel MU-MIMO-OFDM scheme with the RBD precoding for the next generation WLAN. 565-569 - Qiongjie Lin, Mary Ann Weitnauer:
Diversity in synchronization for scheduled OFDM time-division cooperative transmission. 570-575 - Hao Li, Xianbin Wang
:
Disguised jamming against OFDM transmission through nonlinear amplify-and-forward. 576-580 - David Rainnie, Yi Feng, Jan Bajcsy:
On capacity merits of spectrally efficient FDM. 581-586 - Ertugrul Güvenkaya, Alphan Sahin, Hüseyin Arslan
:
N-continuous OFDM with CP alignment. 587-592 - Marco Manso
, Jose Maria Alcaraz Calero
, Christoph Barz, Trude Hafsoe Bloebaum, Kevin Chan, Norman Jansen, Frank Trethan Johnsen, Garik Markarian
, Peter-Paul Meiler, Ian Owens
, Joanna Sliwa, Qi Wang:
SOA and Wireless Mobile Networks in the tactical domain: Results from experiments. 593-598 - Trude Hafsøe Bloebaum, Frank T. Johnsen:
Exploring SOAP and REST communication on the Android platform. 599-604 - Trude Hafsøe Bloebaum, Frank T. Johnsen:
Evaluating publish/subscribe approaches for use in tactical broadband networks. 605-610 - Shameek Bhattacharjee
, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua:
Multinomial trust in presence of uncertainty and adversaries in DSA networks. 611-616 - Athanasios Delimargas, Emmanouil Skevakis, Hassan Halabian, Ioannis Lambadaris, Nabil Seddigh, Biswajit Nandy, Rupinder Makkar:
IPCA for network anomaly detection. 617-622 - Andy Applebaum, Karl N. Levitt, Zimi Li, Simon Parsons, Jeff Rowe, Elizabeth Sklar:
Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidence. 623-628 - Ing-Ray Chen, Robert Mitchell, Jin-Hee Cho:
On modeling of adversary behavior and defense for survivability of military MANET applications. 629-634 - Kimberly Gold, Sachin Shetty
, Tamara Rogers:
A testbed for modeling and detecting attacks on NFC enabled mobile devices. 635-640 - Kevin S. Chan, Jin-Hee Cho, Theron Trout, Jason Wampler, Andrew Toth, Brian Rivera:
trustd: Trust daemon experimental testbed for network emulation. 641-646 - Joseph Soryal, Tarek N. Saadawi:
Countermeasure technique to combat greedy behavior in ad-hoc wireless networks. 647-652 - Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, Peng Ning:
No time to demodulate - fast physical layer verification of friendly jamming. 653-658 - Tommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong:
An SDN-supported collaborative approach for DDoS flooding detection and containment. 659-664 - Omar Nakhila, Afraa Attiah
, Yier Jin, Cliff C. Zou:
Parallel active dictionary attack on WPA2-PSK Wi-Fi networks. 665-670 - Ahmed H. Anwar, Janiece Kelly, George K. Atia, Mina Guirguis:
Stealthy edge decoy attacks against dynamic channel assignment in wireless networks. 671-676 - Amitav Mukherjee, Wenhao Xiong, Hyuck M. Kwon:
CSI-unaware scheduling for coexistence of MIMO-OFDMA device-to-device links and cellular mobile terminals. 677-682 - Bilal Al-Doori, Xian Liu:
A new approach in LTE-A downlink power and transport block management. 683-688