Barry E. Mullins
Affiliations:- Air Force Institute of Technology, Wright-Patterson Air Force Base, USA
According to our database1,
Barry E. Mullins
authored at least 87 papers
between 1997 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2019
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver.
ACM Trans. Cyber Phys. Syst., 2019
CoRR, 2019
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric.
Proceedings of the Critical Infrastructure Protection XIII, 2019
2018
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018
Proceedings of the Critical Infrastructure Protection XII, 2018
2017
Proceedings of the Critical Infrastructure Protection XI, 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
Proceedings of the Critical Infrastructure Protection XI, 2017
2016
An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols.
Int. J. Netw. Secur., 2016
Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016
Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver.
Digit. Investig., 2016
Proceedings of the Critical Infrastructure Protection X, 2016
2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.
IEEE Trans. Dependable Secur. Comput., 2015
Constructing cost-effective and targetable industrial control system honeypots for production networks.
Int. J. Crit. Infrastructure Prot., 2015
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers.
Int. J. Crit. Infrastructure Prot., 2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
2014
Int. J. Secur. Networks, 2014
Int. J. Secur. Networks, 2014
A black hole attack model using topology approximation for reactive ad-hoc routing protocols.
Int. J. Secur. Networks, 2014
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices.
Int. J. Crit. Infrastructure Prot., 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State.
Proceedings of the Critical Information Infrastructures Security, 2014
2013
Web Intell. Agent Syst., 2013
IEEE Trans. Netw. Serv. Manag., 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013
Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks.
Proceedings of the Critical Infrastructure Protection VII, 2013
Proceedings of the Critical Infrastructure Protection VII, 2013
2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012
Comput. Secur., 2012
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012
Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
Int. J. Secur. Networks, 2011
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011
Proceedings of the IEEE International Conference on Services Computing, 2011
2010
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols.
Int. J. Secur. Networks, 2010
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010
Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation.
Proceedings of the 6th World Congress on Services, 2010
Proceedings of the SummerSim '10, 2010
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
2009
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009
Secur. Commun. Networks, 2009
Peer-to-Peer Netw. Appl., 2009
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008
Perform. Evaluation, 2008
Energy cost and error performance of range-aware, anchor-free localization algorithms.
Ad Hoc Networks, 2008
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008
2007
IEEE Trans. Reliab., 2007
A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks.
Telecommun. Syst., 2007
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007
Int. J. Secur. Networks, 2007
IEEE Secur. Priv., 2007
Proceedings of the 2007 Spring Simulation Multiconference, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment.
Proceedings of IEEE International Conference on Communications, 2007
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Workshop on Experimental Computer Science, 2007
Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems, 2007
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Simul., 2006
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion.
IEEE Secur. Priv., 2006
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006
2003
Proceedings of the IEEE International Conference on Systems, 2003
Proceedings of the 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, Las Vegas, Nevada, USA, October 27, 2003
1998
Cater: an Opportunistic Medium Access Control Protocol for Wireless Local Area Networks.
PhD thesis, 1998
1997
An adaptive wireless local area network protocol that improves throughput via adaptive control of direct sequence spread spectrum parameters.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1997
A Wireless Local Area Network Protocol that Improves Throughput via Adaptive Control.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997