Richard R. Brooks

Orcid: 0000-0002-4240-4762

According to our database1, Richard R. Brooks authored at least 115 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion.
DTRAP, 2023

2022
Side-Channel Security Analysis of Connected Vehicle Communications Using Hidden Markov Models.
IEEE Trans. Intell. Transp. Syst., 2022

Distributed Denial of Service (DDoS): A History.
IEEE Ann. Hist. Comput., 2022

A Virtual Synchrophasor Network for Power System Resiliency Under Concurrent DoS Attacks.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2022

2021
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms.
Comput. Secur., 2021

Availability analysis of a permissioned blockchain with a lightweight consensus protocol.
Comput. Secur., 2021

AFES: An Advanced Forensic Evidence System.
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021

2020
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Protocol Proxy: An FTE-based covert channel.
Comput. Secur., 2020

Detecting Low-level Radiation Sources Using Border Monitoring Gamma Sensors.
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2020

2019
Network Detection of Radiation Sources Using Localization-Based Approaches.
IEEE Trans. Ind. Informatics, 2019

Privacy Preserving Count Statistics.
CoRR, 2019

Traffic Analysis Resistant Network (TARN) Anonymity Analysis.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2018
Review of Internet of Things (IoT) in Electric Power and Energy Systems.
IEEE Internet Things J., 2018

The Future of CISE Distributed Research Infrastructure.
CoRR, 2018

Internet freedom in West Africa: technical support for journalists and democracy advocates.
Commun. ACM, 2018

Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

Two-Level Clustering-Based Target Detection Through Sensor Deployment and Data Fusion.
Proceedings of the 21st International Conference on Information Fusion, 2018

Internet Security Liberated via Software Defined Exchanges.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
Stealthy Domain Generation Algorithms.
IEEE Trans. Inf. Forensics Secur., 2017

Denial of Service Attack on Tie-Line Bias Control in a Power System With PV Plant.
IEEE Trans. Emerg. Top. Comput. Intell., 2017

Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data.
CoRR, 2017

Stochastic Tools for Network Intrusion Detection.
CoRR, 2017

Stealthy Malware Traffic - Not as Innocent as It Looks.
CoRR, 2017

TARN: A SDN-based traffic analysis resistant network architecture.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Improved multi-resolution method for MLE-based localization of radiation sources.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms.
ACM Comput. Surv., 2016

A brief survey of Cryptocurrency systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Provenance threat modeling.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A source-attractor approach to network detection of radiation sources.
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016

A covert data transport protocol.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Performance analysis of Wald-statistic based network detection methods for radiation sources.
Proceedings of the 19th International Conference on Information Fusion, 2016

2015
Deceiving entropy based DoS detection.
Comput. Secur., 2015

Stealthy malware traffic - Not as innocent as it looks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Side-Channels in Electric Power Synchrophasor Network Data Traffic.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Automobile ECU Design to Avoid Data Tampering.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Analysis of Botnet Counter-Counter-Measures.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Semantic Similarity Detection For Data Leak Prevention.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2013
Inferring Statistically Significant Hidden Markov Models.
IEEE Trans. Knowl. Data Eng., 2013

A Normalized Statistical Metric Space for Hidden Markov Models.
IEEE Trans. Cybern., 2013

Circumventing keyloggers and screendumps.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

DoS Detection is Easier Now.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Tailoring trusted semantic information.
Proceedings of the Cyber Security and Information Intelligence, 2013

Applying POMDP to moving target optimization.
Proceedings of the Cyber Security and Information Intelligence, 2013

Operational system testing for designed in security.
Proceedings of the Cyber Security and Information Intelligence, 2013

Timing analysis in P2P botnet traffic using probabilistic context-free grammars.
Proceedings of the Cyber Security and Information Intelligence, 2013

Cost-effective quality assurance of wireless network security.
Proceedings of the Cyber Security and Information Intelligence, 2013

Security and performance evaluation of security protocols.
Proceedings of the Cyber Security and Information Intelligence, 2013

Creating a tailored trustworthy space for democracy advocates using hostile host.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Methods to Window Data to Differentiate Between Markov Models.
IEEE Trans. Syst. Man Cybern. Part B, 2011

On Bandwidth-Limited Sum-of-Games Problems.
IEEE Trans. Syst. Man Cybern. Part A, 2011

A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set.
IEEE Trans. Autom. Control., 2011

Side-Channel Analysis for Detecting Protocol Tunneling.
Adv. Internet Things, 2011

Noise tolerant symbolic learning of Markov models of tunneled protocols.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Observable subspace solution for irreducible POMDPs with infinite horizon.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Security experimentation using operational systems.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Botnet traffic detection using hidden Markov models.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Fusion of threshold rules for target detection in wireless sensor networks.
ACM Trans. Sens. Networks, 2010

Orwell was an optimist.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Lies and the lying liars that tell them: a fair and balanced look at TLS.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Automobile security concerns.
IEEE Veh. Technol. Mag., 2009

Behavior Detection Using Confidence Intervals of Hidden Markov Models.
IEEE Trans. Syst. Man Cybern. Part B, 2009

Markovian Search Games in Heterogeneous Spaces.
IEEE Trans. Syst. Man Cybern. Part B, 2009

Zero knowledge hidden Markov model inference.
Pattern Recognit. Lett., 2009

Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks.
Int. J. Distributed Sens. Networks, 2009

Adaptive Optimizations for Surveillance Sensor Network Longevity.
Int. J. Distributed Sens. Networks, 2009

Multicast Encryption Infrastructure for Security in Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

Clone Detection in Sensor Networks with <i>Ad Hoc</i> and Grid Topologies.
Int. J. Distributed Sens. Networks, 2009

Sensor Network Self-Organization Using Random Graphs.
Int. J. Distributed Sens. Networks, 2009

2008
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games.
IEEE Trans. Syst. Man Cybern. Part A, 2008

International Journal of Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2008

Determining a purely symbolic transfer function from symbol streams: Theory and algorithms.
Proceedings of the American Control Conference, 2008

2007
Mobile Network Analysis Using Probabilistic Connectivity Matrices.
IEEE Trans. Syst. Man Cybern. Part C, 2007

On the Detection of Clones in Sensor Networks Using Random Key Predistribution.
IEEE Trans. Syst. Man Cybern. Part C, 2007

Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in <i>Ad Hoc</i> Sensor Networks.
Int. J. Distributed Sens. Networks, 2007

Performance aware secure code partitioning.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

2006
A note on the spread of worms in scale-free networks.
IEEE Trans. Syst. Man Cybern. Part B, 2006

Denial-of-Service Attack-Detection Techniques.
IEEE Internet Comput., 2006

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
Int. J. Distributed Sens. Networks, 2006

A Review of: "Wireless Sensor Networks: An Information Processing.".
Int. J. Distributed Sens. Networks, 2006

Kafka in the academy: a note on ethics in IA education.
IEEE Secur. Priv., 2006

Wavelet based Denial-of-Service detection.
Comput. Secur., 2006

Pedigree Information for Enhanced Situation and Threat Assessment.
Proceedings of the 9th International Conference on Information Fusion, 2006

Secure Execution of Computations in Untrusted Hosts.
Proceedings of the Reliable Software Technologies, 2006

2005
Symmetric encryption in reconfigurable and custom hardware.
Int. J. Embed. Syst., 2005

A Data-Driven Approach for Embedded Security.
Proceedings of the 2005 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2005), 2005

A Compiler-Based Approach to Data Security.
Proceedings of the Compiler Construction, 14th International Conference, 2005

2004
Special issue introduction--the road map for distributed sensor networks in the context of computing and communication.
J. Parallel Distributed Comput., 2004

Aspect-oriented design of sensor networks.
J. Parallel Distributed Comput., 2004

Tracking multiple targets with self-organizing distributed ground sensors.
J. Parallel Distributed Comput., 2004

Mobile Code Daemons for Networks of Embedded Systems.
IEEE Internet Comput., 2004

Mobile Code Paradigms and Security Issues.
IEEE Internet Comput., 2004

A cellular automata model can quickly approximate UDP and TCP network traffic.
Complex., 2004

Code protection for resource-constrained embedded devices.
Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, 2004

Fault Tolerant Algorithms for Network-On-Chip Interconnect.
Proceedings of the 2004 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2004), 2004

Computational andNetworking Problemsin Distributed Sensor Networks.
Proceedings of the Handbook of Sensor Networks, 2004

2003
Distributed target classification and tracking in sensor networks.
Proc. IEEE, 2003

Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware.
Mob. Networks Appl., 2003

Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network.
EURASIP J. Adv. Signal Process., 2003

Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering.
Proceedings of the Global Telecommunications Conference, 2003

Distributed adaptation methods for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2003

Masking the Energy Behavior of DES Encryption.
Proceedings of the 2003 Design, 2003

2002
A Model for Mobile Code Using Interacting Automata.
IEEE Trans. Mob. Comput., 2002

Efficient Global Optimization for Image Registration.
IEEE Trans. Knowl. Data Eng., 2002

Self-Organized Distributed Sensor Network Entity Tracking.
Int. J. High Perform. Comput. Appl., 2002

Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms.
Int. J. High Perform. Comput. Appl., 2002

2001
Recognition in the wavelet domain: A survey.
J. Electronic Imaging, 2001

2000
Reactive Sensor Networks.
Proceedings of the Distributed Autonomous Robotic Systems 4, 2000

1999
Flexible Optimization and Evolution of Underwater Autonomous Agents.
Proceedings of the New Directions in Rough Sets, 1999

1997
Resolution of Contradictory Sensor Data.
Intell. Autom. Soft Comput., 1997

On localization of objects in the wavelet domain.
Proceedings of the Proceedings 1997 IEEE International Symposium on Computational Intelligence in Robotics and Automation CIRA'97, 1997

1996
Robust Distributed Comupting and Sensing Algorithm.
Computer, 1996

Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms.
Artif. Intell., 1996


  Loading...