Rusty O. Baldwin
Affiliations:- Riverside Research, Beavercreek, OH, USA
According to our database1,
Rusty O. Baldwin
authored at least 66 papers
between 1999 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
2000
2005
2010
2015
0
5
10
15
1
3
1
4
2
1
3
4
3
5
1
2
2
1
1
1
1
1
3
4
2
13
1
1
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
A New Way to Detect Cyberattacks: Extracting Changes in Register Values From Radio-Frequency Side Channels.
IEEE Signal Process. Mag., 2019
2015
Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting.
IEEE Trans. Reliab., 2015
Statistical analysis and comparison of linear regression attacks on the advanced encryption standard.
Int. J. Inf. Commun. Technol., 2015
Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process.
Int. J. Crit. Infrastructure Prot., 2015
A unified, clinician-focused "packets-to-patients" measurement approach for meaningful and usable electronic health records.
Proceedings of the 17th International Conference on E-health Networking, 2015
2014
Int. J. Appl. Cryptogr., 2014
2013
Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations.
ACM Trans. Inf. Syst. Secur., 2013
Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios.
IEEE Trans. Inf. Forensics Secur., 2013
Perform. Evaluation, 2013
J. Cryptogr. Eng., 2013
2012
IEEE Trans. Inf. Forensics Secur., 2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
2010
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010
2009
Characterizing, Measuring, and Validating the Temporal Consistency of Live - Virtual - Constructive Environments.
Simul., 2009
Secur. Commun. Networks, 2009
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008
Perform. Evaluation, 2008
Energy cost and error performance of range-aware, anchor-free localization algorithms.
Ad Hoc Networks, 2008
Proceedings of the 2008 IEEE International Performance, 2008
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008
2007
IEEE Trans. Reliab., 2007
A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks.
Telecommun. Syst., 2007
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007
A Hardware-based Architecture to Support Flexible Real-Time Parallel Intrusion Detection.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007
Proceedings of the 2007 Spring Simulation Multiconference, 2007
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the Workshop on Experimental Computer Science, 2007
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
IEEE Trans. Mob. Comput., 2006
Simul., 2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks.
J. Syst. Softw., 2006
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion.
IEEE Secur. Priv., 2006
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006
2005
Wirel. Pers. Commun., 2005
Proceedings of the Computer Network Security, 2005
2004
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004
Int. J. Wirel. Opt. Commun., 2004
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004
2003
IEEE Commun. Lett., 2003
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003
Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices.
Proceedings of the 11th IEEE International Conference on Networks, 2003
2002
Performance analysis of multicast algorithms for mobile satellite communication networks.
Comput. Commun., 2002
2001
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001
2000
PhD thesis, 2000
Real-time queueing theory: A tutorial presentation with an admission control application.
Queueing Syst. Theory Appl., 2000
1999
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999