Abstract is missing.
- Distribution and interpretation of geo-referenced events for the purpose of road traffic shapingKamil Gleba, Henryk Wiacek, Robert Goniacz, Joanna Sliwa. 1-7 [doi]
- Optimization of Cognitive Radio networks performance using policies definitionGrzegorz Szmit, Jerzy Lopatka. 1-7 [doi]
- Jamming mitigation in cognitive radio networks using a modified Q-learning algorithmFeten Slimeni, Bart Scheers, Zied Chtourou, Vincent Le Nir. 1-7 [doi]
- Framework to develop military operational understanding of cognitive radioTopi Tuukkanen, Jukka Anteroinen. 1-9 [doi]
- Bridging Semantic Interoperability gaps with SILFReginald Ford, Bjorn Jervell Hansen, David Hanz, Sven Kuehne, Mark Last, Vahid Mojtahedzadeh, Dariusz Nogalski, Leopoldo Santos, Fulya Tuncer, Michael Wunder. 1-11 [doi]
- Optimizing contention based access methods for FBMC waveformsBaher Mawlawi, Jean-Baptiste Dore, Vincent Berg. 1-6 [doi]
- Development of cyber security testbed for critical infrastructureJacek Jarmakiewicz, Krzysztof Maslanka, Krzysztof Parobczak. 1-10 [doi]
- Middleware for coordinating a tactical router with SOA servicesNorman Jansen, Daniel Krämer, Christoph Barz, Julia Niewiejska, Marc Spielmann. 1-7 [doi]
- Cyber attacking tactical radio networksKimmo Heinäaro. 1-6 [doi]
- Military HF communications considering unintentional platform-generated electromagnetic interferencePatrik Eliardsson, Erik Axell, Peter F. Stenumgaard, Kia Wiklundh, Bjorn Johansson, Börje Asp. 1-6 [doi]
- Challenges for network aspects of Cognitive RadioStefan Couturier, Jaroslaw Krygier, Ole Ingar Bentstuen, Vincent Le Nir. 1-10 [doi]
- Policy-based labelling: A flexible framework for trusted data labellingKyrre Wahl Kongsgård, Nils Agne Nordbotten, Stian Fauskanger. 1-10 [doi]
- Performance of MPR-based broadcast methods in mobile ad hoc networks for rural terrainsJan Nilsson, Ulf Sterner. 1-7 [doi]
- Representing multi-national rules of engagement using ontologies and rules as constraints for courses of actionLeopoldo Santos, Mario de la Fuente Martin, Juan Jose Perez, Carlos Rodríguez-Solano, Miguel-Ángel Sicilia. 1-5 [doi]
- Technology-agnostic traffic engineering in a multinational networkPierre Simon, Norbert Bret. 1-6 [doi]
- Measuring and limiting the covert channel risk of XML document transmissionPhilipp Steinmetz. 1-9 [doi]
- Accumulated state densities and their use in decorrelated track-to-track fusionWolfgang Koch 0001, Felix Govaers. 1-9 [doi]
- A tool for matching crowd-sourced and authoritative geospatial dataHeshan Du, Natasha Alechina, Glen Hart, Michael Jackson. 1-8 [doi]
- Ephemeral classification of mobile terminalsFederico Mancini 0001, Anders Fongen. 1-12 [doi]
- Consensus algorithms for distributed spectrum sensing based on goodness of fit test in cognitive radio networksDjamel Teguig, Bart Scheers, Vincent Le Nir, François Horlin. 1-5 [doi]
- On improving connectivity and network efficiency in a heterogeneous military environmentPiotr Lubkowski, Mariann Hauge, Lars Landmark, Christoph Barz, Peter Sevenich. 1-9 [doi]
- Evaluation of open-source software frameworks for high fidelity simulation of cognitive radio networksVincent Le Nir, Bart Scheers. 1-6 [doi]
- Analysis of a modified Switchable Bayesian Learning Automaton for Cognitive RadioHanna Werker, Stefan Couturier, Daniel Rauschen, Marc Adrat, Markus Antweiler. 1-5 [doi]
- Attribute pooling for Cryptographic Access ControlMikko Kiviharju. 1-12 [doi]
- Cryptanalysis of alternating step generatorsRobert Wicik, Rafal Gliwa, Piotr Komorowski. 1-6 [doi]
- Robustness of trust-based protection (TUBE) scheme to reputation attacks in military mobile ad-hoc networksJoanna Glowacka, Marek Amanowicz, Marcin Glowacki. 1-10 [doi]
- Network coding in military wireless ad hoc and sensor networks: Experimentation with GardiNetIchrak Amdouni, Cédric Adjih, Thierry Plesse. 1-9 [doi]
- Performance of distributed clustering with weighted optimization algorithm for MANET Cognitive RadioWojciech Bednarczyk, Piotr Gajewski. 1-5 [doi]
- Security threats in military cognitive radio networksFeten Slimeni, Bart Scheers, Zied Chtourou. 1-10 [doi]
- An efficiency of broadcast mechanisms based on Cluster Heads in clusterized radio networkWojciech Bednarczyk, Jerzy Dolowski, Jaroslaw Michalak. 1-6 [doi]
- Cross-layer analysis of malware datasets for malicious campaigns identificationMichal Kruczkowski, Ewa Niewiadomska-Szynkiewicz, Adam Kozakiewicz. 1-7 [doi]
- On the performance of packet-pair based path capacity estimation in wireless Ad Hoc networksEspen Flydahl, Mariann Hauge, Lars Landmark. 1-9 [doi]
- Design and implementation of multilevel security subsystem based on XACML and WEB servicesJacek Jarmakiewicz, Tomasz Podlasek. 1-8 [doi]
- Cyberspace situational awarness in national security systemRafal Piotrowski, Joanna Sliwa. 1-6 [doi]
- Distributing the disruptionArild Bergh. 1-6 [doi]
- Efficient SOAP messaging for AndroidFrank T. Johnsen, Trude Hafsøe Bloebaum, Dag Ove Eggum. 1-9 [doi]
- Wideband spectrum sensing technique based on Goodness-of-Fit testingBart Scheers, Djamel Teguig, Vincent Le Nir. 1-6 [doi]
- Towards a transport network for FMN based on the PCN conceptOle Ingar Bentstuen, Petter Kristiansen. 1-6 [doi]
- Enhancing visual communications capabilities in tactical networksJames Nightingale, Qi Wang, Jose M. Alcaraz Calero, Ian Owens, Christos Grecos. 1-9 [doi]
- Faults detection schemes for PP-2 cipherEwa Idzikowska. 1-4 [doi]
- Capacity benefits of airborne nodes in ad hoc networks with broadcast trafficSara Örn Tengstrand, Sara Linder, Karina M. Fors, Ulf Sterner. 1-6 [doi]
- Secure DRM mechanism for offline applicationsAdam Kozakiewicz, Krzysztof Lasota. 1-8 [doi]
- Analysis of a CFAR correlation radiometerHarri Saarnisaari. 1-5 [doi]
- Secure and efficient routing by Leveraging Situational Awareness Messages in tactical edge networksRonggong Song, J. David Brown, Helen Tang, Mazda Salmanian. 1-8 [doi]
- Recommendations for increased efficiency of Web services in the tactical domainFrank T. Johnsen, Trude Hafsøe Bloebaum, Kristoffer R. Karud. 1-11 [doi]
- Efficiency of the Single Sign On mechanism in a tactical network environmentJoanna Sliwa, Tomasz Podlasek, Robert Matyszkiel, Boguslaw Grochowina. 1-7 [doi]
- An attempt at defining cyberdefense situation awareness in the context of command & controlWim Mees, Thibault Debatty. 1-9 [doi]
- Advanced security gateways for heterogeneous tactical ad hoc networksChristoph Barz, Florian Quinkert. 1-6 [doi]
- The construction of nonlinear feedback shift registers of small ordersJanusz Szmidt, Przemyslaw Dabrowski. 1-4 [doi]
- An open process for software development in classified environments as prerequisite for military app storesThomas Kudla, Markus Esch, Daniel Ota, Gerhard Schwarz. 1-9 [doi]
- The MIP Information Model - A semantic reference for Command & ControlMichael Gerz, Melissa Mulikita, Nico Bau, Fahrettin Gökgöz. 1-11 [doi]
- A high assurance cross-domain guard for use in Service-Oriented ArchitecturesRaymond Haakseth, Nils Agne Nordbotten, Oyvind Jonsson, Bengt Kristiansen. 1-8 [doi]