Abstract is missing.
- On the creation of a single mission-wide information domain in military operations: Application of the information clearing house and release gateway at NATO exercise Trident Juncture 2015Michael Rudack, Cristina Palacios-Camarero, Hermann Wietgrefe. 1-7 [doi]
- Radiated radio-frequency hazards with electric detonators: Influence of wiring configuration, dipole vs V-antennaC. Tsigros, T. Gilles, M. Piette. 1-7 [doi]
- The infinite source of random sequences for classified cryptographic systemsMariusz Borowski. 1-6 [doi]
- Emitter signal sorting based on fractal dimensions of pulse envelope's front edgeQiXiang Fu, Cheng Li, Feiyang Cai, Wei Wang, ShunPing Xiao. 1-5 [doi]
- Assessing NATO policy alignment through text analysis: An initial studyP. T. Eles, B. Pennell, M. Richter. 1-7 [doi]
- Micro-Doppler period estimation from ballistic targets with precessionXiao-yi Pan, Qi-xiang Fu, Zhao-yu Gu, Yongcai Liu, Wei Wang 0187. 1-6 [doi]
- Performance of distributed channel selection for cognitive MANET in the presence of intentional jammingGrzegorz Szmit, Jerzy Dolowski, Jerzy Lopatka. 1-6 [doi]
- RSS-based secret key generation for indoor and outdoor WBANs using on-body sensor nodesThijs Castel, Patrick Van Torre, Hendrik Rogier. 1-5 [doi]
- Recommendations for realizing SOAP publish/subscribe in tactical networksTrude Hafsøe Bloebaum, Frank T. Johnsen, Marianne R. Brannsten, Jose M. Alcaraz Calero, Qi Wang, James Nightingale. 1-8 [doi]
- Labelling for integrity and availabilityJohn Melrose, Konrad S. Wrona, Thomas Guenther, Raymond Haakseth, Nils Nordbotten, Lars Westerdahl. 1-8 [doi]
- An adaptable multimodal crew assistance system for NATO generic vehicle architectureManas Pradhan, Daniel Ota. 1-8 [doi]
- Evolving military broadband wireless communication systems: WiMAX, LTE and WLANPaula Fraga-Lamas, Luis Castedo Ribas, Antonio Morales-Méndez, J. M. Camas-Albar. 1-8 [doi]
- Compensation of imperfect channel reciprocity through MMSE prediction for physical-layer confidentiality enhancementHao Li, Xianbin Wang, Helen Tang. 1-6 [doi]
- Assisted content-based labelling and classification of documentsKonrad S. Wrona, Sander Oudkerk, Alessandro Armando, Silvio Ranise, Riccardo Traverso, Lisa Ferrari, Richard McEvoy. 1-7 [doi]
- Rotational motion estimaiton of high-resoluiton ISAR imaigng for manuvering targetsGang Xu, Lei Yang, Song Zhou, Guoan Bi. 1-5 [doi]
- The Italian Army C2 evolution: From the current SIACCON2 land command & control system to the LC2EVO using "agile" software development methodologyAngelo Messina, Franco Fiore. 1-8 [doi]
- A review of modeling toolbox for BigDataHadi Hashem, Daniel Ranc. 1-6 [doi]
- Comparing the capacity of cooperative broadcast to spatial reuse TDMA in ad hoc networksArwid Komulainen, Jimmi Grönkvist, Jan Nilsson. 1-7 [doi]
- Sensor networking and integration: A proof-of-concept experimentKetil Lund, Eirik Skjelbreid Grimstvedt, Morten Aronsen, Erlend Larsen, Robert MacDonald. 1-7 [doi]
- On box-operations for L-Values and their applicability to soft-decision algorithmsMarc Adrat, Matthias Tschauner, N. Bebawi, Markus Antweiler, B. Eschbach, Peter Vary. 1-5 [doi]
- Receiver design for non-linear satellite channels: Equalizer training and symbol detection on the compressed constellationMarc Bauduin, Serge Massar, François Horlin. 1-6 [doi]
- A model for usability testing in challenging environmentsRiku Luostarinen, Risto Järvinen, Juho Määttä, Jukka Manner. 1-6 [doi]
- Short range HF radio channel measurements: Search for one path channelsHarri Saarnisaari, Veikko Hovinen, Hannu Tuomivaara, Juha Yli-Kaakinen. 1-6 [doi]
- Dynamic channel and transmit-power adaptation of WiFi mesh-networks in search and rescue operationsMuhammad Hafeez Chaudhary, Bart Scheers. 1-8 [doi]
- Towards a tactical software defined networkJon Spencer, Olwen Worthington, Robert E. Hancock, Eleanor Hepworth. 1-7 [doi]
- Delay analysis of STDMA in grid wireless sensor networksIchrak Amdouni, Cédric Adjih, Pascale Minet, Thierry Plesse. 1-8 [doi]
- A realistic military scenario and emulation environment for experimenting with tactical communications and heterogeneous networksNiranjan Suri, Anders Hansson, Jan Nilsson, Piotr Lubkowski, Kelvin Marcus, Mariann Hauge, King Lee, Boyd Buchin, Levent Misirhoglu, Markus Peuhkuri. 1-8 [doi]
- Sweep jamming hit rate analysis for frequency agile communicationsHarri Saarnisaari. 1-6 [doi]
- Electromagnetic influence of a ballistic protection structure around an armored infantry vehicle on its jamming performanceIr Thi My Dung Tran, Thierry Gilles. 1-7 [doi]
- Multicarrier modulation for HF communicationsJuha Yli-Kaakinen, Markku Renfors, Hannu Tuomivaara. 1-7 [doi]
- Software-defined networking for low-latency 5G core networkJeremy Page, Jean-Michel Dricot. 1-7 [doi]
- Analysis of cooperative relaying in an urban scenarioGunnar Eriksson, Sara Linder. 1-5 [doi]
- RESA-OLSR: RESources-aware OLSR-based routing mechanism for mobile ad-hoc networksJanusz Romanik, Adam Krasniewski, Edward Golan. 1-6 [doi]
- Reliable full motion video services in disadvantaged tactical radio networksJames Nightingale, Qi Wang, Jose M. Alcaraz Calero, Ian Owens, Frank Trethan Johnsen, Trude Hafsoe Bloebaum, Marco Manso. 1-9 [doi]
- Extending OLSRv2 for tactical applicationsChristoph Barz, Christoph Fuchs 0003, Jonathan Kirchhoff, Julia Niewiejska, Henning Rogge. 1-8 [doi]
- TACTICS TSI architecture: A European reference architecture for tactical SOAAnne Diefenbach, Tobias Ginzler, Sam McLaughlin, Joanna Sliwa, Thorsten A. Lampe, Christoph Prasse. 1-8 [doi]
- On the Internet of Nano Things in healthcare networkJacek Jarmakiewicz, Krzysztof Parobczak, Krzysztof Maslanka. 1-6 [doi]
- Software-defined wireless communications and positioning device for IoT developmentMuhammad Hafeez Chaudhary, Bart Scheers. 1-8 [doi]
- A rational multiparty information exchange model using extensive gamesAlberto Campos, Viet Pham. 1-8 [doi]
- Developing a NATO BYOD security policyAlessandro Armando, Gabriele Costa 0001, Alessio Merlo, Luca Verderame, Konrad S. Wrona. 1-6 [doi]
- Robust spectrum sensing algorithms under noise uncertaintyXavier Leturc, Christophe J. Le Martret, Philippe Ciblat. 1-7 [doi]
- Learning multi-channel power allocation against smart jammer in cognitive radio networksFeten Slimeni, Bart Scheers, Vincent Le Nir, Zied Chtourou, Rabah Attia. 1-7 [doi]
- Joint protection of a military formation using heterogeneous sensors in a mobile ad hoc network: Concept and field testsJulian Hörst, Felix Govaers, Berthold Rehbein, Christoph Barz, Peter Sevenich. 1-8 [doi]
- Attack-tolerant networked control system in presence of the controller hijacking attackAmer Atta Yaseen, Mireille Bayart. 1-8 [doi]
- Complex event processing for content-based text, image, and video retrievalElizabeth K. Bowman, Barbara D. Broome, V. Melissa Holland, Douglas Summers-Stay, Raghuveer M. Rao, John Duselis, Jonathan Howe, Bhopinder K. Madahar, Anne-Claire Boury-Brisset, Bruce Forrester, Peter Kwantes, Gertjan Burghouts, Jasper van Huis, Adem Yasar Mülayim. 1-6 [doi]
- Adapting standard tactical applications for a military disruption-tolerant networkMarek Malowidzki, T. Dalecki, Przemyslaw Berezinski, M. Mazur, P. Skarzynski. 1-5 [doi]
- Analyzing the applicability of Internet of Things to the battlefield environmentNiranjan Suri, Mauro Tortonesi, James Michaelis, Peter Budulas, Giacomo Benincasa, Stephen M. Russell, Cesare Stefanelli, Robert Winkler. 1-8 [doi]
- A method of network workload generation for evaluation of intrusion detection systems in SDN environmentDamian Jankowski, Marek Amanowicz. 1-7 [doi]
- A novel OFDM sensing method based on CAF-max for hybrid detectors architectureKrzysztof Kosmowski, Marek Suchanski, Józef Pawelec, Mateusz Kustra. 1-4 [doi]
- Influence of the frequency stability on the emitter position in SDF methodJan M. Kelner, Cezary Ziólkowski, Piotr E. Marszalek. 1-6 [doi]