Abstract is missing.
- Limiting the flooding of simplified multicast forwarding to a defined scopeMariann Hauge, Lars Landmark. 1-8 [doi]
- Hybrid sensing method of real OFDM signalMateusz Kustra, Krzysztof Kosmowski, Marek Suchanski. 1-6 [doi]
- Jamming of UAV remote control systems using software defined radioKarel Pärlin, Muhammad Mahtab Alam, Yannick Le Moullec. 1-6 [doi]
- Applicability of risk analysis methods to risk-aware routing in software-defined networksSebastian Szwaczyk, Konrad S. Wrona, Marek Amanowicz. 1-7 [doi]
- Trust management in tactical coalition software defined networksAnders Fongen, Geir M. Køien. 1-8 [doi]
- Multiple jammer localization and transmission power estimation for radio environment mapVincent Le Nir, Bart Scheers. 1-5 [doi]
- A study on flow features selection for malicious activities detection in software defined networksDamian Jankowski, Marek Amanowicz. 1-9 [doi]
- Passive radio system for real-time drone detection and DoA estimationSanjoy Basak, Bart Scheers. 1-6 [doi]
- Data rate change algorithms for efficient HF communicationsVasco Sequeira, Maria Paula Queluz, António Rodrigues, Jose E. Sanguino, Pedro Grifo. 1-7 [doi]
- Measuring the coverage of requirements through enterprise architecture modelsStefan Apelt, Hanna Geppert, Hussein Hasso, Thomas Kudla. 1-5 [doi]
- Performance analysis of OLSRv2 with ETX, ETT and DAT metrics in static wireless networksJanusz Romanik, Rafal Brys, Krzysztof Zubel. 1-7 [doi]
- From situation awareness to intelligence: Increasing complexity in fusion models for sense-makingKsawery Krenc, Vincent Nimier, Kellyn Rein, Lauro Snidaro, Joachim Biermann, Jesús García 0001. 1-5 [doi]
- Modular verification and validation for NATO generic vehicle architecture-based land platformsDaniel Ota, Manas Pradhan. 1-7 [doi]
- Digital relay with multiple virtual bent-pipe relay channels for TSVCIS and FM voice on SDRAaron E. Cohen. 1-7 [doi]
- End-to-end optimization for tactical cognitive radio networksStefan Couturier, Timo Bräysy, Boyd Buchin, Jaroslaw Krygier, Vincent Le Nir, Niels Smit, Topi Tuukkanen, Erik Verheul. 1-8 [doi]
- Radio environment maps for military cognitive networks: Construction techniques vs. map qualityMarek Suchanski, Pawel Kaniewski, Janusz Romanik, Edward Golan. 1-5 [doi]
- Optimization of the MANET topology in urban area using redundant relay pointsKrzysztof Malon, Pawel Skokowski, Jerzy Lopatka. 1-4 [doi]
- Search of phony accounts on Facebook: Ukrainian caseOleg Chertov, Taras Rudnyk, Oleksandr Palchenko. 1-4 [doi]
- Spectrum window based signal detection at low SNRHarri Saarnisaari, Johanna Vartiainen. 1-5 [doi]
- Using MQTT to support mobile tactical force situational awarenessMarco Manso, Frank T. Johnsen, Ketil Lund, Kevin S. Chan. 1-6 [doi]
- An approach to measurement-based tactical radio modeling and real time emulationChristoph Barz, Christoph Fuchs 0003, Jonathan Kirchhoff, Michael Krzyzek, Nadine Brück. 1-5 [doi]
- Application of Bluetooth low energy protocol for communication in mobile networksAndrzej Sikora, Mateusz Krzyszton, Michal Marks. 1-6 [doi]
- Towards an active, autonomous and intelligent cyber defense of military systems: The NATO AICA reference architecturePaul Théron, Alexander Kott, Martin Drasar, Krzysztof Rzadca, Benoît Leblanc, Mauno Pihelgas, Luigi V. Mancini, Agostino Panico. 1-9 [doi]
- Bridging the gap between enterprise and tactical networks via mission- and network-sensitive adaptationGiacomo Benincasa, Larry Bunch, Enrico Casini, Rita Lenzi, Alessandro Morelli, Matthew S. Paulini, Niranjan Suri, Andrzej Uszok. 1-8 [doi]
- Handling vulnerabilities with mobile agents in order to consider the delay and disruption tolerant characteristic of military networksThorsten Aurisch, Andreas Jacke. 1-7 [doi]
- Bit-interleaved polar coded modulation with iterative decodingSouradip Saha, Matthias Tschauner, Marc Adrat, Tim Schmitz, Peter Jax, Peter Vary. 1-8 [doi]
- Multicarrier waveform processing for HF communicationsJuha Yli-Kaakinen, Juuso Alhava, Markku Renfors, Hannu Tuomivaara. 1-8 [doi]
- On the performance of using CSMA for broadcast traffic in tactical ad hoc networksArwid Komulainen, Jimmi Grönkvist, Ulf Sterner. 1-7 [doi]
- Synchronization retrieval and image reconstruction of a video display unit exploiting its compromising emanationsPieterjan De Meulemeester, Luc Bontemps, Bart Scheers, Guy A. E. Vandenbosch. 1-7 [doi]
- Location constrained jamming: Surgical link removal using local graph partitioningJonah Eisen, Susan Watson, Tricia J. Willink. 1-7 [doi]
- A cloud-based architecture for an interoperable, resilient, and scalable C2 information systemNico Bau, Sven Endres, Michael Gerz, Fahrettin Gökgöz. 1-7 [doi]
- A general approach to health monitoring & fault diagnosis of unmanned ground vehiclesYoussef Mahmoud Youssef, Daniel Ota. 1-8 [doi]
- A secure group communication approach for tactical network environmentsFilippo Poltronieri, Roberto Fronteddu, Cesare Stefanelli, Niranjan Suri, Mauro Tortonesi, Matthew S. Paulini, James R. Milligan. 1-8 [doi]
- Cooperative system of emission source localization based on SDFJan M. Kelner. 1-6 [doi]
- Civilian and military information infrastructure and the control of the Russian segment of InternetJuha Kukkola. 1-8 [doi]
- The angloval tactical military scenario and experimentation environmentNiranjan Suri, Jan Nilsson, Anders Hansson, Ulf Sterner, Kelvin Marcus, Levent Misirlioglu, Mariann Hauge, Markus Peuhkuri, Boyd Buchin, Ronald in 't Velt, Maggie R. Breedy. 1-8 [doi]
- Application of IoT in military operations in a smart cityFrank T. Johnsen, Zbigniew Zielinski, Konrad S. Wrona, Niranjan Suri, Christoph Fuchs 0003, Manas Pradhan, Janusz Furtak, Bogdan Vasilache, Vincenzo Pellegrini, Michal Dyk, Michal Marks, Mateusz Krzyszton. 1-8 [doi]
- Assessment of cognitive radio networks through military capability development viewpointTopi Tuukkanen, Stefan Couturier, Boyd Buchin, Timo Bräysy, Jaroslaw Krygier, Erik Verheul, Vincent Le Nir, Niels Smit. 1-8 [doi]
- Graph-based APT detectionThibault Debatty, Wim Mees, Thomas Gilon. 1-8 [doi]
- Deep learning NATO document labels: A preliminary investigationMarc Richter, Michael Street, Peter Lenk. 1-9 [doi]
- Realizing overlay Xcast in a tactical service infrastructure: An approach based on a service-oriented architectureAnne Diefenbach, Roberto Rigolin Ferreira Lopes, Thorsten A. Lampe, Christoph Prasse, Joanna Sliwa, Robert Goniacz, Antti Viidanoja. 1-8 [doi]
- On the simulation of correlated mobile-to-mobile fading channels for time-varying velocitiesStéphane Imbert, Xavier Leturc, Christophe J. Le Martret. 1-8 [doi]
- TAKE - Tactical ad-hoc network emulationSimon Ruffieux, Christophe Gisler, Jean-Frédéric Wagen, François Buntschu, Gérôme Bovet. 1-8 [doi]
- A queuing mechanism for delivering QoS-constrained web services in tactical networksRoberto Rigolin Ferreira Lopes, Antti Viidanoja, Maximilien Lhotellier, Anne Diefenbach, Norman Jansen, Tobias Ginzler. 1-8 [doi]
- A comparative analysis of visualisation techniques to achieve cyber situational awareness in the militarySalvador Llopis, Javier Hingant, Israel Pérez, Manuel Esteve, Federico Carvajal, Wim Mees, Thibault Debatty. 1-7 [doi]
- Full-duplex radio technology for simultaneously detecting and preventing improvised explosive device activationTaneli Riihonen, Dani Korpi, Matias Turunen, Mikko Valkama. 1-4 [doi]