Abstract is missing.
- Welcome message [doi]
- Insider attack detection using weak indicators over network flow dataRoberto Pagliari, Abhrajit Ghosh, Yitzchak M. Gottlieb, Ritu Chadha, Akshay Vashist, Gregory Hadynski. 1-6 [doi]
- Enforcing agile access control policies in relational databases using viewsNicolas Papernot, Patrick D. McDaniel, Robert J. Walls. 7-12 [doi]
- TREND: Trust estimation system for wireless networks via multi-pronged detectionRitu Chadha, Abhrajit Ghosh, Alexander Poylisher, Constantin Serban. 13-18 [doi]
- Proactive restart as cyber maneuver for AndroidZhiyong Shan, Iulian Neamtiu, Zhiyun Qian, Don Torrieri. 19-24 [doi]
- Stealthy attacks meets insider threats: A three-player game modelXiaotao Feng, Zizhan Zheng, Pengfei Hu, Derya Cansever, Prasant Mohapatra. 25-30 [doi]
- A framework to evaluate cyber agilityLisa M. Marvel, Scott E. Brown, Iulian Neamtiu, Richard E. Harang, David Harman, Brian Henz. 31-36 [doi]
- An architecture for secure interoperability between coalition tactical MANETsMazda Salmanian, J. David Brown, Susan Watson, Ronggong Song, Helen Tang, Darcy Simmelink. 37-42 [doi]
- Customizable sponge-based authenticated encryption using 16-bit S-boxesMatthew Kelly, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski. 43-48 [doi]
- Constructing large S-boxes with area minimized implementationsChristopher A. Wood, Stanislaw P. Radziszowski, Marcin Lukowiak. 49-54 [doi]
- Covert communication based privacy preservation in mobile vehicular networksRasheed Hussain, Donghyun Kim 0001, Alade O. Tokuta, Hayk M. Melikyan, Heekuck Oh. 55-60 [doi]
- Secure distributed storage for information dissemination and retrieval at the tactical edgeReece Johnston, Sun-il Kim. 61-66 [doi]
- Effective steganographic filter based on Raspberry Pi 2 architectureKrzysztof Sawicki, Zbigniew Piotrowski, Damian Bachmat. 67-72 [doi]
- Understanding the impact of RADAR interference on IEEE 802.11 MAC in spectrum sharing environmentsVenkatesh Ramaswamy, Jeffrey T. Correia. 73-78 [doi]
- Multi-round transmission protocol with multipacket reception for multirate IEEE802.11 WLANsVictor Sandoval-Curmina, Ramón Parra-Michel, Aldo G. Orozco-Lugo. 79-84 [doi]
- MR-CRDSA: Multiple reservation-contention resolution diversity slotted ALOHA for battle-field communicationYunseong Lee, Jinseok Lee, JaeSung Lim, Hong-Jun Noh, Hyungwon Park. 85-90 [doi]
- Investigations on network-wide load balancing for proportional fair scheduling based TDMA cellular systemsVenkatesh Ramaswamy. 91-96 [doi]
- A Concurrent CSMA MAC protocol for Mobile Ad Hoc Networks using beamnullingHemant Saggar, Yi Jiang, Babak Daneshrad, Greg Pottie. 97-102 [doi]
- Distributed MAC for connectivity maximization of interference limited un-coordinated DSA networksOsama Abbas Al Tameemi, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua. 103-108 [doi]
- Rate adaptation algorithm for multicast communication in tactical networksSyamsul Rizal, Dwi Agung Nugroho, Seung-Hwan Kim 0003, Dong Seong Kim. 109-114 [doi]
- PIM-MANET: Extension to PIM for multicast routing in MANETsRahul Amin, Greg Kuperman. 115-120 [doi]
- Networking for next generation NBWF radiosLi Li 0009, Humphrey Rutagemwa, J. Hu, Phil Hugg, Phil J. Vigneron, Colin Brown, Thomas Kunz. 121-126 [doi]
- Experiment and field demonstration of serverless group communicationCarrie Spiker, Rodolfo Santiago, Thomas Goff, Claudiu Danilov, Jae H. Kim, Brian Adamson, David Shur, Kyriakos Manousakis. 127-132 [doi]
- Evaluation of OpenFlow load balancing for navyRaheleh B. Dilmaghani, Dae Kwon. 133-138 [doi]
- Software-defined dynamic power-control and directional-reuse protocol for TDMA radiosGeorge F. Elmasry, Brian Aanderud, Wayne Kraus, Robert J. McCabe. 139-144 [doi]
- Scalable multimedia optimization in MIMO systemsSeok Ho Chang, Jihwan P. Choi, Pamela C. Cosman, Laurence B. Milstein. 145-150 [doi]
- Statistical-QoS based gaming for optimal power allocations over virtualized wireless relay networks supporting multimedia servicesQixuan Zhu, Xi Zhang. 151-156 [doi]
- A novel video saliency map detection model in compressed domainJun Xu, Xiaoqiang Guo, Qin Tu, Cuiwei Li, Aidong Men. 157-162 [doi]
- On MIMO SATCOM capacity analysis: Utilising polarization and spatial multiplexingBalachander Ramamurthy, William G. Cowley, Linda M. Davis, Gerald Bolding. 163-168 [doi]
- Distributed policy enforcement for priority awareness in tactical SATCOM networksJohn Sucec, Mariusz A. Fecko, Baron Ong, Wei Liu, Sheetal Doshi, Kurt Turck. 169-174 [doi]
- Performance considerations for protected wideband satcomThomas C. Royster IV, James Streitman. 175-180 [doi]
- Implementation and testing of the Protected Tactical Waveform (PTW)Brian J. Wolf, Jacob C. Huang. 181-186 [doi]
- Contributions to MUOS communication link assessments at the Arctic Circle locationsJonathon Cheah. 187-192 [doi]
- Next-generation wireless WAN transmission systems in support of NATO Expeditionary OperationsLuis Bastos, Hermann Wietgrefe. 193-198 [doi]
- Multimodal target detection via integrated GLRTSteven Kay, Fuat Cogun. 199-203 [doi]
- A portable SIMO radar for through wall detection and imagingDavid Boutte, Hua Lee, Vincent Radzicki, Allan R. Hunt. 204-209 [doi]
- Localization of illegal radios utilizing cross-correlation of channel impulse response with interpolation in urban scenariosAzril Haniz, Gia Khanh Tran, Kei Sakaguchi, Jun-ichi Takada, Daisuke Hayashi, Toshihiro Yamaguchi, Shintaro Arata. 210-215 [doi]
- Underwater DoA estimation based on nested arrayNa Wu, Qilian Liang. 216-221 [doi]
- Probable regions for emitter localizationYiu-Tong Chan, François Chan, William Read, Robert J. Inkol, Brad R. Jackson, B. Haynes Lee. 222-227 [doi]
- Threshold estimation for UWB single pulse radarHyunwoo Cho, Xiaoli Ma. 228-232 [doi]
- Quantization bit allocation for reporting-throughput tradeoff in cooperative cognitive radio networksIntae Shin, Wonju Lee, Jinkyu Kang, Joonhyuk Kang, Saleh Al-Araji. 233-237 [doi]
- Missing spectrum-data recovery in cognitive radio networks using piecewise constant Nonnegative Matrix FactorizationAlireza Zaeemzadeh, Mohsen Joneidi, Behzad Shahrasbi, Nazanin Rahnavard. 238-243 [doi]
- Cognitive radio unified Spectral efficiency and Energy Efficiency trade-off analysisGang Wang, Khanh D. Pham, Erik Blasch, Tien Manh Nguyen, Dan Shen, Xin Tian 0002, Genshe Chen. 244-249 [doi]
- Estimating the use of spectrum for defining and enforcing the spectrum access rightsNilesh Khambekar, Vipin Chaudhary, Chad M. Spooner. 250-257 [doi]
- Compressed spectrum sensing based on correlation of spectrum occupation states between sensing periodsYanbo Wang, Caili Guo, Xuekang Sun, Chunyan Feng. 258-262 [doi]
- Mixed signal detection and symbol rate estimation based on spectral coherent featuresDong Li, John Ellinger, Zhiqiang Liu, Zhiqiang Wu 0001, Zhiping Zhang. 263-268 [doi]
- Anomaly-based intrusion detection of protocol-aware jammingMarc Lichtman, Jeffrey H. Reed. 269-274 [doi]
- Emulated CP jamming and nulling attacks on SC-FDMA and two novel countermeasuresJasmin A. Mahal, Chowdhury Shahriar, T. Charles Clancy. 275-280 [doi]
- On physical layer security for cognitive radio networks with primary user interferenceLouis Sibomana, Hung Tran, Hans-Jürgen Zepernick. 281-286 [doi]
- Secure information transmission in filter bank multi-carrier spread spectrum systemsArslan Javaid Majid, Hussein Moradi, Behrouz Farhang-Boroujeny. 287-293 [doi]
- Out-phased array linearized signaling (OPALS): A practical approach to physical layer encryptionEric R. Tollefson, Bruce R. Jordan, Joseph D. Gaeddert. 294-299 [doi]
- Exhaustive attack analysis of BBC with glowworm for unkeyed jam resistanceLeemon C. Baird, Bill Parks. 300-305 [doi]
- Efficient multicast in hybrid wireless networksPrithwish Basu, Chi-Kin Chau, Andrei Iu. Bejan, Richard J. Gibbens, Saikat Guha, Matthew P. Johnson. 306-311 [doi]
- Multicast vs. unicast for loss tomography on tree topologiesChang Liu, Ting He, Ananthram Swami, Don Towsley, Theodoros Salonidis, Andrei Iu. Bejan, Paul Yu. 312-317 [doi]
- Computational ontology of network operationsAlessandro Oltramari, Lorrie Faith Cranor, Robert J. Walls, Patrick D. McDaniel. 318-323 [doi]
- Detecting malicious Android applications from runtime behaviorNathaniel Lageman, Mark Lindsey, William J. Glodek. 324-329 [doi]
- Malware traffic detection using tamper resistant featuresZ. Berkay Celik, Robert J. Walls, Patrick D. McDaniel, Ananthram Swami. 330-335 [doi]
- Ecology-inspired cyber risk model for propagation of vulnerability exploitation in tactical edgeJames R. Morris-King, Hasan Cam. 336-341 [doi]
- Adaptive protocol switching using Dynamically Insertable Bumps in the stackDevin J. Pohly, Charles Sestito, Patrick D. McDaniel. 342-347 [doi]
- Detection of stealthy TCP-based DoS attacksAzeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami. 348-353 [doi]
- On reporting of the time of attestation measurementsPeter Kruus, David Challener. 354-359 [doi]
- Dimensional reduction analysis for Physical Layer device fingerprints with application to ZigBee and Z-Wave devicesTrevor J. Bihl, Kenneth W. Bauer Jr., Michael A. Temple, Benjamin W. P. Ramsey. 360-365 [doi]
- Evaluating the capability and performance of access control policy verification toolsAng Li, Qinghua Li, Vincent C. Hu, Jia Di. 366-371 [doi]
- A secured distribution of server loads to clientsHector M. Lugo-Cordero, Ratan K. Guha. 372-377 [doi]
- Comparison of parametric and non-parametric statistical features for Z-Wave fingerprintingHiren J. Patel, Benjamin W. P. Ramsey. 378-382 [doi]
- A Load Balanced Social-Tie Routing strategy for DTNs based on queue length controlTuan Le, Mario Gerla. 383-387 [doi]
- Resilient internetwork routing over heterogeneous mobile military networksLars Landmark, Erlend Larsen, Mariann Hauge, Øivind Kure. 388-394 [doi]
- On the problem of routing in mobile ad hoc wireless networks with directional antennasTyler Ulinskas, Walt Golonka, David Duran. 395-400 [doi]
- Augmenting OLSR with Priority Aware Dynamic Routing for heterogeneous networkingGeorge F. Elmasry, Ben Haan, Robert J. McCabe. 401-406 [doi]
- Inter-domain routing for military mobile networksJoy Na Wang, Joshua Van Hook, Patricia Deutsch. 407-412 [doi]
- Towards a truthful online spectrum auction with dynamic demand and supplyChowdhury Sayeed Hyder, Thomas D. Jeitschko, Li Xiao. 413-418 [doi]
- Low complexity QoE-aware bandwidth allocation for wireless content deliveryHarsha Chenji, Zygmunt J. Haas, Panfeng Xue. 419-425 [doi]
- Distributed channel selection for hierarchical cognitive radio networksGrzegorz Szmit, Jerzy Dolowski, Jerzy Lopatka. 426-431 [doi]
- Enhancement of spectrum utilization in non-contiguous DSA with online defragmentationSuman Bhunia, Vahid Behzadan, Shamik Sengupta. 432-437 [doi]
- Distributed cognitive radio network architecture, SDR implementation and emulation testbedSohraab Soltani, Yalin Evren Sagduyu, Yi Shi, Jason H. Li, Jared Feldman, John Matyjas. 438-443 [doi]
- Mitigation of control plane attacks at the network layerMariusz A. Fecko, Kyriakos Manousakis, Kenneth Young, JaeWon Kang, Andrew Pachulski, Wayne G. Phoel. 444-449 [doi]
- Exploiting military OpSec through open-source vulnerabilitiesJudson C. Dressler, Christopher Bronk, Daniel S. Wallach. 450-458 [doi]
- Mitigating control plane attacks on TDMA-based MAC protocols in mobile wireless networksJaeWon Kang, Mariusz A. Fecko, Kyriakos Manousakis, Kenneth Young. 459-464 [doi]
- An applied model for secure information release between federated military and non-military networksAlberto Domingo, Hermann Wietgrefe. 465-470 [doi]
- Theory and development of cross-layer techniques for localization in environments with Extreme Emitter DensitiesPaul W. Garver, Randal T. Abler, Edward J. Coyle. 471-476 [doi]
- In-system testing of Xilinx 7-Series FPGAs: Part 1-logicHarmish Modi, Peter Athanas. 477-482 [doi]
- Heterogeneous network testbed for tactical communication in shore scenarioFulvio Arreghini, Roberto Agrone, Paolo Danielli, Alessandro Pigni. 483-488 [doi]
- Testing android devices for tactical networks: A hybrid emulation testbed approachConstantin Serban, Alexander Poylisher, Angelo Sapello, Yitzchak M. Gottlieb, C. Jason Chiang, Ritu Chadha. 489-494 [doi]
- Hardware implementation of low-overhead data aided timing and Carrier Frequency Offset correction for OFDM signalsMarko Jacovic, James Chacko, Doug Pfeil, Nagarajan Kandasamy, Kapil R. Dandekar. 495-500 [doi]
- Weak signal blind source separation in Passive Radar System with strong interferenceChengjie Li, Lidong Zhu, Anhong Xie, Zhongqiang Luo. 501-505 [doi]
- Initialized iterative reweighted least squares for automatic target recognitionBrian Millikan, Aritra Dutta, Nazanin Rahnavard, Qiyu Sun, Hassan Foroosh. 506-510 [doi]
- Performance bounds for an OFDM-based joint radar and communications systemJohn R. Krier, Marissa C. Norko, Jeremy T. Reed, Robert J. Baxley, Aaron D. Lanterman, Xiaoli Ma, John R. Barry. 511-516 [doi]
- Coherent MIMO radar range imaging with block sparse recoveryLorenz Weiland, Thomas Wiese, Wolfgang Utschick. 517-522 [doi]
- A joint detection and localization method for non-cooperative DS-SS signalsCan Uysal, Tansu Filik. 523-528 [doi]
- Adaptive calibration of wideband digital beam formers with injection calibrationJoshua P. Bruckmeyer, Ivica Kostanic. 529-533 [doi]
- Power allocation for shared and frequency hopped transponderLan K. Nguyen, Richard B. Wells, Tho Le-Ngoc. 534-540 [doi]
- Decade bandwidth agile GaN power amplifier exceeding 50% efficiencyEarl W. McCune Jr., Dubravko Babic, Richard Booth, Douglas A. Kirkpatrick. 541-546 [doi]
- Limited feedback multi-stage beam-forming method for beyond-Line-of-Sight ducting channelsErgin Dinc, Özgür B. Akan. 547-552 [doi]
- Distributed beamforming from triangular planar random antenna arraysNam Nicholas Ma, Kristopher Buchanan, Jeffrey Jensen, Gregory H. Huff. 553-558 [doi]
- Energy efficient resource allocation for OFDMA two-way relay networks with channel estimation errorZheng Chang, Qianqian Zhang, Xijuan Guo, Zhenyu Zhou, Tapani Ristaniemi. 559-564 [doi]
- A novel MU-MIMO-OFDM scheme with the RBD precoding for the next generation WLANZhanji Wu, Xiang Gao, Yongtao Shi. 565-569 [doi]
- Diversity in synchronization for scheduled OFDM time-division cooperative transmissionQiongjie Lin, Mary Ann Weitnauer. 570-575 [doi]
- Disguised jamming against OFDM transmission through nonlinear amplify-and-forwardHao Li, Xianbin Wang. 576-580 [doi]
- On capacity merits of spectrally efficient FDMDavid Rainnie, Yi Feng, Jan Bajcsy. 581-586 [doi]
- N-continuous OFDM with CP alignmentErtugrul Güvenkaya, Alphan Sahin, Hüseyin Arslan. 587-592 [doi]
- SOA and Wireless Mobile Networks in the tactical domain: Results from experimentsMarco Manso, Jose Maria Alcaraz Calero, Christoph Barz, Trude Hafsoe Bloebaum, Kevin Chan, Norman Jansen, Frank Trethan Johnsen, Garik Markarian, Peter-Paul Meiler, Ian Owens, Joanna Sliwa, Qi Wang. 593-598 [doi]
- Exploring SOAP and REST communication on the Android platformTrude H. Bloebaum, Frank T. Johnsen. 599-604 [doi]
- Evaluating publish/subscribe approaches for use in tactical broadband networksTrude H. Bloebaum, Frank T. Johnsen. 605-610 [doi]
- Multinomial trust in presence of uncertainty and adversaries in DSA networksShameek Bhattacharjee, Mainak Chatterjee, Kevin A. Kwiat, Charles A. Kamhoua. 611-616 [doi]
- IPCA for network anomaly detectionAthanasios Delimargas, Emmanouil Skevakis, Hassan Halabian, Ioannis Lambadaris, Nabil Seddigh, Biswajit Nandy, Rupinder Makkar. 617-622 [doi]
- Cyber reasoning with argumentation: Abstracting from incomplete and contradictory evidenceAndy Applebaum, Karl N. Levitt, Zimi Li, Simon Parsons, Jeff Rowe, Elizabeth Sklar. 623-628 [doi]
- On modeling of adversary behavior and defense for survivability of military MANET applicationsIng-Ray Chen, Robert Mitchell 0001, Jin-Hee Cho. 629-634 [doi]
- A testbed for modeling and detecting attacks on NFC enabled mobile devicesKimberly Gold, Sachin Shetty, Tamara Rogers. 635-640 [doi]
- trustd: Trust daemon experimental testbed for network emulationKevin S. Chan, Jin-Hee Cho, Theron Trout, Jason Wampler, Andrew Toth, Brian Rivera. 641-646 [doi]
- Countermeasure technique to combat greedy behavior in ad-hoc wireless networksJoseph Soryal, Tarek N. Saadawi. 647-652 [doi]
- No time to demodulate - fast physical layer verification of friendly jammingWenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, Peng Ning. 653-658 [doi]
- An SDN-supported collaborative approach for DDoS flooding detection and containmentTommy Chin, Xenia Mountrouidou, Xiangyang Li, Kaiqi Xiong. 659-664 [doi]
- Parallel active dictionary attack on WPA2-PSK Wi-Fi networksOmar Nakhila, Afraa Attiah, Yier Jinz, Cliff Zoux. 665-670 [doi]
- Stealthy edge decoy attacks against dynamic channel assignment in wireless networksAhmed H. Anwar, Janiece Kelly, George K. Atia, Mina Guirguis. 671-676 [doi]
- CSI-unaware scheduling for coexistence of MIMO-OFDMA device-to-device links and cellular mobile terminalsAmitav Mukherjee, Wenhao Xiong, Hyuck M. Kwon. 677-682 [doi]
- A new approach in LTE-A downlink power and transport block managementBilal Al-Doori, Xian Liu. 683-688 [doi]
- A new user scheduling scheme in LTE/LTE-A networks using cross-layer design approachGbolahan Aiyetoro, Fambirai Takawira. 689-694 [doi]
- Wireless mesh backhauling for LTE/LTE-A networksRomain Favraud, Navid Nikaein. 695-700 [doi]
- Network coding for cooperative mobile devices with multiple interfacesYasaman Keshtkarjahromi, Hulya Seferoglu, Rashid Ansari, Ashfaq A. Khokhar. 701-707 [doi]
- A secure geographical routing protocol for highly-dynamic aeronautical networksAmir Swidan, Sherif Khattab, Yasmine Abouelseoud, Hassan M. Elkamchouchi. 708-713 [doi]
- An optimized link scheduling technique for mobile ad hoc networks using directional antennasYifeng Zhou, Yudong Fang, Mike Tanguay. 714-719 [doi]
- Leveraging martingales for robust cognitive radio transmission controlDeborah D. Duran-Herrmann, Yaoqing Yang. 720-725 [doi]
- HMS: Holistic MPR selection and network connectivity for tactical edge networksRonggong Song, J. David Brown, Peter C. Mason, Mazda Salmanian, H. Tang. 726-731 [doi]
- Quantifying the impact of routing and scheduling on throughput for wireless networksJun Sun, Thomas H. Shake, Greg Kuperman, Joshua Van Hook, Aradhana Narula-Tam. 732-737 [doi]
- A distributed, multi-tiered network agent for heterogeneous MANET resource optimizationGeorge F. Elmasry, Brian Aanderud, Timothy Arganbright. 738-743 [doi]
- Cluster-based analysis of 3D MIMO channel measurement in an urban environmentSeun Sangodoyin, Vinod Kristem, C. U. Bas, Martin Käske, Juho Lee, Christian Schneider, Gerd Sommerkorn, J. Zhang, Reiner S. Thomä, Andreas F. Molisch. 744-749 [doi]
- Atmospheric models for over-ocean propagation lossBruce F. McGuffin. 750-755 [doi]
- Nature inspired collaborative team autonomy (NICiTA)Siun-Chuon Mau, Latha A. Kant, Gi Tae Kim, Ritu Chadha. 756-761 [doi]
- DYNAMICS: Inverse mission planning for dedicated aerial communications platformsB. Trent, F. Pozzo, R. Ramanujan, R. Riley, P. O'Neill, C. Banner, G. Heinen. 762-767 [doi]
- Antenna assignment for JALN HCBPeng Wang, Brian Henz. 768-773 [doi]
- BioAIR: Bio-inspired airborne infrastructure reconfigurationBo Ryu, Nadeesha Ranasinghe, Wei-Min Shen, Kurt Turck, Michael Muccio. 774-779 [doi]
- BioAIM: Bio-inspired Autonomous Infrastructure MonitoringBo Ryu, Nadeesha Ranasinghe, Wei-Min Shen, Kurt Turck, Michael Muccio. 780-785 [doi]
- Distributed and dynamic spectrum management in airborne networksZhichuan Huang, David Corrigan, Sandeep Narayanan, Ting Zhu, Elizabeth S. Bentley, Michael J. Medley. 786-791 [doi]
- Tracking a dynamic sparse channel via differential orthogonal matching pursuitXudong Zhu, Linglong Dai, Wei Dai, Zhaocheng Wang, Marc Moonen. 792-797 [doi]
- Temporal correlation based sparse channel estimation for TDS-OFDM in high-speed scenariosZhen Gao, Linglong Dai, Wenqian Shen, Zhaocheng Wang. 798-803 [doi]
- Turbo equalization for waveforms encoded by Reed Solomon codesWenwen Wang, Yong Liang Guan, Ping Yang, Xiaobei Liu. 804-808 [doi]
- Adaptive blind equalizers with whitening filtersWei-Chieh Chang, Jenq-Tay Yuan. 809-814 [doi]
- On the symmetric information rate of CPM in the finite blocklength regimeCenk Sahin, Erik Perrins. 815-819 [doi]
- Complementary code pairs that share the same bandwidth via symmetrical linear FM chipsAdly T. Fam, Ravi Kadlimatti. 820-825 [doi]
- Efficient implementation of multicarrier frequency hopping receiver via polyphase channelizerFred Harris 0001, Xiaofei Chen, Elettra Venosa. 826-830 [doi]
- Polyphase up converter channelizers enable fully digital multi-carrier frequency hopping modulatorsFred Harris 0001, Elettra Venosa, Xiaofei Chen. 831-835 [doi]
- Code selection approach for partitioned cyclic code shift keying to improve multinet capabilityHong-Jun Noh, Jepung Yu, Kyu-Man Lee, JaeSung Lim. 836-841 [doi]
- Partial band noise jamming rejection with S-CFFH/16-QAM optimum and suboptimum maximum-likelihood receivers over rayleigh fading channels with imperfect CSIYishan He, Yufan Cheng, Gang Wu, Binhong Dong, Shaoqian Li. 842-847 [doi]
- Performance analysis of frequency-hopping ad hoc networks with random dwell-time under follower jammingAnders Hansson, Jan Nilsson, Kia Wiklundh. 848-853 [doi]
- Otimization of an adaptive frequency-hopping networkSalvatore Talarico, Matthew C. Valenti, Don Torrieri. 854-859 [doi]
- Performance of frequency hopping D-BLAST MIMO Architecture using LDPC and BPSKJanek J. Mroczek, Michael J. Gans, Laurie L. Joiner. 860-865 [doi]
- Capacity analysis of lattice reduction aided equalizers for MIMO systemsXiaoli Ma, Yiming Kong. 866-871 [doi]
- Power-efficient distributed beamforming for multiple full-duplex MIMO relaysXiaofei Xu, Ming Zhao 0001, Limin Xiao, Xiang Chen, Shidong Zhou, Jing Wang 0001. 872-877 [doi]
- Energy-efficient transmission for linearly precoded MIMO systemsJun Chen, Thomas G. Pratt. 878-883 [doi]
- Wishart-matrix based blind estimation of transmit-antenna number for non-collaborated MIMO systemsYongzhao Li, Tao Li, Meixia Hu, Jianhua Hu, Hailin Zhang. 884-888 [doi]
- The U.S. Army and network-centric warfare a thematic analysis of the literatureHarry D. Tunnell. 889-894 [doi]
- A template based approach to specifying the information needs of military missionsJoseph P. Loyall, Nathaniel Soule, Jeffrey Cleveland, Andrzej Uszok, Larry Bunch, James Milligan. 895-902 [doi]
- Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networksCong Pu, Sunho Lim. 903-908 [doi]
- On detection and concealment of critical roles in tactical wireless networksZhuo Lu, Cliff Wang, Mingkui Wei. 909-914 [doi]
- Use of machine learning in big data analytics for insider threat detectionMichael J. Mayhew, Michael Atighetchi, Aaron Adler, Rachel Greenstadt. 915-922 [doi]
- Using artificial packets for training network payload anomaly detection systemsChockalingam Karuppanchetty, William Edmonds, Sun-il Kim. 923-928 [doi]
- A diagnosis based intrusion detection approachConner Jackson, Karl N. Levitt, Jeff Rowe, Srikanth V. Krishnamurthy, Trent Jaeger, Ananthram Swami. 929-934 [doi]
- Trust management in cross domain operationsAnders Fongen. 935-940 [doi]
- Agent-based Channel Selection scheme against location inference attack in cognitive radio networksHongning Li, Qingqi Pei, Yao Liu. 941-946 [doi]
- Achieving secure friend discovery in social strength-aware PMSNsBen Niu, Yuanyuan He, FengHua Li, Hui Li 0006. 947-953 [doi]
- The KPLT: The Kernel as a shared objectScott Brookes, Martin Osterloh, Robert Denz, Stephen Taylor. 954-959 [doi]
- Relay selection for optimal delay anonymity tradeoff in anonymous networksOmid Javidbakht, Parv Venkitasubramaniam. 960-965 [doi]
- Operational cost of deploying Moving Target Defenses defensive work factorsBrian Van Leeuwen, William M. S. Stout, Vincent Urias. 966-971 [doi]
- A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor NetworksJon R. Ward, Mohamed F. Younis. 972-977 [doi]
- An optimal jamming strategy to partition a wireless networkJixin Feng, Eduardo L. Pasiliao, Warren E. Dixon, John M. Shea. 978-984 [doi]
- Clustering and frequency allocation in frequency hopping tactical networksRavsan Aziz, Gokhan Kilic, Tolga Girici, Tolga Numanoglu, Guven Yenihayat, Halime Koca. 985-990 [doi]
- An implementation of a flexible topology management system for aerial high capacity directional networksJoy Wang, Patricia Deutsch, Andrea Coyle, Thomas H. Shake, Bow-Nan Cheng. 991-996 [doi]
- Cross-layer framework and condition-based topology control for contested environmentsLatha A. Kant, John Lee, Gi Tae Kim, Robert Miller, Sharon Mackey, Derya Cansever, Siamak Samoohi, Mitesh Patel, Frank Panettieri. 997-1001 [doi]
- Internetworking service architecture for transporting mission-critical data over heterogeneous subnetworks with probabilistic guaranteesMatthew F. Carey, Vincent W. S. Chan. 1002-1008 [doi]
- How to get Group key efficiently in mobile ad hoc networks?Xiaozhuo Gu, Zhenhuan Cao, Yongming Wang. 1009-1014 [doi]
- On the smallest pseudo target set identification problem for targeted attack on interdependent power-communication networksArun Das, Chenyang Zhou, Joydeep Banerjee, Arunabha Sen, Lloyd Greenwald. 1015-1020 [doi]
- Bandwidth-aware breach-free barrier construction with VANET nodes for realtime fugitive searchDonghyun Kim 0001, Junggab Son, Wei Wang 0032, Deying Li, Alade O. Tokuta, Sunghyun Cho. 1021-1026 [doi]
- WiEnum: Node enumeration in wireless networksAbhimanyu Venkatraman Sheshashayee, Stefano Basagni. 1027-1032 [doi]
- Compressive and cooperative sensing in distributed mobile sensor networksMinh Tuan Nguyen, Keith A. Teague. 1033-1038 [doi]
- Collision-aware distributed estimation in WSNs using sensor-censoring random accessSeksan Laitrakun, Edward J. Coyle. 1039-1045 [doi]
- Emulation-based study of dynamic service placement in mobile micro-cloudsShiqiang Wang, Kevin S. Chan, Rahul Urgaonkar, Ting He, Kin K. Leung. 1046-1051 [doi]
- Dynamic placement of composite software services in hybrid wireless networksPetr Novotný, Rahul Urgaonkar, Alexander L. Wolf, Bongjun Ko. 1052-1057 [doi]
- Security-aware service migration for tactical mobile micro-cloudsErtugrul N. Ciftcioglu, Kevin S. Chan, Rahul Urgaonkar, Shiqiang Wang, Ting He. 1058-1063 [doi]
- Enhancing dependability through redundancy in military vehicular cloudsRyan Florin, Puya Ghazizadeh, Aida Ghazi Zadeh, Stephan Olariu. 1064-1069 [doi]
- Experimental evaluation of the age of information via emulationClement Kam, Sastry Kompella, Anthony Ephremides. 1070-1075 [doi]
- CAST - RCS tool for modelling versatile size targetsSeppo Horsmanheimo, Arto Hujanen, Lotta Tuomimäki, Jarkko Kylmala. 1076-1080 [doi]
- Weather influence on communication links operating in frequencies over 10 GHz in the inter-andean zones of the Ecuadorian countryCésar Alfredo Naranjo Hidalgo, Eddie E. Galarza. 1081-1086 [doi]
- Tactical Network Modeller simulation toolStuart Marsden, Jouko Vankka. 1087-1092 [doi]
- A tactical network optimization engine using simulationF. Dell Kronewitter. 1093-1098 [doi]
- An approach to data correlation using JC3IEDM modelLuciene Carvalho Correa de Souza, Wallace Anacleto Pinheiro. 1099-1102 [doi]
- Enabling cognition on Electronic CounterMeasure systems against next-generation radarsMuharrem Arik, Özgür Baris Akan. 1103-1108 [doi]
- Charrelation matrix based blind identification of underdetermined mixturesZhongqiang Luo, Lidong Zhu, Chengjie Li. 1109-1113 [doi]
- Detection of single carrier transmission in frequency selective fading channels with symmetric alpha-stable noisePing Yang, Yong Liang Guan, Xiao-Bei Liu, Wenwen Wang. 1114-1119 [doi]
- A log-likelihood ratio for improved receiver performance for VLF/LF communication in atmospheric noiseKia Wiklundh, Karina M. Fors, Peter D. Holm. 1120-1125 [doi]
- Communication over non-Gaussian channels - Part I: Mutual information and optimum signal detectionRamesh Annavajjala, Christopher C. Yu, James M. Zagami. 1126-1131 [doi]
- Communication over non-Gaussian channels - Part II: Channel estimation, mismatched receivers, and error performance with codingRamesh Annavajjala, Christopher C. Yu, James M. Zagami. 1132-1137 [doi]
- Gabor filter polynomial approximation based on a novel evolutionary stochastic techniqueAbigail Fuentes-Rivera, Mingjie Lin, Hector M. Lugo-Cordero. 1138-1143 [doi]
- Broadcast file distribution in a four-node packet radio network with network coding and code-modulation adaptationSiddhartha S. Borkotoky, Michael B. Pursley. 1144-1149 [doi]
- Computational challenges of dynamic channel assignment for military MANETPaul J. Nicholas, Karla L. Hoffman. 1150-1157 [doi]
- Initial acquisition for MANET with simultaneous transmissionsYi Jiang, Babak Daneshrad, Gregory J. Pottie. 1158-1163 [doi]
- Bandwidth and power constrained distributed vector estimation in wireless sensor networksAlireza Sani, Azadeh Vosoughi. 1164-1169 [doi]
- Design of user clustering and precoding for downlink non-orthogonal multiple access (NOMA)Jongmok Kim, Jeongwan Koh, Jinkyu Kang, Kwangeog Lee, Joonhyuk Kang. 1170-1175 [doi]
- Non-orthogonal multiple access with weighted sum-rate optimization for downlink broadcast channelXiaofang Sun, Deborah D. Duran-Herrmann, Zhangdui Zhong, Yaoqing Yang. 1176-1181 [doi]
- Improved error correction for Stanag 4539 appendix H proposal: HF XLCatherine Lamy-Bergot, Jean-Baptiste Chantelouve, Jean-Luc Rogier, Hélène Diakhaté, Benoit Gouin. 1182-1187 [doi]
- Packet error rate analysis of IM/DD systems for ultraviolet scattering communicationsChangming Xu, Hongming Zhang. 1188-1193 [doi]
- End-to-end tracking performance for the enhanced polar system (EPS)Lan K. Nguyen, Ryan K. Vorwerk. 1194-1199 [doi]
- Over-the-air performance of spectrally-efficient CDMA signature setsAnu Saji, James W. Bohl, Ashwin Amanna. 1200-1205 [doi]
- Performance analysis of fifth-generation cellular uplinkDon Torrieri, Salvatore Talarico, Matthew C. Valenti. 1206-1211 [doi]
- Policy-Enhanced Spectrum Operations: Analysis and proof of concept implementationCynthia Hood, Gregory Cox, Stuart Schutta, Anthony Rennier. 1212-1217 [doi]
- A similarity evaluation algorithm and its application in multi-keyword search on encrypted cloud dataPeisong Shen, Chi Chen, Xue Tian, Jing Tian. 1218-1223 [doi]
- A multi-level secure file sharing server and its application to a multi-level secure cloudMark R. Heckman, Roger R. Schell, Edwards E. Reed. 1224-1229 [doi]
- Integrated content-based information security for future military systemsKonrad Wrona, Sander Oudkerk. 1230-1235 [doi]
- Efficient keyword search for public-key settingRui Zhang 0016, Rui Xue. 1236-1241 [doi]
- Privacy aware incentive mechanism to collect mobile data while preventing duplicationJunggab Son, Donghyun Kim 0001, Rasheed Hussain, Alade Tokuta, Sung-Sik Kwon, Jung-Taek Seo. 1242-1247 [doi]
- Effective method to restore data in distributed data storage systemsNikolaos G. Bardis, Nikolaos Doukas, Oleksandr P. Markovskyi. 1248-1253 [doi]
- Modeling fault tolerant architectures with design diversity for secure systemsManuel Rodriguez, Kevin A. Kwiat, Charles A. Kamhoua. 1254-1263 [doi]
- Validation of network simulation model with emulation using example malwareScott E. Brown, Brian Henz, Harold Brown, Michael Edwards, Michael Russell, Jonathan Mercurio. 1264-1269 [doi]
- Use of simulation to achieve better results in cyber military trainingAndre Ferreira Alves Machado, Flavio Augusto Coelho Regueira Costa, Juliana Lucas de Rezende. 1270-1275 [doi]
- Differential power analysis countermeasures for the configuration of SRAM FPGAsWilliam Luis, G. Richard Newell, Kenneth Alexander. 1276-1283 [doi]
- Distributed StealthNet (D-SN): Creating a live, virtual, constructive (LVC) environment for simulating cyber-attacks for test and evaluation (T&E)Gilbert Torres, Kathy Smith, James Buscemi, Sheetal Doshi, Ha Duong, Defeng Xu, H. Kent Pickett. 1284-1291 [doi]
- A comparison of windows physical memory acquisition toolsWaqas Ahmed, Baber Aslam. 1292-1297 [doi]
- HAA: Hardware-Accelerated Authentication for internet of things in mission critical vehicular networksAnkush Singla, Anand Mudgerikar, Ioannis Papapanagiotou, Attila A. Yavuz. 1298-1304 [doi]
- Enhanced recognition of keystroke dynamics using Gaussian mixture modelsHayreddin Çeker, Shambhu J. Upadhyaya. 1305-1310 [doi]
- An HMM-based multi-sensor approach for continuous mobile authenticationAditi Roy, Tzipora Halevi, Nasir D. Memon. 1311-1316 [doi]
- Comparison of PIN- and pattern-based behavioral biometric authentication on mobile devicesYanyan Li, Junshuang Yang, Mengjun Xie, Dylan Carlson, Han Gil Jang, Jiang Bian. 1317-1322 [doi]
- Detecting network-wide traffic anomalies based on robust multivariate probabilistic calibration modelYuchong Li, Xingguo Luo, Bainan Li. 1323-1328 [doi]
- Dynamic relay node selection scheme for multi-hop time synchronization in Link-16Minhwan Cheon, Hoki Baek, JaeSung Lim. 1329-1334 [doi]
- Network-aware stream query processing in mobile ad-hoc networksDan O'Keeffe, Theodoros Salonidis, Peter R. Pietzuch. 1335-1340 [doi]
- Impact of network activity levels on the performance of passive network service dependency discoveryThomas E. Carroll, Satish Chikkagoudar, Kristine Arthur-Durett. 1341-1347 [doi]
- Binary log-linear learning with stochastic communication linksArjun Muralidharan, Yuan Yan, Yasamin Mostofi. 1348-1353 [doi]
- Transport protocols revisitedMaggie R. Breedy, Peter Budulas, Alessandro Morelli, Niranjan Suri. 1354-1360 [doi]
- Design and evaluation of a mass configuration protocol (MCONF) for tactical MANETsPeter Katlic, Koushik Kar, James Morris, James H. Nguyen, Robert G. Cole. 1361-1366 [doi]
- Inferring pairwise influence from encrypted communicationBrian Thompson, Hasan Cam. 1367-1372 [doi]
- Probabilistic spreading of recommendations in social networksAnahita Davoudi, Mainak Chatterjee. 1373-1378 [doi]
- Unveiling the structure of multi-attributed networks via joint non-negative matrix factorizationHung T. Nguyen 0003, Thang N. Dinh. 1379-1384 [doi]
- Network Science collaborative experimentation methods and tools to accelerate network science innovation within the ITA and NS-CTAKelvin Marcus, Maroun Touma, Flávio Bergamaschi. 1385-1390 [doi]
- Network Science Experimentation Scale and composition in a virtualized experimentation environmentJohn P. Hancock, Kelvin Marcus. 1391-1396 [doi]
- Topology control for time-varying contested environmentsErtugrul N. Ciftcioglu, Kevin S. Chan, Ananthram Swami, Derya H. Cansever, Prithwish Basu. 1397-1402 [doi]
- Performance analysis of diversity techniques for secure SATCOM-on-the-move systemsChristian A. Hofmann, Robert T. Schwarz, Andreas Knopp. 1403-1408 [doi]
- Spectral efficiency performance of small-aperture terminals in NGSO satellite linksVijitha Weerackody. 1409-1414 [doi]
- Earth stations on moving platformsEnrique Cuevas, Vijitha Weerackody. 1415-1420 [doi]
- Cyber-foraging for improving survivability of mobile systemsSebastián Echeverría, Grace A. Lewis, James Root, Ben Bradshaw. 1421-1426 [doi]
- Interference criteria for Mobile Ad-Hoc NetworksJeffrey Boksiner, Yuriy Posherstnik, Richard O. Yeager. 1427-1432 [doi]
- Staring link establishment for high-frequency radioEric E. Johnson. 1433-1438 [doi]
- Wideband HF and 4G ALE Near Vertical Incidence Skywave test resultsRandy W. Nelson, Bradley G. Butikofer, Joseph A. Lahart, David H. Church. 1439-1444 [doi]
- HF band filter bank multi-carrier spread spectrumStephen Andrew Laraway, Hussein Moradi, Behrouz Farhang-Boroujeny. 1445-1453 [doi]
- Results from a wideband HF usability studyM. B. Jorgenson, Nigel T. Cook. 1454-1459 [doi]
- Efficient high-fidelity simulation of HF communications systems and networksEric N. Koski, Jeffery Weston. 1460-1466 [doi]
- Sparsity-aware direct decision-feedback equalization of ionospheric HF channelsFrancisco C. Ribeiro, Elaine Crespo Marques, Nilson M. Paiva Jr., Juraci F. Galdino. 1467-1472 [doi]
- Spectrum Efficient Communications with multiuser MIMO, multiuser detection and interference alignmentSatya Prakash Ponnaluri, Sohraab Soltani, Yi Shi, Yalin Evren Sagduyu. 1473-1478 [doi]
- Ergodic capacity in mmWave ad hoc network with imperfect beam alignmentAndrew Thornburg, Robert W. Heath Jr.. 1479-1484 [doi]
- Interference detection using time-frequency binary hypothesis testingAndrew C. Marcum, Joon-Young Kim, David J. Love, James V. Krogmeier. 1485-1490 [doi]
- Joint radar-communications performance bounds: Data versus estimation information ratesAlex R. Chiriyath, Daniel W. Bliss. 1491-1496 [doi]
- Multistage anti-spoof GPS interference correlator (MAGIC)Wilbur L. Myrick, Michael Picciolo, J. Scott Goldstein, Vernon Joyner. 1497-1502 [doi]
- Conversion gain for interference combatingAlois M. J. Goiser. 1503-1508 [doi]
- Single-channel blind separation of co-frequency MPSK signals based on PSP algorithm with DFSEXiao-Bei Liu, Yong Liang Guan, Soo Ngee Koh. 1509-1514 [doi]
- Interception of the triangular FM waveform via self-convolutionFarhan A. Qazi, Adly T. Fam. 1515-1518 [doi]
- Distributed asynchronous modulation classification based on hybrid maximum likelihood approachThakshila Wimalajeewa, Jithin Jagannath, Pramod K. Varshney, Andrew L. Drozd, Wei Su. 1519-1523 [doi]
- High-order statistical analysis for linearly modulated signalsHideki Ochiai. 1524-1529 [doi]
- Approximate joint MAP detection of co-channel signalsDaniel J. Jakubisin, R. Michael Buehrer. 1530-1535 [doi]
- On the performance of energy detectors in generalized fading environmentsEyidayo Adebola, Annamalai Annamalai. 1536-1541 [doi]
- An automatic approach to extract the formats of network and security log messagesJing Ya, Tingwen Liu, Haoliang Zhang, Jinqiao Shi, Li Guo. 1542-1547 [doi]
- Distributed security policies for service-oriented architectures over tactical networksRoberto Rigolin F. Lopes, Stephen D. Wolthusen. 1548-1553 [doi]
- Enabling security-aware virtual machine placement in IaaS cloudsXuebiao Yuchi, Sachin Shetty. 1554-1559 [doi]
- Utilizing the BitTorrent DHT for blind rendezvous and information exchangeReese Moore, Christopher Morrell, Randy C. Marchany, Joseph G. Tront. 1560-1565 [doi]
- Layered scalable WAVE security for VANETKazi J. Ahmed, Myung J. Lee, Jie Li. 1566-1571 [doi]
- Multi-domain Public key infrastructure for Vehicle-to-Grid networkBinod Vaidya, Dimitrios Makrakis, Hussein T. Mouftah. 1572-1577 [doi]
- A novel Multiple Independent Levels of Security/Safety Cross Domain solutionAngelo Liguori. 1578-1583 [doi]
- ARMing the Trusted Platform Module pro-active system integrity monitoring focussing on peer system notificationMarkus Maybaum, Jens Tölle. 1584-1589 [doi]
- Automatic security classification by machine learning for cross-domain information exchangeHugo Hammer, Kyrre Wahl Kongsgård, Aleksander Bai, Anis Yazidi, Nils Agne Nordbotten, Paal E. Engelstad. 1590-1595 [doi]
- Security challenges with cross-domain information exchange: Integrity and guessing attacksPaal E. Engelstad. 1596-1605 [doi]
- Wireless Emergency Alerts in arbitrary sized target areas: Mobile location aware emergency notificationEmre Gunduzhan, Bharat T. Doshi, Lotfi Benmohamed. 1606-1611 [doi]
- Global attestation of location in mobile devicesSaritha Arunkumar, Mudhakar Srivatsa, Murat Sensoy, Muttukrishnan Rajarajan. 1612-1617 [doi]
- Mobile geolocation techniques for location-aware emergency response servicesBharat T. Doshi, Emre Gunduzhan, Jay Chang, Osama Farrag. 1618-1623 [doi]
- Performance of RF mapping using opportunistic distributed devicesJason Schuette, Barry Fell, John Chapin, Steven Jones, James Stutler, Mark Birchler, Dennis Roberson. 1624-1629 [doi]
- Modeling Automatic Link Establishment in HF networksRomain Prouvez, Bruno Baynat, Hicham Khalife, Vania Conan, Catherine Lamy-Bergot. 1630-1635 [doi]
- A critique of HF NVIS channel modelsMarcus T. Urie, Gautam Thatte, Ryan McCourt, Parker Martin, Xiaochen Li, Cenk Kose, Michael P. Fitz, Scott Enserink. 1636-1642 [doi]
- Ground-wave propagation characterization and prediction for HF cognitive radioMichael J. Conway, Christopher J. Payne, Sven G. Bilen, Eric N. Koski. 1643-1649 [doi]
- A model for dual polarized HF MIMO communicationsScott Enserink, Cenk Kose, Mike Fitz, Marcus T. Urie, Ryan McCourt. 1650-1655 [doi]
- Air-ground channel characterization for unmanned aircraft systems: The near-urban environmentDavid W. Matolak, Ruoyu Sun. 1656-1660 [doi]
- Air-Ground Doppler-delay spread spectrum for dense scattering environmentsMostafa Ibrahim, Hüseyin Arslan. 1661-1666 [doi]
- A high-fidelity statistical model of frequency hopping interference for fast simulationDavid Ripplinger, B. Russ Hamilton, Greg Kuperman. 1667-1672 [doi]
- Wideband propagation characteristics at 312 MHz in Eastern Norway and impact on waveform requirementsVivianne Jodalen, Jeffrey Pugh, Phil J. Vigneron. 1673-1678 [doi]
- Efficient cooperative relaying selection scheme based on TDMA for military tactical multi-hop wireless networksNguyen Bach Long, Dong Seong Kim. 1679-1684 [doi]
- Optimal transmission decisions for airborne relay communicationsYalin Evren Sagduyu, Yi Shi, Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley. 1685-1690 [doi]
- Maximum entropy quantization for link-state adaptation in two-way relayingLisa Pinals, Mai Vu. 1691-1696 [doi]
- SINR analysis and energy allocation of preamble and training for time division CT with range extensionQiongjie Lin, Mary Ann Weitnauer. 1697-1702 [doi]