Abstract is missing.
- An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platformsMichael Atighetchi, Fusun Yaman, Borislava I. Simidchieva, Marco M. Carvalho. 1-6 [doi]
- Mapping sample scenarios to operational modelsZ. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini, Thomas F. La Porta, Ritu Chadha. 7-12 [doi]
- Agility in decision-making for cyberspace operationsSteven W. Stone. 13-18 [doi]
- Semi-automated wrapping of defenses (SAWD) for cyber command and controlMarco M. Carvalho, Thomas C. Eskridge, Michael Atighetchi, Nicholas Paltzer. 19-24 [doi]
- Dagger: Modeling and visualization for mission impact situation awarenessElisha Peterson. 25-30 [doi]
- Enterprise Level SecurityEric D. Trias, William R. Simpson, Kevin E. Foltz, Frank P. Konieczny. 31-36 [doi]
- Risk assessment based access control with text and behavior analysis for document managementZhuo Lu, Yalin E. Sagduyu. 37-42 [doi]
- Analysis and design of an authentication protocol for space information networkWeiwei Zhao, Aixin Zhang, Jianhua Li, Xinghua Wu, Yuchen Liu. 43-48 [doi]
- Crafting adversarial input sequences for recurrent neural networksNicolas Papernot, Patrick D. McDaniel, Ananthram Swami, Richard E. Harang. 49-54 [doi]
- SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessorDavid Whelihan, Michael Vai, Daniil M. Utin, Roger Khazan, Karen Gettings, Tom Anderson, Antonio Godfrey, Raymond Govotski, Mark Yeager, Brendon Chetwynd, Ben Nahill, Eric Koziel. 55-60 [doi]
- IoTGuard: Scalable and agile safeguards for Internet of ThingsYounghee Park, Shruti Daftari, Pratik Inamdar, Snehal Salavi, Aniket Savanand, Youngsoo Kim. 61-66 [doi]
- Recovering the reserved transmission time slots in an ad hoc network with scheduled channel accessVikas Bollapragada Subrahmanya, Harlan B. Russell. 67-72 [doi]
- Link scheduling and channel assignment with a graph spectral clustering approachZhifeng He, Shiwen Mao, Sastry Kompella, Ananthram Swami. 73-78 [doi]
- A random access scheme for satellite packet communication with intentional interferenceJohn Metzger, Vincent W. S. Chan, Christopher C. Yu, Claude E. Shannon. 79-84 [doi]
- Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environmentsZejue Wang, Hongjia Li, Dan Wang, Liming Wang, Song Ci. 85-90 [doi]
- Low-rate ultrasonic communications and power delivery for sensor applicationsMichael T. Cunningham, Gary J. Saulnier, Robert Chase, Edward M. Curt, Kyle R. Wilt, Francisco J. Maldonado, Stephen Oonk, Henry A. Scarton. 91-96 [doi]
- Data aggregation for low power wireless devicesKevin Schubert, Nicholas Bambos. 97-102 [doi]
- Optimal power allocation for parallel Gaussian channels with LPD constraintsNick Letzepis. 103-107 [doi]
- Analytical framework for MANET learning and routingYalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri. 108-113 [doi]
- Reusability of knowledge for deriving latent situational information in EW scenariosVincentzio Roman, Jakub J. Moskal, Mieczyslaw M. Kokar, Roger P. Guseman, Robert B. Normoyle, David H. Scheidt. 114-119 [doi]
- SPIN: An active location verification scheme for wireless sensor networksDi Wu 0004, Dongmei Zhao, Weimiao Feng, Siye Wang, Yu Zhang. 120-125 [doi]
- Joint transmission power control in transponded SATCOM systemsXin Tian 0002, Genshe Chen, Khanh D. Pham, Erik Blasch. 126-131 [doi]
- Boundaries of signal-to-noise ratio for adaptive code modulationsKrittetash Pinyoanuntapong, Madhuprana Goswami, Ashfia Binte Habib, Hyuck M. Kwon, Khanh D. Pham. 132-137 [doi]
- Jamming statistics-dependent frequency hoppingMatthew Hannon, Shaung Feng, Hyuck M. Kwon, Khanh D. Pham. 138-143 [doi]
- Resource management with anti-jamming capability for cognitive space communication systemsHaya Shajaiah, Jasmin A. Mahal, Charles Clancy. 144-149 [doi]
- Practical achievable capacity for advanced SATCOM on-the-MoveTien M. Nguyen, Andy T. Guillen, Sumner S. Matsunaga. 150-155 [doi]
- Minimax anti-jammer design for FHSS/QPSK satellite communication systemsMengqi Ren, Ruixin Niu, Gang Wang, Genshe Chen. 156-161 [doi]
- Optimal secrecy capacity of underlay cognitive radio networks with multiple relaysThi My Chinh Chu, Hans-Jürgen Zepernick, Hoc Phan. 162-167 [doi]
- Optimize the spectrum sensing and decision making strategies under uncertainty for SATCOMWenqi Liu, Hongxiang Li, Sanjuli Agarwal, Bin Xie 0001. 168-173 [doi]
- Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learningYang Li, Qihang Peng. 174-179 [doi]
- A steganographic approach for covert waveform designJ. Daniel Park, John F. Doherty. 180-185 [doi]
- Autonomous navigation to an RF source in multipath environmentsTyler Ward, Eduardo L. Pasiliao, John M. Shea, Tan F. Wong. 186-191 [doi]
- Self-correction scheme by adjusting the navigation signal transmission timeKyuman Lee, JaeSung Lim. 192-197 [doi]
- On the use of massive cylindrical antenna arrays for physical layer securityElias Yaacoub. 198-203 [doi]
- Advanced antenna array designs for directional networksGui Chao Huang, Magdy F. Iskander, Mahbub Hoque. 204-207 [doi]
- A microstrip line-fed multi-resonant slot antenna in the 4G/LTE band for smartphonesKendrick Q. Henderson, Saeed I. Latif, Georgios Y. Lazarou. 208-212 [doi]
- Extracting clutter metrics from mobile propagation measurements in the 1755-1780 MHz bandChriss Hammerschmidt, Robert Johnk. 213-218 [doi]
- Link quality analysis in the presence of blockages for analog beamformed mm-wave channelSwapnil Mhaske, Predrag Spasojevic, Ahsan Aziz, Malik Gul. 219-224 [doi]
- Path loss exponent estimation and RSS localization using the linearizing variable constraintFrançois Chan, Yiu-Tong Chan, Robert J. Inkol. 225-229 [doi]
- Design of an anti-jamming Appliqué for LTE-based military communicationsVenkatesh Ramaswamy, Jerediah R. Fevold, Jeffrey T. Correia, Timothy E. Daughters. 230-235 [doi]
- LTE-UTac: LTE-U customization for multi-mission tactical networksGwenael Poitau. 236-241 [doi]
- Network coverage detection using order statistics: An LTE perspectiveMd Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner. 242-247 [doi]
- Impact of satellite transponder nonlinearities on the performance of protected tactical waveform (PTW) for the return link (RL)Lan K. Nguyen, Richard B. Wells, Khanh D. Pham. 248-253 [doi]
- Secure spectrum-efficient frequency hopping for return link of protected tactical satellite communicationsLun Li, Xin Tian 0002, Genshe Chen, Khanh D. Pham, Erik Blasch. 254-258 [doi]
- Agility maneuvers to mitigate inference attacks on sensed location dataGiuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger. 259-264 [doi]
- Parallel active dictionary attack on IEEE 802.11 enterprise networksOmar Nakhila, Cliff C. Zou. 265-270 [doi]
- A cross-layer traffic analysis countermeasure against adaptive attackers of Wireless Sensor NetworksJon R. Ward, Mohamed F. Younis. 271-276 [doi]
- Stealthy attacks with insider information: A game theoretic model with asymmetric feedbackXiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra. 277-282 [doi]
- ICS security testbed with delay attack case studyEmrah Korkmaz, Andrey M. Dolgikh, Matthew Davis, Victor A. Skormin. 283-288 [doi]
- On the feasibility of real-time cyber attack attribution on the InternetXinyuan Wang. 289-294 [doi]
- A delay-optimal packet scheduler for M2M uplinkAkshay Kumar, Ahmed Abdel-Hadi, Charles Clancy. 295-300 [doi]
- Controlling the age of information: Buffer size, deadline, and packet replacementClement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 301-306 [doi]
- Statistical QoS-driven power control and source adaptation for D2D communicationsXiang Mi, Limin Xiao, Ming Zhao, Xibin Xu, Shidong Zhou, Jing Wang. 307-312 [doi]
- A delay efficient multiclass packet scheduler for heterogeneous M2M uplinkAkshay Kumar, Ahmed Abdelhadi, Charles Clancy. 313-318 [doi]
- Capacity and scaling laws of dense mmWave and interference alignment ad hoc networksAndrew Thornburg, Robert W. Heath Jr., Robert C. Daniels. 319-324 [doi]
- LOS discovery in 3D for highly directional transceiversMahmudur Khan, Suman Bhunia, Murat Yuksel, Shamik Sengupta. 325-330 [doi]
- An evaluation of layer 2 and layer 3 routing on high capacity aerial directional linksRahul Amin, Tom Goff, Bow-Nan Cheng. 331-336 [doi]
- LOS discovery for highly directional full duplex RF/FSO transceiversSuman Bhunia, Mahmudur Khan, Shamik Sengupta, Murat Yuksel. 337-342 [doi]
- Topology management algorithms for large-scale aerial high capacity directional networksJoy Na Wang, Thomas H. Shake, Patricia Deutsch, Andrea Coyle, Bow-Nan Cheng. 343-348 [doi]
- Use of weather radar rain cell motion forecasting for site diversity systemJun Xiang Yeo, Yee Hui Lee, Jin-Teong Ong. 349-353 [doi]
- Multipath TCP in SDN-enabled LEO satellite networksPengyuan Du, Sobhan Nazari, Jorge Mena, Ruolin Fan, Mario Gerla, Riten Gupta. 354-359 [doi]
- Software Defined naval network for satellite communications (SDN-SAT)Sobhan Nazari, Pengyuan Du, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim, Antonio Capone. 360-366 [doi]
- MUOS satellite communication beyond latitude 65° NorthJonathon Cheah. 367-372 [doi]
- An Uplink Power Control driven compensation of wideband, semi-static, rain or interference induced link impairments affecting satellite feeder links operating at Ka band and aboveY. Vasavada, Y. Liu, J. Sanchez, P. Kapoor, Y. Antia, J. Rozmaryn, J. Border. 373-378 [doi]
- Effective bandwidth based capacity request for real-time voice in GEO satellite systemBosung Kim, Gyumin Lee, Geunkyung Choi, Byeong-hee Roh. 379-384 [doi]
- Deterministic pilot jamming symbol design for enhanced physical layer secrecySungjun Ahn, Wonju Lee, Kwang-Eog Lee, Joonhyuk Kang. 385-389 [doi]
- Secure rates in multiband broadcast channels with combating jammersKarim A. Banawan, Sennur Ulukus, Peng Wang, Brian Henz. 390-395 [doi]
- An efficient sparse FFT algorithm with application to signal source separation and 2D virtual image feature extractionCorey D. Cooke, Frederick K. Reed, Luke J. Prince, Jason M. Vann, Adam L. Anderson. 396-400 [doi]
- Machine learning for source localization in urban environmentsDarcy A. Bibb, Zhengqing Yun, Magdy F. Iskander. 401-405 [doi]
- Reactive jammer piggybacking: Achieving antifragile electronic warfareMarc Lichtman, T. Charles Clancy, Jeffrey H. Reed. 406-411 [doi]
- Amplify and forward relaying protocol design with optimum power and time allocationZijian Mo, Weifeng Su, John D. Matyjas. 412-417 [doi]
- A method for network-coded broadcast in an ad hoc networkSiddhartha S. Borkotoky, Michael B. Pursley. 418-423 [doi]
- Physical layer based approach for advanced directional networkingMagdy F. Iskander, Zhengqing Yun, Farhan A. Qazi, Galen H. Sasaki, Asutosh Das. 424-429 [doi]
- Receiver design and bit allocation for a multi-user distributed relay network performing vector quantizationAhmad A. I. Ibrahim, Jing Guo, David J. Love, Navid Yazdani, Keith W. Forsythe. 430-435 [doi]
- Enabling NAICS to mitigate inter-cell interference in evolving wireless networksBilal Al-Doori, Xian Liu. 436-441 [doi]
- Experimental demonstration of retrodirective beamforming from a fully wireless distributed arrayBenjamin Peiffer, Raghu Mudumbai, Sairam Goguri, Anton Kruger, Soura Dasgupta. 442-447 [doi]
- Reducing the LOS ray beamforming setup time for IEEE 802.11ad and IEEE 802.15.3cYavuz Yaman, Predrag Spasojevic. 448-453 [doi]
- Joint channel allocation, mode selection and power control in D2D-enabled femtocellsMin Wang, Hui Gao, Xin Su, Tiejun Lv. 454-459 [doi]
- Subspace-based SIMO blind channel identification: Asymptotic performance comparisonKareem Bonna, Predrag Spasojevic, Emmanuel Kanterakis. 460-465 [doi]
- Controlled barrage regions: Stochastic modeling, analysis, and optimizationSalvatore Talarico, Matthew C. Valenti, Thomas R. Halford. 466-472 [doi]
- Agile MU-MIMO in congested environments with robust channel estimationWenhao Xiong, Zijian Mo, Genshe Chen, Khanh D. Pham, Erik Blasch, Hyuck M. Kwon. 473-478 [doi]
- Controlling risk of data exfiltration in cyber networks due to stealthy propagating malwareBrian Thompson, James R. Morris-King, Hasan Çam. 479-484 [doi]
- Slowing the spread of Bluetooth-based malware in mobile tactical networksBrian Thompson, James R. Morris-King, Richard E. Harang. 485-490 [doi]
- Validation of network simulation model and scalability tests using example malwareScott E. Brown, Harold Brown, Michael Russell, Brian Henz, Michael Edwards, Frank Turner, Giorgio Bertoli. 491-496 [doi]
- Malware propagation in fully connected networks: A netflow-based analysisKayla M. Straub, Avik Sengupta, Joseph M. Ernst, Robert W. McGwier, Merrick Watchorn, Richard Tilley, Randolph Marchany. 497-502 [doi]
- Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruningJames R. Morris-King, Hasan Çam. 503-508 [doi]
- StuxMob: A situational-aware malware for targeted attack on smart mobile devicesRagib Hasan, Shams Zawoad, Md Munirul Haque. 509-514 [doi]
- Collaborative detection of Covert Storage ChannelsHeng Song, Xiangyang Li. 515-520 [doi]
- Point Transformation Scheme to protect location data changing in real timeKyuho Oh, Kyuman Lee, JaeSung Lim. 521-526 [doi]
- TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storageJinsheng Zhang, Qiumao Ma, Wensheng Zhang 0001, Daji Qiao. 527-532 [doi]
- Tactical CAC profile for NATO OLP? Performance estimations for NATO OLP cryptographic evolution stageMikko Kiviharju, Arseny Kurnikov. 533-538 [doi]
- Enabling reproducible cyber research - four labeled datasetsTom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel. 539-544 [doi]
- Jamming effects on multicast traffic in ad hoc networks for different terrainsUlrika Uppman, Jan Nilsson, Ulf Sterner. 545-550 [doi]
- Robust beamforming and power allocation for secrecy in multi-pair decode-and-forward relay networksWeichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv. 551-556 [doi]
- De-encapsulation of network packets for network protocol reverse engineeringPaul T. Watrobski, Douglas H. Summerville. 557-562 [doi]
- On the robustness of the OLSR protocol under unwanted interferenceMazda Salmanian, J. David Brown, Ming Li, Tricia J. Willink. 563-568 [doi]
- Exploiting social relationship for secure routing in mobile social networksZhenxiang Gao, Weihua Zhou, Yongming Wang. 569-575 [doi]
- Exploring dependencies of networks of multi-genre network experimentsLisa Scott, Kelvin Marcus, Rommie L. Hardy, Kevin Chan. 576-581 [doi]
- Hamlet: A metaphor for modeling and analyzing network conversational adjacency graphsJoseph P. Macker. 582-587 [doi]
- Deep learning for network analysis: Problems, approaches and challengesSiddharth Pal, Yuxiao Dong, Bishal Thapa, Nitesh V. Chawla, Ananthram Swami, Ram Ramanathan. 588-593 [doi]
- Exploiting deployment information for social-aware contact prediction at the tactical edgeWei Gao. 594-599 [doi]
- An improved local bridging centrality model for distributed network analyticsJoseph P. Macker. 600-605 [doi]
- K-anycasting strategies in networks: To grow or to prune?Prithwish Basu. 606-611 [doi]
- Spectrum sharing of VMES terminals with fixed service stationsVijitha Weerackody. 612-617 [doi]
- Antenna diversity techniques for enhanced jamming resistance in multi-beam satellitesStephan P. Winter, Christian A. Hofmann, Andreas Knopp. 618-623 [doi]
- Distributed SATCOM On-The-Move (SOTM) Terminal Open Standard ArchitectureTat Fung, Jeff Hoppe, Syed Akbar, Tom Rittenbach, Jenelle Vickberg. 624-629 [doi]
- Distributed SATCOM On-The-Move Terminal Open Standard Architecture architectural detailsJeff Hoppe, Tat Fung, Syed Akbar, Tom Rittenbach. 630-635 [doi]
- Scheduling and path planning for computational ferryingSebastian A. Zanlongo, Alexander C. Wilson, Leonardo Bobadilla, Tamim Sookoor. 636-641 [doi]
- Establishing line-of-sight communication via autonomous relay vehiclesMd. Mahbubur Rahman, Leonardo Bobadilla, Brian Rapp. 642-647 [doi]
- Myriad MSK signal detection for VLF/LF communicationGuoSheng Yang, Jun Wang, Guangrong Yue, Shaoqian Li. 648-653 [doi]
- Reduced-complexity IBDFE for faster-than-Nyquist communication systemsJuan Zeng, Ying Wang, Xinke Zhang, Keke Hu, Yongming Wang. 654-659 [doi]
- Optimum digital pulse shaping filtersStephen G. Wilson, Ho Him Jonathan Lo. 660-665 [doi]
- Median of Maxima Estimate (MOME) receivers for robust adaptive signal detectionBruce F. McGuffin. 666-671 [doi]
- Frequency channel delay modulation for interference-robust low data rate communicationSteven W. Ellingson, R. Michael Buehrer. 672-677 [doi]
- Adaptive correlation techniques for spread spectrum communication systemsAlan J. Michaels, David B. Chester. 678-681 [doi]
- Doppler frequency offset estimation and compensation in OFDM aeronautical communication systems in the presence of narrow-band interferenceXin Wang, Xiaolin Zhang, Yuan Yang. 682-687 [doi]
- Zero Tail Filter Bank Spread OFDMMostafa Ibrahim, Hüseyin Arslan. 688-693 [doi]
- Implications of time/frequency synchronization tradeoff of quasi-synchronous multi-carrier DS-CDMA for robust communications at lower VHFGunjan Verma, Fikadu T. Dagefu, Brian M. Sadler, Predrag Spasojevic. 694-699 [doi]
- Digital construction and characterization of noise-like spread spectrum signalsDonald C. Buzanowski, Frederick J. Block, Thomas C. Royster IV. 700-704 [doi]
- Understanding European forest radio propagation dynamics with in and out of forest transmittersAlexandros Palaios, Masih Nilforoushan, Petri Mähönen. 705-710 [doi]
- Experimental results of FB-MC-SS on a wideband HF NVIS propagation channelStephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny. 711-716 [doi]
- Validation of an analytical Urban Propagation ModelJeffrey Boksiner, Yuriy Posherstnik, Michael Murphy, Chrysanthos Chrysanthou, Thierry Marsault, Jean-Philippe Millet. 717-722 [doi]
- Propagation models for users crossing forest areas in central European forest environmentsAlexandros Palaios, Kushwah Nagendra Singh, Petri Mähönen. 723-728 [doi]
- Greenland bed elevation resolution improvement via compressive sensing and co-prime up-samplingNa Wu, Qilian Liang, Prasad Gogineni. 729-734 [doi]
- Bongo: A BGP speaker built for defending against bad routesKevin Benton, L. Jean Camp, Martin Swany. 735-739 [doi]
- Trust and reliability for next-generation routersChristopher Mansour, Danai Chasaki. 740-745 [doi]
- Modeling network based moving target defense impacts through simulation in Ns-3Franki Yeung, Peter Cho, Christopher Morrell, Randy C. Marchany, Joseph G. Tront. 746-751 [doi]
- An experimental exploration of the impact of sensor-level packet loss on network intrusion detectionSidney C. Smith, Robert J. Hammell. 752-757 [doi]
- Characterizing network behavior features using a cyber-security ontologyNoam Ben-Asher, Steve Hutchinson, Alessandro Oltramari. 758-763 [doi]
- Empirical assessment of network-based Moving Target Defense approachesBrian P. Van Leeuwen, William M. S. Stout, Vincent E. Urias. 764-769 [doi]
- Towards quantifying visual similarity of domain names for combating typosquatting abuseTingwen Liu, Yang Zhang, Jinqiao Shi, Jing Ya, Quangang Li, Li Guo. 770-775 [doi]
- Predicting proficiency in cyber defense team exercisesDiane S. Henshel, Gary M. Deckard, Brad Lufkin, Norbou Buchler, Blaine Hoffman, Prashanth Rajivan, Steve Collman. 776-781 [doi]
- "I know what you did before": General framework for correlation analysis of cyber threat incidentsDaegeon Kim, Jiyoung Woo, Huy Kang Kim. 782-787 [doi]
- Memory chunking analysis of numerical password for Chinese websitesRui Xu, Xiaojun Chen 0004, Yingbing Wang, Jinqiao Shi, Haitao Mi. 788-793 [doi]
- Effectiveness of variable bit-length power analysis attacks on SHA-3 based MACXuan D. Tran, Marcin Lukowiak, Stanislaw P. Radziszowski. 794-799 [doi]
- ACyDS: An adaptive cyber deception systemCho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos. 800-805 [doi]
- Automated IP connectivity in narrowband radio networksLi Li 0009, S. Haavik, B. Libaek, R. Wik, Anne Marie Hegland, D. McLachlan, Phil Hugg, C. Brown, Thomas Kunz. 806-811 [doi]
- IP-level fast re-routing for robustness to mass failure events using a hybrid bandwidth and reliability cost metricGeorge Kesidis, David J. Miller 0001, Zhicong Qiu. 812-816 [doi]
- Smallworld routing for tactical networksPratik K. Biswas, Amitabh Mishra, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Ram Ramanathan, Prithwish Basu. 817-822 [doi]
- ITMAN: An inter tactical mobile ad hoc network routing protocolFlorian Grandhomme, Gilles Guette, Adlen Ksentini, Thierry Plesse. 823-828 [doi]
- Tactical MANET architecture for Unmanned Autonomous Maneuver NetworkBongsoo Roh, Myoung-Hun Han, Mijeong Hoh, Kwangsoo Kim, Byeong-hee Roh. 829-834 [doi]
- Dynamic range extension using HARLEQUIN and HAILMathew Elliot, Thomas Stevens. 835-841 [doi]
- Backbone formation in military multi-layer ad hoc networks using complex network conceptsDimitrios Papakostas, Pavlos Basaras, Dimitrios Katsaros, Leandros Tassiulas. 842-848 [doi]
- Budget constrained relay node placement problem for maximal "connectedness"Anisha Mazumder, Chenyang Zhou, Arun Das, Arunabha Sen. 849-854 [doi]
- Mitigation of multiple impulse noise sources through selective attenuationSara Orn Tengstrand, Patrik Eliardsson, Erik Axell. 855-860 [doi]
- A Hidden Markov Model approach for automatic closed protocol hop synchronizationJohn Narayan, T. Charles Clancy. 861-866 [doi]
- A reconfigurable architecture to support dynamic communications, radar, and sensingMichael Merritt, Timothy Brothers, Andrew Stark, Jeffrey Rada, Debbie Nielsen, Kyle Davis, Benjamin B. Yang, Chris Ward, Margaret Quiggle. 867-871 [doi]
- Ambiguity function analysis for passive radar system performanceNicholas Johnson, Mohamed Chergui, Oren Sternberg, John D. Rockway, W. Linwood Jones. 872-876 [doi]
- Adaptive transmission algorithms for a hard-switched FSO/RF linkKristen Nock, Carlos Font, Michael Rupar. 877-881 [doi]
- Practical hardware realizable frame discrimination algorithms for deep fading channels in optical communicationsRyan Shoup. 882-887 [doi]
- RSFT: A realistic high dimensional sparse fourier transform and its application in radar signal processingShaogang Wang, Vishal M. Patel, Athina P. Petropulu. 888-893 [doi]
- Stepped frequency radar for automotive application: Range-Doppler coupling and distortions analysisThomas Feuillen, Achraf Mallat, Luc Vandendorpe. 894-899 [doi]
- Performance analysis of extended target detection with radar waveforms designed using compressed sensingChris A. Rogers, Dimitrie C. Popescu. 900-905 [doi]
- Phased array radar based angular domain channel estimation scheme for integrated radar-communication systemYu Zhang, Ling Huang, Jian Song. 906-911 [doi]
- Polar signal detection: Multi-carrier waveform design for improved radar detection performanceJohn Ellinger, Zhiping Zhang, Michael C. Wicks, Zhiqiang Wu 0001. 912-917 [doi]
- Co-designed radar-communication using linear frequency modulation waveformMichael J. Nowak, Zhiping Zhang, Yang Qu, Dimitri A. Dessources, Michael C. Wicks, Zhiqiang Wu 0001. 918-923 [doi]
- Deep learning based doppler radar for micro UAS detection and classificationGihan J. Mendis, Tharindu Randeny, Jin Wei, Arjuna Madanayake. 924-929 [doi]
- Nonparametric target detection using airborne MIMO communication systemsYu Zhao, Biao Chen. 930-935 [doi]
- Multitarget detection by stretch processing of chirp diversity waveformsAmro Lulu, Bijan G. Mobasseri. 936-941 [doi]
- A RELNAV enhancement for reducing cumulative position error in Link-16 without GRUKihyoung Kim, Kyuman Lee, JaeSung Lim. 942-947 [doi]
- 4D CAF for localization of co-located, moving, and RF coincident emittersWilliam Watson, Thomas McElwain. 948-951 [doi]
- Good code sets from complementary pairs via polyphase chipsAdly T. Fam, Ravi Kadlimatti. 952-957 [doi]
- Cross-layer TCP adaptation in DISCO for tactical edge networksSoumendra Nanda, Charles Tao, Victor Firoiu, Hui Zeng, Gahng-Seop Ahn, Julia Deng. 958-963 [doi]
- Performance evaluation of a disruption tolerant network proxy for tactical edge networksScott Moore, Rahul Amin, David Ripplinger, Devanshu Mehta, Bow-Nan Cheng. 964-969 [doi]
- DDAM: Dynamic network condition detection and communication adaptation in Tactical Edge NetworksRoberto Fronteddu, Alessandro Morelli, Mauro Tortonesi, Niranjan Suri, Cesare Stefanelli, Rita Lenzi, Enrico Casini. 970-975 [doi]
- SVED: Scanning, Vulnerabilities, Exploits and DetectionHannes Holm, Teodor Sommestad. 976-981 [doi]
- Event log analysis with the LogCluster toolRisto Vaarandi, Markus Kont, Mauno Pihelgas. 982-987 [doi]
- MART: Targeted attack detection on a compromised networkJack W. Stokes, Himanshu Chandola, Christian Seifert, Tim Burrell. 988-997 [doi]
- Software asset analyzer: A system for detecting configuration anomaliesXiao Li, Paul Avellino, Jeff Janies, M. Patrick Collins. 998-1003 [doi]
- Hunting abnormal configurations for permission-sensitive role miningLihua Yin, Liang Fang, Ben Niu, Binxing Fang, FengHua Li. 1004-1009 [doi]
- Augmenting attack graphs to represent data link and network layer vulnerabilitiesJaime C. Acosta, Edgar Padilla, John Homer. 1010-1015 [doi]
- A hybrid P2P and pub/sub messaging system for decentralized Information ManagementNathan D. Holzhauer, James R. Milligan, Nathaniel B. Soule. 1016-1021 [doi]
- Validity region sensitive query processing strategies in mobile ad hoc networksByungkwan Jung, Sunho Lim, Jinseok Chae, Cong Pu. 1022-1027 [doi]
- Information-centric network virtualization for QoS provisioning over software defined wireless networksXi Zhang, Qixuan Zhu. 1028-1033 [doi]
- Dynamic scheduling for cooperative broadcasting in tactical ad hoc networksJimmi Grönkvist, Arwid Komulainen, Ulf Sterner, Ulrika Uppman. 1034-1040 [doi]
- Analytical Model of Priority Based Request Scheduling Mechanism Preventing SIP Server OverloadDemir Y. Yavas, Ibrahim Hökelek, Bilge Günsel. 1041-1046 [doi]
- Bringing SDN to the edge of tactical networksKevin Phemius, Jawad Seddar, Mathieu Bouet, Hicham Khalife, Vania Conan. 1047-1052 [doi]
- SDN in coalition tactical networksJon Spencer, Tricia J. Willink. 1053-1058 [doi]
- Towards reliable virtual data center embedding in software defined networkingXuemin Wen, Yanni Han, Bing Yu, Xin Chen, Zhen Xu. 1059-1064 [doi]
- Ryuretic: A modular framework for RyuJacob H. Cox Jr., Sean Patrick Donovan, Russell J. Clark, Henry L. Owen. 1065-1070 [doi]
- A SDN-controlled underwater MAC and routing testbedRuolin Fan, Li Wei, Pengyuan Du, Ciarán Mc Goldrick, Mario Gerla. 1071-1076 [doi]
- Fuzzy sets based team decision-making for Cyber Situation AwarenessZequn Huang, Chien-Chung Shen, Sheetal Doshi, Nimmi Thomas, Ha Duong. 1077-1082 [doi]
- Building low-power trustworthy systems: Cyber-security considerations for Real-Time Physiological Status MonitoringJohn Holliman, Michael Zhivich, Roger Khazan, Albert Swiston, Brian A. Telfer. 1083-1089 [doi]
- Stochastic geometry for the analysis of wireless covert networksGhaith Shabsigh, Victor S. Frost. 1090-1095 [doi]
- Privacy enforcement through policy extensionSaritha Arunkumar, Mudhakar Srivatsa, Berker Soyluoglu, Murat Sensoy, Federico Cerutti. 1096-1100 [doi]
- Physical-layer security of NC-OFDM-based systemsGokul Sridharan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella. 1101-1106 [doi]
- A practical wireless reciprocity-aware key establishment protocolSatya Prakash Ponnaluri, Babak Azimi-Sadjadi, Yik-Kiong Hue, Tugba Erpek, Arash Komaee, Wade Trappe. 1107-1113 [doi]
- Optimal channel assignment for military MANET using integer optimization and constraint programmingPaul J. Nicholas, Karla L. Hoffman. 1114-1120 [doi]
- Urban reconnaissance planning: Discovering new applications with tactical high performance computingSong Jun Park, Stephen Allen, Dale R. Shires. 1121-1124 [doi]
- CyberVAN: A Cyber Security Virtual Assured Network testbedRitu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos. 1125-1130 [doi]
- A novel software defined radio relay method for power conservationAaron E. Cohen, Yvette T. Lee, David A. Heide, Thomas M. Moran. 1131-1136 [doi]
- Agile cognizant transceiver link for mission critical applicationsAmarnadha Reddy Mahasamudram, Ramu Srinivasaiah, Raveendranath KR, Sreenath Ramanath. 1137-1142 [doi]
- Requirements for ACI tolerance in MANETs for VHF tactical communicationsVito Dantona, Berthold Lankl. 1143-1148 [doi]
- Toward Composable Hardware Agnostic Communications Blocks - Lessons LearnedBow-Nan Cheng, Shari Mann, Tim Arganbright. 1149-1154 [doi]
- Efficient approach to find optimal antenna assignment for JALN HCBPeng Wang, Brian Henz. 1155-1160 [doi]
- Optimal orbit selection and design for airborne relay communicationsYalin E. Sagduyu, Yi Shi, Satya Prakash Ponnaluri, Sohraab Soltani, Jason H. Li, Rob Riley, Clif Banner, Greg Heinen. 1161-1166 [doi]
- Variable rate MIMO communication with airborne platforms: An experimental studyYang Liu, Kapil M. Borle, Janek J. Mroczek, Biao Chen, Michael J. Gans, Paul J. Oleski, Richard J. Michalak. 1167-1172 [doi]
- Optimization of a direct conversion multi-standard transmitter used for rescue operationsRiadh Essaadali, Taher Hadouej, Chokri Jebali, Ammar B. Kouki. 1173-1178 [doi]
- A new simple Unmanned Aerial Vehicle doppler effect RF reducing techniqueRiadh Essaadali, Ammar B. Kouki. 1179-1183 [doi]
- Secure beamforming and power allocation for multi-pair decode-and-forward relay networksWeichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv. 1184-1189 [doi]
- Enhancing physical-layer security in wireless communications using signal space diversityMarwan Yusuf, Hüseyin Arslan. 1190-1194 [doi]
- A Polarization state Modulation based Physical Layer Security scheme for Wireless CommunicationsDong Wei, Lili Liang, Meng Zhang, Rong Qiao, Wei-qing Huang. 1195-1201 [doi]
- Adaptive power and access control for physical security of heterogeneous cellular networkXiguang Zhang, Yong Shang, Shiwei Yan, Dehuai Li, Junqi Guo. 1202-1206 [doi]
- Realizing physical layer authentication using constellation perturbation on a software-defined radio testbedAshwin Amanna, Anu Saji, James W. Bohl, Arun Subramanian. 1207-1212 [doi]
- Securing commercial WiFi-based UAVs from common security attacksMichael Hooper, Yifan Tian, Runxuan Zhou, Bin Cao, Adrian P. Lauf, Lanier Watkins, William H. Robinson, Wlajimir Alexis. 1213-1218 [doi]
- Tire Pressure Monitoring System encryption to improve vehicular securityDeirdre K. Kilcoyne, Shiri Bendelac, Joseph M. Ernst, Alan J. Michaels. 1219-1224 [doi]
- Implementing authenticated encryption algorithm MK-3 on FPGAGordon Werner, Steven Farris, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski. 1225-1230 [doi]
- Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networksJason Uher, Ryan G. Mennecke, Bassam S. Farroha. 1231-1236 [doi]
- Metrics and measurement of trustworthy systemsJin-Hee Cho, Patrick M. Hurley, Shouhuai Xu. 1237-1242 [doi]
- User-side Wi-Fi evil twin attack detection using random wireless channel monitoringOmar Nakhila, Cliff C. Zou. 1243-1248 [doi]
- Centrality-based caching for privacy in Information-Centric NetworksNoor Abani, Mario Gerla. 1249-1254 [doi]
- Trust exploitation and attention competition: A game theoretical modelHao Fu, Hongxing Li, Zizhan Zheng, Pengfei Hu, Prasant Mohapatra. 1255-1260 [doi]
- COmBAT: Cross-layer Based testbed with Analysis Tool implemented using software defined radiosJithin Jagannath, Hanne M. Saarinen, Timothy Woods, Joshua O'Brien, Sean Furman, Andrew L. Drozd, Tommaso Melodia. 1261-1266 [doi]
- An experimental evaluation of data distribution applications in tactical networksEnrico Casini, Giacomo Benincasa, Alessandro Morelli, Niranjan Suri, Maggie R. Breedy. 1267-1272 [doi]
- Large scale over-the-air testing of Group Centric NetworkingLogan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx. 1273-1278 [doi]
- Real and virtual wireless radio network emulatorMatthew Dillon, Er-Hsien Frank Fu, Daniel Gdula, Trang Mai, Joseph Molnar, Lan Tran. 1279-1285 [doi]
- Design challenges of carrier phase tracking for higher modulation orders in high data rate applicationsTimothy D. Kurp. 1286-1291 [doi]
- On frequency offset estimation errors in coherent detection over equalized ISI channelsMichael Rice, Mohammad Saquib. 1292-1297 [doi]
- A polynomial rooting based ML CFO estimator in multipath channel with repetitive pilot symbolsMd. Shah Afran, Mohammad Saquib, Michael Rice. 1298-1303 [doi]