Abstract is missing.
- Deep learning for prioritizing and responding to intrusion detection alertsSteven McElwee, Jeffrey Heaton, James B. Fraley, James Cannady. 1-5 [doi]
- Machine learning in malware traffic classificationsKen F. Yu, Richard E. Harang. 6-10 [doi]
- Mitigating DNS query-based DDoS attacks with machine learning on software-defined networkingMuhammad Ejaz Ahmed, Hyoungshick Kim, Moosung Park. 11-16 [doi]
- Feature-based transfer learning for network securityJuan Zhao, Sachin Shetty, Jan Wei Pan. 17-22 [doi]
- Hierarchical learning for automated malware classificationShayok Chakraborty, Jack W. Stokes, Lin Xiao, Dengyong Zhou, Mady Marinescu, Anil Thomas. 23-28 [doi]
- Resilient communication against adversarial path-errorsXiaoqing Fan, Joel Llewelyn, Aaron B. Wagner, Matthew P. Kuzdeba. 29-34 [doi]
- Enhanced TPMS security through acceleration timed transmissionsAndrew Kolodgie, Paul Berges, Ryan Burrow, Mark Carman, Josh Collins, Sam Bair, Geffrey D. Moy, Joseph M. Ernst, Alan J. Michaels. 35-39 [doi]
- On eavesdropping attacks and countermeasures for MU-MIMO systemsXiaoshan Wang, Yao Liu, Xiang Lu, Shichao Lv, Zhiqiang Shi, Limin Sun. 40-45 [doi]
- Empirical statistical inference attack against PHY-layer key extraction in real environmentsRui Zhu, Tao Shu, Huirong Fu. 46-51 [doi]
- Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area networkOmar Nakhila, Cliff C. Zou. 52-56 [doi]
- Secrecy capacity probability of a SIMO system with dissimilar and non-integer Nakagami-m fading factorsXian Liu. 57-62 [doi]
- Standard tactical services in a military disruption-tolerant network: Field testsMarek Malowidzki, P. Kaniewski, R. Matyszkiel, Przemyslaw Berezinski. 63-68 [doi]
- Experimental results for low overhead frequency offset estimation in MANETs with concurrent transmissionEhsan Keramat, Nicholas Kauffroath, Kia Karbasi, Heng Zhao, Babak Daneshrad, Gregory J. Pottie. 69-72 [doi]
- A network-centric model of situational awarenessAbdoulaye Saadou, Harsha Chenji. 73-78 [doi]
- Effects of interference between co-located frequency-hopping ad hoc networksKarina M. Fors, Sara Linder, Jan Nilsson, Ulf Sterner. 79-84 [doi]
- An examination of forwarding prediction metrics in dynamic wireless networksJoseph P. Macker, Jeffery W. Weston. 85-90 [doi]
- Strictly positive secrecy of IoT: A case study involving correlated eavesdroppersXian Liu. 91-96 [doi]
- Efficient chaff-aided obfuscation in resource constrained environmentsErtugrul N. Ciftcioglu, Rommie L. Hardy, Lisa M. Scott, Kevin S. Chan. 97-102 [doi]
- Multilayer MANET routing with social-cognitive learningYalin E. Sagduyu, Yi Shi, Tugba Erpek, Sohraab Soltani, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri, Boleslaw K. Szymanski, Guohong Cao. 103-108 [doi]
- Strategic communication between prospect theoretic agents over a Gaussian test channelVenkata Sriram Siddhardh Nadendla, Emrah Akyol, Cedric Langbort, Tamer Basar. 109-114 [doi]
- Analyzing wireless power transfer in millimeter wave networks with human blockagesTalha Ahmed Khan, Robert W. Heath Jr.. 115-120 [doi]
- Signal detection effects on deep neural networks utilizing raw IQ for modulation classificationSteven C. Hauser, William C. Headley, Alan J. Michaels. 121-127 [doi]
- Flexible modem interface - Enabling DoD wideband SATCOM enterpriseJoseph Vanderpoorten, Kevin Zhang. 128-134 [doi]
- SATCOM innovation: Priorities for modern developmentA. J. Vigil, Mark Jasen, Dahesh A. Khalil. 135-140 [doi]
- Satellite jamming: A game theoretic analysisQiwei Wang, Thinh Nguyen, Khanh Pham, Hyuck Kwon. 141-146 [doi]
- On minimizing WGS transponder power by optimizing channel gains designed for uplink frequency reuse via circular polarizationLino Gonzalez, Jerry Rippon. 147-152 [doi]
- Real-time control and management of roaming wideband SATCOM terminalsJerry Brand, Keith Olds, Thomas Saam. 153-157 [doi]
- A remote control and management scheme for deployed VSATs: An approach for the USAF pathfinder flexible modem interfaceDavid N. Meadows, Jordan Thomas. 158-163 [doi]
- A framework for super-resolution of scalable video via sparse reconstruction of residual framesMohammad Hossein Moghaddam, Mohammad Javad Azizipour, Saeed Vahidian, Besma Smida. 164-168 [doi]
- Compressive sensing based direction-of-arrival estimation using reweighted greedy block coordinate descent algorithm for ESPAR antennasHassan Yazdani, Azadeh Vosoughi, Nazanin Rahnavard. 169-173 [doi]
- Flexible filter bank based spectrum sensing and waveform processing for mission critical communicationsSener Dikmese, Markku Renfors, Ismail Güvenç. 174-179 [doi]
- Online classification of Class A impulse interferenceErik Axell, Sara Orn Tengstrand, Kia Wiklundh. 180-184 [doi]
- Sliding windows technique for LTE network coverage detectionMd Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner. 185-190 [doi]
- Novel user clustering schemes for downlink NOMA systemYuyu Ma, Hui Gao 0001, Tiejun Lv, Yueming Lu. 191-196 [doi]
- Power control in D2D-based multi-antenna V2V underlay cellular networks with rate constraintsXinxin Liu, Yunzhou Li, Limin Xiao, Jing Wang. 197-202 [doi]
- Subband bandwidth considerations for multiple-antenna multicarrier communicationsHenry Romero, Adam Margetts, Greg Kuperman. 203-208 [doi]
- Enhanced airport surface multi-carrier communication systems: Filterbank advantages over AeroMACS OFDMHosseinali Jamal, David W. Matolak. 209-213 [doi]
- Frame synchronization for OFDM using cyclic prefix and pilot carriersStephen G. Wilson, Rui Shang, Ruixuan He. 214-218 [doi]
- Performance of edge windowing for OFDM under non-linear power amplifier effectsCagri Goken, Onur Dizdar. 219-224 [doi]
- X509Cloud - Framework for a ubiquitous PKIHitesh Tewari, Arthur Hughes, Stefan Weber, Tomas Barry. 225-230 [doi]
- A dataset generator for next generation system call host intrusion detection systemsMarcus Pendleton, Shouhuai Xu. 231-236 [doi]
- A coalitional game theory approach for cybersecurity information sharingIman Vakilinia, Shamik Sengupta. 237-242 [doi]
- Evasion and causative attacks with adversarial deep learningYi Shi, Yalin E. Sagduyu. 243-248 [doi]
- Designing agility and resilience into embedded systemsDavid Whelihan, Michael Vai, N. Evancich, K. J. Kwak, J. Li, M. Britton, B. Frantz, D. Hadcock, M. Lynch, D. Schafer, J. DeMatteis, D. Russo. 249-254 [doi]
- Quantifying information leakage in a processor caused by the execution of instructionsBaki Berkay Yilmaz, Robert Locke Callan, Milos Prvulovic, Alenka G. Zajic. 255-260 [doi]
- Towards data assurance and resilience in IoT using blockchainXueping Liang, Juan Zhao, Sachin Shetty, Danyi Li. 261-266 [doi]
- The Mirai botnet and the IoT Zombie ArmiesGeorgios Kambourakis, Constantinos Kolias, Angelos Stavrou. 267-272 [doi]
- Maximizing interconnectedness and availability in directional airborne range extension networksThomas Shake, Rahul Amin. 273-278 [doi]
- Beyond Line-of-Sight range extension with OPAL using autonomous unmanned aerial vehiclesKin-Ping Hui, Damien Phillips, Asanka Kekirigoda. 279-284 [doi]
- An investigation into the use of software defined networking controllers in aerial networksDeJuan Anderson. 285-290 [doi]
- Software Defined Networks (SDNs) of RF Internet of Things (RIOTs) on Unmanned Aerial Systems (UASs)William D. Watson, Steve Huntsman, James T. Dolan. 291-296 [doi]
- An adjacency matrix approach to delay analysis in temporal networksJohn M. Shea, Joseph P. Macker. 297-302 [doi]
- Online learning with side informationXiao Xu, Sattar Vakili, Qing Zhao, Ananthram Swami. 303-308 [doi]
- Assigning teams to tasks under time-varying coordination costsYuan Li, Prithwish Basu. 309-314 [doi]
- Successive synthesis of latent Gaussian treesAli Moharrer, Shuangqing Wei, George T. Amariucai, Jing Deng. 315-320 [doi]
- Designing a low-cost mobile tracking system for communication with a medium earth orbit satellitePeter Dong, Harrison Carcione, Joseph Hutter, Gina Jiang, Charles Kuch, Soomin Park, Advai Podduturi, Peijing Xu, David Beering. 321-324 [doi]
- User location determination using delay and Doppler measurements in LEO satellite systemsYash Vasavada, Deepak Arur, Channasandra Ravishankar, Charles Barnett. 325-330 [doi]
- Determination of locations of calibration earth stations for ground based beam forming in satellite systemsYash Vasavada, Channasandra Ravishankar, J. Corrigan, Gaguk Zakaria, X. Huang. 331-336 [doi]
- Communication on the move with satellite digital beamformingMadhuprana Goswami, Hyuck M. Kwon, Khanh Pham, James Lyke, Thinh Nguyen. 337-341 [doi]
- Channel estimation for multi-way quantized distributed wireless relayingAhmad A. I. Ibrahim, Andrew C. Marcum, David J. Love, James V. Krogmeier. 342-347 [doi]
- Differential amplify-and-forward cooperative relaying in a software-defined radio testbed with an aerial relay nodeNgwe Thawdar, Ulysses Lee, Weifeng Su, Dimitris A. Pados. 348-353 [doi]
- Performance of selection DF scheme for a relay system with non-identical Rician fadingXian Liu. 354-359 [doi]
- Throughput and power management of access link DF type I relay nodes for LTE-A networks and beyondBilal Al-Doori, Xian Liu, Ayad N. Bihnam. 360-365 [doi]
- Efficient underwater communication modem for harsh and highly non-stationary channel conditions - A fully model-based approachMarcel Ries, Steffen Moser, Frank Slomka. 366-371 [doi]
- Nonlinear rank-based analog loop filters in delta-sigma analog-to-digital converters for mitigation of technogenic interferenceAlexei V. Nikitin, Ruslan L. Davidchack. 372-381 [doi]
- Confrontation with closed network nation: Open network society's choices and consequencesJuha Kukkola, Mari Ristolainen, Juha-Pekka Nikkarila. 382-387 [doi]
- Secure VM migration in tactical cloudletsGrace A. Lewis, Sebastián Echeverria, Dan Klinedinst, Keegan Williams. 388-393 [doi]
- A platform for evaluator-centric cybersecurity training and data acquisitionJaime C. Acosta, Joshua McKee, Alexander Fielder, Salamah Salamah. 394-399 [doi]
- Frankenstack: Toward real-time Red Team feedbackMarkus Kont, Mauno Pihelgas, Kaie Maennel, Bernhards Blumbergs, Toomas Lepik. 400-405 [doi]
- Cyber situational awareness enhancement with regular expressions and an evaluation methodologyHyun Kyoo Park, Min Sik Kim, Moosung Park, Kyungho Lee. 406-411 [doi]
- Statistical quality of service provisioning over edge computing mobile wireless networksXi Zhang, Qixuan Zhu. 412-417 [doi]
- Spreading the message: Defining the delay distribution in opportunistic communicationsGeorgios Kyriakou, Pei Liu, Shivendra S. Panwar, Stephen Raio, Giorgio Bertoli, William Scott Sanz, Harold Brown. 418-423 [doi]
- A hybrid caching scheme based on manifold learning in CCNWeiyuan Li, Yang Li, Wei Wang, Yonghui Xin, Yuemei Xu. 424-429 [doi]
- A content and context-aware solution for network state exchange in tactical networksRoberto Fronteddu, Alessandro Morelli, Enrico Casini, Niranjan Suri, Brian Jalaian, Laurel Sadler. 430-435 [doi]
- Modeling the age of information in emulated ad hoc networksClement Kam, Sastry Kompella, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides. 436-441 [doi]
- A new UHF narrowband satellite communications PHY layer for HPWJames Norris, John Nieto. 442-446 [doi]
- The multiple-satellite MIMO channel of narrow band vehicular communications at UHFRobert T. Schwarz, Florian Volk, Andreas Knopp, Christian A. Hofmann, Kai-Uwe Storek. 447-452 [doi]
- Autonomous maneuvering of relay UAV for battlefields using TDOA localizationHanguk Jee, Kyuman Lee, Jaesung Lim 0001. 453-458 [doi]
- Traffic optimization in software defined naval network for satellite communicationsPengyuan Du, Fan Pang, Torsten Braun, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim. 459-464 [doi]
- Multi-vehicle patrolling with limited visibility and communication constraintsTauhidul Alam, Md. Mahbubur Rahman, Leonardo Bobadilla, Brian Rapp. 465-470 [doi]
- A comparison of three adaptive transmission protocols for fountain-coded multicastSiddhartha S. Borkotoky, Patrick J. Dynes, Michael B. Pursley. 471-476 [doi]
- A more robust and efficient physical layer for SEDR airborne waveformO. Goubet, R. Fracchia, A. Descharles. 477-482 [doi]
- Near optimal channel rate discovery for discrete memoryless binary output channelsMichael A. Tope, Joel M. Morris. 483-488 [doi]
- New perspectives for coded continuous phase modulations for narrowband waveforms: Iterative versus non-iterative solutionsAdrien Le Naour, Elie Janin, Charly Poulliat. 489-494 [doi]
- Spatial modulation based on reconfigurable antennas - A new air interface for the IoTMarco Di Renzo. 495-500 [doi]
- Effects of unknown shadowing and non-line-of-sight on indoor tracking using visible lightZafer Vatansever, Maïté Brandt-Pearce. 501-506 [doi]
- Fluctuating extended target detection in clutter environment compressed sensing MIMO radarChris A. Rogers, Dimitrie C. Popescu. 507-512 [doi]
- Improved target-tracking process in PCLJaeuk Baek, Doyeon Kim, Hongsuk Shim, Youngnam Han. 513-518 [doi]
- Indoor localization through trajectory tracking using neural networksMahi Abdelbar, R. Michael Buehrer. 519-524 [doi]
- Underdetermined source number estimation based on complex wishart distribution using nested arraysYu Rong, Daniel W. Bliss. 525-530 [doi]
- The design and implementation of a multicast address moving target defensive system for internet-of-things applicationsKevin Andrea, Arda Gumusalan, Robert Simon, Hugh Harney. 531-538 [doi]
- Mitigating stealthy collision attack in energy harvesting motivated networksCong Pu, Sunho Lim, Byungkwan Jung, Manki Min. 539-544 [doi]
- Generalized stochastic Petri Net model based security risk assessment of software defined networksLaila M. Almutairi, Sachin Shetty. 545-550 [doi]
- System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 EthernetJoseph Sagisi, Joseph Tront, Randy C. Marchany. 551-556 [doi]
- Detection of collusive interest flooding attacks in named data networking using wavelet analysisYonghui Xin, Yang Li, Wei Wang, Weiyuan Li, Xin Chen. 557-562 [doi]
- Multi-hop routing protocols for RFID systems with tag-to-tag communicationChang Liu, Zygmunt J. Haas. 563-568 [doi]
- STAR: STAble routing for hidden interfering primary user problems in mobile cognitive radio networksShamsad Parvin, Abderrahmen Mtibaa, Hong Huang, Satyajayant Misra, S. M. Yahea Mahbub, Ali Alshehri, Ramin Zahedi. 569-574 [doi]
- Distributed split-path routing strategy for multi-hop mesh networksPaulo Alexandre Regis, Shamik Sengupta. 575-580 [doi]
- Elastic multicast: Design extensions and experimentation resultsBrian Adamson, Joseph P. Macker, Jeffery W. Weston. 581-586 [doi]
- Shortest paths for routing information over temporally dynamic communication networksMichael J. Hirsch, Azar Sadeghnejad, Héctor J. Ortiz-Peña. 587-591 [doi]
- Enabling real-time global reach using a gateway building frameworkNathaniel B. Soule, Benjamin Toll, Colleen T. Rock, Emily H. Do, Jonathan Price, Joseph P. Loyall, Joseph P. McEttrick, James R. Milligan. 592-598 [doi]
- Comparing tactical and commercial MANETs design strategies and performance evaluationsSalman M. Al-Shehri, Pavel Loskot, Tolga Numanoglu, Mehmet Mert. 599-604 [doi]
- Delay-tolerant data sharing in tactical environmentsSebastián Echeverria, Grace A. Lewis, Marc Novakouski, Jeff Boleng. 605-610 [doi]
- A test bed study of network determinism for heterogeneous traffic using time-triggered ethernetAllen Starke, D. Kumar, M. Ford, Janise McNair, A. Bell. 611-616 [doi]
- ComSens: Exploiting pilot diversity for pervasive integration of communication and sensing in MIMO-TDD-FrameworksMohammadreza Mousaei, Mojtaba Soltanalian, Besma Smida. 617-622 [doi]
- Utilizing sidelobe ASK based joint radar-communication system under fadingMuharrem Arik, Özgür B. Akan. 623-628 [doi]
- Robust blind spectral estimation in the presence of non-Gaussian noiseJoel T. Kees, Joseph M. Ernst, William C. Headley, A. A. Louis Beex. 629-634 [doi]
- Numerical reference frequency sampleJonathon Cheah, Mitre San Diego. 635-640 [doi]
- Single-channel blind separation of co-frequency PSK signals with unknown carrier frequency offsetsXiao-Bei Liu, Yong Liang Guan, Soo Ngee Koh, Zilong Liu, Peng Wang. 641-646 [doi]
- Sparsity-aware joint frame synchronization and channel estimation: Algorithm and USRP implementationÖzgür Özdemir, Ridha Hamila, Naofal Al-Dhahir, Ismail Güvenç. 647-652 [doi]
- Time-division approach in HF wideband: Surfing the wave to offer a better performanceCatherine Lamy-Bergot, Jean-Luc Rogier, Jean-Yves Bernier, Jean-Baptiste Chantelouve, Patrice Stevens, Philippe Crambert. 653-658 [doi]
- Evaluating physical-layer security for secondary users in cognitive radio systems with attackersDanda B. Rawat, Olumide Malomo, Chandra Bajracharya, Min Song 0002. 659-665 [doi]
- Independent source architecture for developing FPGA-based physical layer security techniquesJames Chacko, Marko Jacovic, Cem Sahin, Nagarajan Kandasamy, Kapil R. Dandekar. 666-671 [doi]
- Secrecy analysis of the cloud-Fog radio access network with poisson point process and general path-loss parametersXian Liu. 672-677 [doi]
- Anomaly detection on the edgeJoseph Schneible, Alex Lu. 678-682 [doi]
- A control flow graph-based signature for packer identificationMoustafa Saleh, E. Paul Ratazzi, Shouhuai Xu. 683-688 [doi]
- Towards a universal CDAR device: A high-performance adapter-based inline media encryptorBenjamin Nahill, Aaron Mills, Martin Kiernicki, David A. Wilson, Michael Vai, Roger Khazan, John Sherer. 689-694 [doi]
- Efficient distribution of fragmented sensor data for obfuscationJason A. Wampler, Chien Hsieh, Andrew Toth. 695-700 [doi]
- Online detection and control of malware infected assetsHasan Cam. 701-706 [doi]
- Bbuzz: A bit-aware fuzzing framework for network protocol systematic reverse engineering and analysisBernhards Blumbergs, Risto Vaarandi. 707-712 [doi]
- Coexistence of radar and communication systems in CBRS bands through downlink power controlNeelakantan Nurani Krishnan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella. 713-718 [doi]
- Signal constellation design in the presence of radar interference and Gaussian noiseNarueporn Nartasilpa, Daniela Tuninetti, Natasha Devroye. 719-724 [doi]
- Optimal pilot overhead for FDD full-duplex communication and radar sensing (ComSens)Hamza Soury, Besma Smida. 725-730 [doi]
- Comprehensive capability meta model tested by a cognitive radioJouni Koivisto, Topi Tuukkanen. 731-737 [doi]
- Design of a software defined radio-based tactical DSA networkSusan Watson, Jean-Benoit Larouche. 738-743 [doi]
- LTE PHY layer vulnerability analysis and testing using open-source SDR toolsRaghunandan M. Rao, Sean Ha, Vuk Marojevic, Jeffrey H. Reed. 744-749 [doi]
- WISCA SDR networkHanguang Yu, Hyunseok Lee, Richard M. Gutierrez, Andrew Herschfelt, Daniel W. Bliss. 750-755 [doi]
- Accurate symbol-level synchronization of universal software radio peripherals for physical-layer network coding applicationsDmitry Kramarev. 756-761 [doi]
- Implementation of interface agility for duplex dynamic spectrum access radio using USRPSuman Bhunia, Shamik Sengupta. 762-767 [doi]
- Blockage of millimeter wave communications on rotor UAVs: Demonstration and mitigationJingchao Bao, Derek Sprinz, Husheng Li. 768-774 [doi]
- Real-time ultra-wideband frequency sweeping channel sounder for 3-18 GHzC. Umit Bas, Vinod Kristem, Rui Wang 0026, Andreas F. Molisch. 775-781 [doi]
- Stationarity region of Mm-Wave channel based on outdoor microcellular measurements at 28 GHzRui Wang 0026, C. Umit Bas, Seun Sangodoyin, Sooyoung Hur, Jeongho Park, Jianzhong Zhang, Andreas F. Molisch. 782-787 [doi]
- Survivable communications and autonomous delivery service a generic swarming framework enabling communications in contested environmentsRobert Hunjet, Thomas Stevens, Mathew Elliot, Bradley Fraser, Peter George. 788-793 [doi]
- Learning information release policies for preventing intersection attacksSaritha Arunkumar, Mudhakar Srivatsa, Elisa Bertino. 794-799 [doi]
- WarnFi: Non-invasive wifi-based abnormal activity sensing using non-parametric modelNa Pang, Dali Zhu, Gang Li, Shaowu Liu. 800-805 [doi]
- Design and analysis of dual helix liquid metal antennaJonathan Thews, Alan O'Donnell, Alan J. Michaels. 806-811 [doi]
- Design and analysis of two-dimensional parasitic liquid metal monopole arrayJonathan Thews, Alan O'Donnell, Alan J. Michaels. 812-816 [doi]
- Investigation of beamforming patterns from volumetrically distributed phased arraysDrew Overturf, Kristopher Buchanan, Jeffrey Jensen, Carlos Flores-Molina, Sara Wheeland, Gregory H. Huff. 817-822 [doi]
- Further refinements to the foundations of cyber zone defenseRobert Mitchell, Elizabeth Walkup. 823-828 [doi]
- 3-Way game model for privacy-preserving cybersecurity information exchange frameworkIman Vakilinia, Deepak K. Tosh, Shamik Sengupta. 829-834 [doi]
- Privacy preserving localization using a distributed particle filtering protocolTyler Ward, Joseph I. Choi, Kevin R. B. Butler, John M. Shea, Patrick Traynor, Tan F. Wong. 835-840 [doi]
- PRNG sequence combination techniques via Galois extension fieldsAlan J. Michaels, Matthew Meadows, Joseph M. Ernst. 841-845 [doi]
- Joint optimization of emergency and periodic message transmissions in vehicular networksJaeyoung Choi, Yung Yi. 846-851 [doi]
- On the performance of mode selection for hybrid-duplex D2D communicationsChenchen Liu, Tiejun Lv, Weijun Tang, Hui Gao 0001, Yueming Lu. 852-857 [doi]
- Joint network coding and backpressure algorithm for cognitive radio networksSohraab Soltani, Yalin E. Sagduyu, Sean Scanlon, Yi Shi, Jason H. Li, Jared Feldman, John D. Matyjas. 858-863 [doi]
- RMTS-a: A scheduling based MAC protocol with frame aggregation for multi-rate radios in an Ad Hoc networkVikas Bollapragada Subrahmanya, Harlan B. Russell. 864-869 [doi]
- Proxy pair optimizations for increased service reliability in DIL networksJoakim Johanson Lindquister, Frank T. Johnsen, Trude Hafsoe Bloebaum. 870-875 [doi]
- Software Defined Network Based Virtual Machine Placement in Cloud SystemsJoel Anderson, Jin-Hee Cho. 876-881 [doi]
- Cloud computing in tactical environmentsWarren Smith, Greg Kuperman, Michael Chan, Eric Morgan, Huy Nguyen, Nabil Schear, Bich Vu, Andrew Weinert, Matthew Weyant, Daniel Whisman. 882-887 [doi]
- Channel estimation and equalization for CPM with application for aeronautical communications via a satellite linkRomain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent. 888-893 [doi]
- Outage probability analysis of the Protected Tactical Waveform (PTW) on the return linkLan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran. 894-899 [doi]
- A secrecy model in satellite fading channelsXian Liu. 900-905 [doi]