Abstract is missing.
- Attribute Based Encryption for Information Sharing on Tactical Mobile NetworksJim Luo, Qiuxiang Dong, Dijiang Huang, Myong H. Kang. 1-9 [doi]
- The Impact of Correlated Blocking on Millimeter- Wave Personal NetworksEnass Hriba, Matthew C. Valenti. 1-6 [doi]
- Precoding for Non-Coherent Detection of Continuous Phase ModulationsCharles-Ugo Piat-Durozoi, Charly Poulliat, Nathalie Thomas, Marie-Laure Boucheret, Guy Lesthievent. 1-5 [doi]
- Robust Neural Malware Detection Models for Emulation Sequence LearningRakshit Agrawal, Jack W. Stokes, Mady Marinescu, Karthik Selvaraj. 1-8 [doi]
- Attack and Defense of Dynamic Analysis-Based, Adversarial Neural Malware Detection ModelsJack W. Stokes, De Wang, Mady Marinescu, Marc Marino, Brian Bussone. 1-8 [doi]
- Customization Modes for the Harris MK-3 Authenticated Encryption AlgorithmPeter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski. 1-5 [doi]
- Long Short-Term Memory for Radio Frequency Spectral Prediction and its Real-Time FPGA ImplementationSiddhartha 0003, Yee Hui Lee, Duncan J. M. Moss, Julian Faraone, Perry Blackmore, Daniel Salmond, David Boland, Philip H. W. Leong. 1-9 [doi]
- Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on GraphsXiaoyun Wang, Chun-Ming Lai, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam. 1-9 [doi]
- Assessment Methodology for Collateral Damage and Military (Dis)Advantage in Cyber OperationsClara Maathuis, Wolter Pieters, Jan van den Berg. 1-6 [doi]
- Loop-Free Integrated Forwarding and Routing with GradientsJ. J. Garcia-Luna-Aceves, James Mathewson, Ram Ramanathan, Bishal Thapa. 1-9 [doi]
- Resilient Satellite Communications with Autonomous Multi-Modem AdapterRajeev Gopal. 1-6 [doi]
- Adaptive Link Optimization for 802.11 UAV Uplink Using a Reconfigurable AntennaStephen Wolfe, Simon Begashaw, Yuqiao Liu, Kapil R. Dandekar. 1-6 [doi]
- Network Traffic Obfuscation: An Adversarial Machine Learning ApproachGunjan Verma, Ertugrul N. Ciftcioglu, Ryan Sheatsley, Kevin S. Chan, Lisa Scott. 1-6 [doi]
- P4Guard: Designing P4 Based FirewallRakesh Datta, Sean Choi, Anurag Chowdhary, Younghee Park. 1-6 [doi]
- Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and EmailsJianguo Jiang, Jiuming Chen, Kim-Kwang Raymond Choo, Kunying Liu, Chao Liu, Min Yu, Prasant Mohapatra. 1-6 [doi]
- Applying Periodic Retraining to Survival Analysis-Based Dynamic Spectrum Access AlgorithmsMichael V. Lipski, Ram M. Narayanan. 1-6 [doi]
- Passive Channel Orthogonality Measurement Technique for MIMO SATCOMBalachander Ramamurthy, Robert T. Schwarz, William G. Cowley, Gerald Bolding, Andreas Knopp. 1-6 [doi]
- TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber DatasetsAsmah Muallem, Sachin Shetty, Liang Hong, Jan Wei Pan. 1-6 [doi]
- Latency-Aware Forwarding for IRON: Latency Support for Back-Pressure ForwardingChristophe J. Merlin, Laura Poplawski Ma, Gregory Lauer, Stephen Zabele. 1-6 [doi]
- Learning Ordinal Information Under Bipartite Stochastic Block ModelsXiao Xu, Qing Zhao, Ananthram Swami. 1-9 [doi]
- Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI NetworksEnahoro Oriero, Mohammad Ashiqur Rahman. 1-9 [doi]
- Exploiting Knowledge Across Distinct Domains: Learning Event Details from Network LogsMuchen Wu, Charu C. Aggarwal, Zhou Yu, Ananthram Swami, Prasant Mohapatra. 1-9 [doi]
- SOTA: Secure Over-the-Air Programming of IoT DevicesHalim Burak Yesilyurt, Hidayet Aksu, A. Selcuk Uluagac, Raheem A. Beyah. 1-8 [doi]
- Multi-Stage Attack Detection Using Contextual InformationFrancisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, Ibrahim Ghafir, Sangarapillai Lambotharan, Jonathon A. Chambers. 1-9 [doi]
- A Platform Service for Remote Integrity Measurement and AttestationJ. Aaron Pcnderarass, Sarah Helble, John Clemens, Peter Loscocco. 1-6 [doi]
- Frequency Estimation for Burst Communication Based on Irregular Repetition of Data SymbolsAlptekin Yilmaz, Mustafa Kesal, Furuzan Atay Onat. 1-9 [doi]
- CHIL: Common-Modem Hardware Integrated LibraryRyan Murphy, Ben Barnett, Landon Wagner, Jeffrey Wildman, Leonid Veytser, David Wiggins, Scott Buscemi, Tim Arganbright, Steve Clark, Bow-Nan Cheng. 1-6 [doi]
- Very Short Channel Codes for Burst-Type TransmissionsAndreas Lang, Berthold Lankl. 1-9 [doi]
- Performance Metrics for Cognitive Electronic Warfare - Electronic Support MeasuresScott Kuzdeba, Andrew Radlbeck, Matthew Anderson. 1-9 [doi]
- Inter-Network Interference in Synchronized Cooperative Broadcast SystemsUlf Sterner, Sara Linder, Jan Nilsson, Karina M. Fors. 1-9 [doi]
- RAKE Receiver for HF Filter Bank Multicarrier Spread Spectrum SystemsStephen Andrew Laraway, Hussein Moradi, Behrouz Farhang-Boroujeny. 1-6 [doi]
- Capacity Analysis and Bit Allocation Design for Variable-Resolution ADCs in Massive MIMOI. Zakir Ahmed, Hamid Sadjadpour, Shahram Yousefi. 1-6 [doi]
- Analysis of Spectrum Allocation to Support Mobile Ad-Hoc Networks in Contested EnvironmentsPaul J. Nicholas, Karla L. Hoffman. 1-6 [doi]
- On Cooperative Broadcast in MANETs with Imperfect Clock SynchronizationSerdar Sahin, Antonio Maria Cipriano, Charly Poulliat, Marie-Laure Boucheret. 1-7 [doi]
- Doubly-Selective Channel Estimation for Continuous Phase ModulationRomain Chayot, Nathalie Thomas, Charly Poulliat, Marie-Laure Boucheret, Nicolas Van Wambeke, Guy Lesthievent. 1-6 [doi]
- Secure Multi-Domain Information Sharing in Tactical NetworksFilippo Poltronieri, Lorenzo Campioni, Rita Lenzi, Alessandro Morelli, Niranjan Suri, Mauro Tortonesi. 1-6 [doi]
- Fountain-Coded Multicast in Tactical Packet Radio Networks: Throughput Improvements Provided by Relay NodesSiddhartha S. Borkotoky, Michael B. Pursley. 1-5 [doi]
- Array-Based Statistical Analysis of the MK-3 Authenticated Encryption SchemePeter Bajorski, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski. 1-9 [doi]
- Executing Analytics and Fusion Workloads on Transient Computing Resources in Tactical EnvironmentsAhmed Ali-Eldin, Deepak Ganesan, Heesung Kwon, Benjamin M. Marlin, Prashant J. Shenoy, Mani B. Srivastava, Don Towsley. 1-9 [doi]
- Low Probability of Exploitation Waveform Design Using Barankin Bound FormulationWilliam D. Watson, David J. Couto, Jonathan P. Beaudeau. 1-6 [doi]
- Normalized Matched Filter for Blind Interference SuppressionTaylor Sibbett, Hussein Moradi, Behrouz Farhang-Boroujeny. 1-6 [doi]
- OpenSDC: A Novel, Generic Datapath for Software Defined CoalitionsQiao Xiang, Franck Le, Yeon-sup Lim, Vinod K. Mishra, Christopher Williams, Y. Richard Yang, Hongwei Zhang. 1-6 [doi]
- Synchronous Waveform Clock Synchronization Without a System ControllerGeorge M. Vachula, Mu-Cheng Wang, Mário D. Amico, Gurpartap S. Takhar, Steven Howard. 1-6 [doi]
- ECHO: Efficient Zero-Control Network-Wide Broadcast for Mobile Multi-Hop Wireless NetworksRam Ramanathan, Christophe Servaes, Warren Ramanathan. 1-6 [doi]
- Image Classification on the Edge for Fast Multi-Camera Object TrackingNick Nordlund, Heesung Kwon, Geeth Ranmal De Mel, Leandros Tassiulas. 1-5 [doi]
- Latte: Large-Scale Lateral Movement DetectionQingyun Liu, Jack W. Stokes, Rob Mead, Tim Burrell, Ian Hellen, John Lambert, Andrey Marochko, Weidong Cui. 1-6 [doi]
- Emulation of Large-Scale LTE Networks in NS-3 and CORE: A Distributed ApproachAyman I. Sabbah, Abdallah Jarwan, Ismael Al-Shiab, Mohamed Ibnkahla, Maoyu Wang. 1-6 [doi]
- Sharing Susceptible Passwords as Cyber Threat Intelligence FeedIman Vakilinia, Sui Cheung, Shamik Sengupta. 1-6 [doi]
- Cooperative Ad Hoc Node Localization with Ground-Level Suburban Measurements via Machine Learning TechniquesAndreas Polydoros, Ioannis Dagres, Cenk Kose. 1-9 [doi]
- On the Performance of Single-Channel Source Separation of Two Co-Frequency PSK Signals with Carrier Frequency OffsetsXiao-Bei Liu, Yong Liang Guan, Soo Ngee Koh, Kok Ann Donny Teo, Zilong Liu. 1-5 [doi]
- ASAP: Preventing Starvation in Backpressure ForwardingLaura Poplawski Ma, Samuel Nelson, Gregory Lauer, Stephen Zabele. 1-9 [doi]
- Runtime State Verification on Resource-Constrained PlatformsJohn Clemens, Raj Pal, Branden Sherrell. 1-6 [doi]
- Filter Bank Multi-Carrier Spread Spectrum with Biorthogonal Signaling for High Speed Data Transmission Through HF Skywave ChannelsDavid B. Haab, Hussein Moradi, Behrouz Farhang-Boroujeny. 1-9 [doi]
- Multi-Domain Integration and Correlation EngineWilliam Dron, Andrew Hunter, Ali Sydney, Siddharth Pal, John P. Hancock, Lisa Scott, Tarek F. Abdelzaher, Jiawei Han 0001, Sibel Adali, Benjamin D. Horne. 1-9 [doi]
- Age of Information for Queues in TandemClement Kam, Joseph P. Molnar, Sastry Kompella. 1-6 [doi]
- Resolving Access Conflicts: An Auction-Based Incentive ApproachLiang Fang, Lihua Yin, Yunchuan Guo, Zhen Wang, FengHua Li. 1-6 [doi]
- Modeling of Highly Non-Stationary Low Altitude Aircraft-to-Aircraft ChannelsMichael Walter 0002, Dmitriy Shutin, Armin Dammann, David W. Matolak. 1-5 [doi]
- Machine Learning Based Featureless SignallingIsmail Shakeel. 1-9 [doi]
- Design and Performance Evaluation of High-Capacity Mobile Troposcatter Links Under Mobility, Frequency Selectivity, and Antenna Pointing ErrorsRamesh Annavajjala, James M. Zagami. 1-9 [doi]
- Wargaming a Closed National NetworkHeikki Lantto, Juha Kukkola, Bernt Åkesson, Juha-Pekka Nikkarila, Mari Ristolainen. 1-6 [doi]
- Time Synchronization Sequence with Weighted Conjugate Symmetry Property for FBMC-OQAM SystemsLiming Li, Yang Wang, Liqin Ding. 1-6 [doi]
- How to Introduce a Narrowband IoT Solution to an Existing Wireless Communications SystemCagri Goken, Guven Yenihayat, Tolga Numanoglu. 1-6 [doi]
- Publish/Subscribe Versus a Content-Based Approach for Information DisseminationFrank T. Johnsen, Lars Landmark, Mariann Hauge, Erlend Larsen, Øivind Kure. 1-9 [doi]
- Autonomous, Cooperative UAV Operations Using COTS Consumer Drones and Custom Ground Control StationEspen Skjervold, Oistein T. Hoelsreter. 1-6 [doi]
- High Bandwidth Electrically Small Antennas Through BFSK Direct Antenna ModulationJean Paul Santos, Foad Fereidoony, Yikun Huang, Yuanxun Ethan Wang. 1-9 [doi]
- Reinforcement Learning for Quality of Experience Optimization in Tactical NetworksGérôme Bovet, Kevin S. Chan. 1-6 [doi]
- Multi-Robot Enhanced MANET Intelligent Routing at Uncertain and Vulnerable Tactical EdgeMing Feng, Lijun Qian, Hao Xu. 1-9 [doi]
- Secure Neighbor Discovery Using Symmetric Link Management in Tactical Sensor NetworksKelvin Chew, Preetha Thulasiraman. 1-6 [doi]
- Machine Learning Based DDos Detection Through NetFlow AnalysisJiangpan Hou, Peipei Fu, Zigang Cao, Anlin Xu. 1-6 [doi]
- PAPR Analysis for Dual-Polarization FBMCHosseinali Jamal, David W. Matolak. 1-5 [doi]
- Dronecrypt - An Efficient Cryptographic Framework for Small Aerial DronesMuslum Ozgur Ozmen, Attila A. Yavuz. 1-6 [doi]
- Tactical Communication Link Under Joint Jamming and Interception by Same-Frequency Simultaneous Transmit and Receive RadioTaneli Riihonen, Dani Korpi, Matias Turunen, Tatu Peltola, Joni Saikanmaki, Mikko Valkama, Risto Wichman. 1-5 [doi]
- On the Defense Against Adversarial Examples Beyond the Visible SpectrumAnthony Ortiz, Olac Fuentes, Dalton S. Rosario, Christopher Kiekintveld. 1-5 [doi]
- A Brief Introduction to Named Data NetworkingAlexander Afanasyev, Jeff Burke, Tamer Refaei, Lan Wang, Beichuan Zhang, Lixia Zhang 0001. 1-6 [doi]
- Latency Analysis for Matched Filter Based Detection of Weak SignalsRichard M. Gutierrez, Arindam Dutta, Daniel W. Bliss. 1-6 [doi]
- IoT Devices Fingerprinting Using Deep LearningHossein Jafari, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu, Lijun Qian. 1-9 [doi]
- Software Defined Multi-Path TCP Solution for Mobile Wireless Tactical NetworksQi Zhao, Pengyuan Du, Mario Gerla, Adam J. Brown, Jae H. Kim. 1-9 [doi]
- Separating Terrorist-Like Topological Signatures Embedded in Benign NetworksKshiteesh Hegde, Malik Magdon-Ismail. 1-9 [doi]
- Enhancing the Common-Modem Hardware Integrated Library (CHIL) FrameworkJeffrey Wildman, Thomas Capuano, David Wiggins, Leonid Veytser, Omar Salama, Robert H. Spaanenburg, Jason Hillger, Bow-Nan Cheng. 1-6 [doi]
- A Multi-branch Linear Amplification with Nonlinear Components TechniqueJoão Guerreiro, Rui Dinis, Paulo Montezuma, Joao P. Oliveira, Mário Marques da Silva. 1-5 [doi]
- An Environment for Tactical SDN ExperimentationKelvin Marcus, Kevin S. Chan, Rommie L. Hardy, Paul L. Yu. 1-9 [doi]
- Impact of Header Compression on Tactical NetworksDavid Kidston, Philip Hugg. 1-6 [doi]
- Provisioning Robust and Interpretable AI/ML-Based Service BundlesAlun D. Preece, Dan Harborne, Ramya Raghavendra, Richard Tomsett, Dave Braines. 1-9 [doi]
- On the Design of Resource Allocation Algorithms for Low-Latency Video AnalyticsVictor Valls, Heesung Kwon, Tom LaPorta, Sebastian Stein 0001, Leandros Tassiulas. 1-6 [doi]
- Towards Practical Protection of Data Access Pattern to Cloud StorageQiumao Ma, Wensheng Zhang 0001. 1-9 [doi]
- Band Assignment in Dual Band Systems: A Learning-Based ApproachDaoud Burghal, Rui Wang 0026, Andreas F. Molisch. 7-13 [doi]
- Hierarchical Modulation Classification Using Deep LearningGarrett M. Vanhoy, Noah Thurston, Andrew Burger, Jacob Breckenridge, Tamal Bose. 20-25 [doi]
- Clustering Learned CNN Features from Raw I/Q Data for Emitter IdentificationLauren J. Wong, William C. Headley, Seth Andrews, Ryan M. Gerdes, Alan J. Michaels. 26-33 [doi]
- Unsupervised Estimation of Domain Applicability of ModelsNirmit Desai, Raghu K. Ganti, Heesung Kwon, Ian Taylor, Mudhakar Srivatsa. 34-39 [doi]
- Models for Predicting Community-Specific Interest in News ArticlesBenjamin D. Horne, William Dron, Sibel Adali. 46-51 [doi]
- Fast and Accurate Typosquatting Domains Evaluation with Siamese NetworksJing Ya, Tingwen Liu, Quangang Li, Pin Lv, Jinqiao Shi, Li Guo 0001. 58-63 [doi]
- A Framework for Characterizing the Evolution of Cyber Attacker-Victim Relation GraphsRichard B. Garcia-Lebron, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu. 70-75 [doi]
- Characterizing the Effectiveness of Network-Based Intrusion Detection SystemsEric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu. 76-81 [doi]
- Efficient Interconnectivity Among Networks Under Security ConstraintPankaz Das, Rezoan A. Shuvro, Mahshid Rahnamay-Naeini, Nasir Ghani, Majeed M. Hayat. 88-93 [doi]
- On Defensive Cyber Deception: A Case Study Using SDNCho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese. 110-115 [doi]
- Experimental Evaluation of Group Communications Protocols for Tactical Data DisseminationNiranjan Suri, Roberto Fronteddu, Eelco Cramer, Maggie R. Breedy, Kelvin Marcus, Ronald in 't Velt, Jan Nilsson, Mattia Mantovani, Lorenzo Campioni, Filippo Poltronieri, Giacomo Benincasa, Blake Ordway, Markus Peuhkuri, Mathias Rautenberg. 133-139 [doi]
- Routing, Network Coding and TCP Support for Wideband HF CommunicationsTugba Erpek, Yalin E. Sagduyu, Yi Shi 0001, Maice Costa, Kemal Davaslioglu, Hao Han, Daniel Fayette, Eric Johnson, Elizabeth Bentley, Clif Banner. 157-162 [doi]
- Utilization of Inter-Block Interference in MIMO-OFDM Communication SystemsJason R. Pennington, Richard K. Martin. 163-168 [doi]
- Antenna Radiation Pattern Compressive SensingMichael L. Don, Gonzalo R. Arce. 174-181 [doi]
- Frequency Correlation Modelling for Tactical VHF Channels in Mountainous TerrainJeff Pugh, Mohamad Alkadamani, Colin Brown, Vivianne Jodalen. 188-193 [doi]
- Joint Characterization of MM-Wave and CM-Wave Device-to-Device Fading ChannelsSeun Sangodoyin, Usman T. Virk, Daoud Burghal, Katsuyuki Haneda, Andreas F. Molisch. 194-200 [doi]
- How Secure are Multicarrier Communication Systems Against Signal Exploitation Attacks?Alireza Nooraiepour, Kenza Hamidouche, Waheed U. Bajwa, Narayan Mandayam. 201-206 [doi]
- Deep Reinforcement Learning for Dynamic Spectrum Access in Wireless NetworksY. Xu, J. Yu, William C. Headley, R. Michael Buehrer. 207-212 [doi]
- Deepmod: An Over-the-Air Trainable Machine Modem for Resilient PHY Layer CommunicationsAdam L. Anderson, Steven R. Young, Thomas P. Karnowski, Jason M. Vann. 213-218 [doi]
- Capacity of Deliberate Side-Channels Created by Software ActivitiesBaki Berkay Yilmaz, Milos Prvulovic, Alenka G. Zajic. 237-242 [doi]
- A Reinforcement Learning Approach to Adaptive Redundancy for Routing in Tactical NetworksMatthew Johnston, Claudiu Danilov, Kevin Larson. 267-272 [doi]
- Topology Algorithm Enhancements for Aerial High Capacity Directional NetworksJoy Na Wang, Patricia Deutsch, Scott Moore, Bow-Nan Cheng. 273-277 [doi]
- Through-the-Body Localization of Implanted Biochip in Wearable Nano-Biosensing NetworksHaochen Hu, Zhi Sun, Josep Miquel Jornet. 278-283 [doi]
- Signal Combination Techniques to Improve Long Range Communication with Multinle RelaysDavid A. Heide, Aaron E. Cohen, Thomas M. Moran. 284-289 [doi]
- Outage Probability and Constrained Capacity of Moderate-Length Codes for Gaussian Mixture Over AWGN ChannelLan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran. 290-295 [doi]
- Communications Performance Based Specification of Phase Noise for SATCOM SystemsA. J. Vigil, Mike D. Rhoades. 296-302 [doi]
- Nonlinear Co-Site Interference MeasurementJosh Wetherington, Glen Garner, Todd Nichols, Shaun Gidcumb, Eric Phillips, Michael Steer. 303-306 [doi]
- Multi-Carrier Envelope Tracking Power AmplifierJonmei J. Yan, Donald E. Cowles, Donald Kimball, Anders Mattsson. 313-316 [doi]
- On Jammer Power Allocation Against OFDM Signals in Fading ChannelsSaiDhiraj Amuru, R. Michael Buehrer. 317-322 [doi]
- Distortion Filtering for Communications Localization DenialJonathan P. Beaudeau, Prabahan Basu, David Couto, William D. Watson. 323-328 [doi]
- Chirp Spread Spectrum Performance in Low Probability of Intercept TheaterBijan G. Mobasseri, Khanh D. Pham. 329-335 [doi]
- Security Region Analysis with Artificial Noise Based on Secrecy Outage ProbabilityLitao Mao, Yongzhao Li, Tao Li 0010, Mingjun Gao, Hailin Zhang 0001. 336-340 [doi]
- Analysis of Pilot-Spoofing Attack in MISO-OFDM System Over Correlated Fading ChannelJasmin A. Mahal, T. Charles Clancy. 341-346 [doi]
- Broadband IP Over SATCOM Networking for Rotary Wing AircraftMaroula Bratakos, Rohit Gupta, William Harbison 0001. 358-363 [doi]
- A Receiver for Multicarrier Logarithmic Warped Frequency Domain Code WaveformsAlex Bvrley, Adly T. Fam. 376-381 [doi]
- Generating Realistic Data for Network AnalyticsJon J. Aho, Alexander W. Witt, Carter B. F. Casey, Nirav Trivedi, Venkatesh Ramaswamy. 401-406 [doi]
- Spectrum Data Poisoning with Adversarial Deep LearningYi Shi 0001, Tugba Erpek, Yalin E. Sagduyu, Jason H. Li. 407-412 [doi]
- Towards the Development of Robust Deep Neural Networks in Adversarial SettingsTodd P. Huster, Cho-Yu Jason Chiang, Ritu Chadha, Ananthram Swami. 419-424 [doi]
- Enablers of Adversarial Attacks in Machine LearningRauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D. McDaniel, Ananthram Swami. 425-430 [doi]
- On Detecting Manifestation of Adversary CharacteristicsSridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang, Ritu Chadha, Bharat Doshi, Blaine Hoffman, E. Allison Newcomb, Norbou Buchler. 431-437 [doi]
- Measuring Relative Accuracy of Malware Detectors in the Absence of Ground TruthJohn Charlton, Pang Du, Jin-Hee Cho, Shouhuai Xu. 450-455 [doi]
- Fooling a Neural Network in Military Environments: Random Untargeted Adversarial ExampleHyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi. 456-461 [doi]
- Hierarchical-Caching Based Statistical QoS Provisioning Over 5G Multimedia Big-Data Mobile Wireless NetworksXi Zhang, Qixuan Zhu. 480-485 [doi]
- LTE Uplink Interference Mitigation FeaturesHoward McDonald, D. J. Shyy, Matt Steele, Cameron Patterson. 505-511 [doi]
- Enhancing Service Availability of LTE-in-a-Box Systems Using 3GPP-Compliant StrategiesVenkatesh Ramaswamy, Jeffrey T. Correia. 512-517 [doi]
- Performance Analysis for MIMO HF Communications with Dominant Galactic NoiseHung-Yi Lo, James S. Lehnert, Phuong T. Tran. 524-529 [doi]
- Dimension-optimized Two-Stage Precoder Design for Massive Mimo Systems with Limited FeedbackJinho Kang, Jung Hoon Lee, Wan Choi. 530-535 [doi]
- A Noise-Masking Physical Layer Security Technique for MIMO Communications SystemsRobert Sellin, Frank Kragh. 536-540 [doi]
- A Coded MIMO Spatial Multiplexing Approach with Low-Complexity Matched-Filter Detector and CRC-Assisted Interference CancellationKentaro Masukawa, Hideki Ochiai. 541-546 [doi]
- Detecting Adversarial Examples Using Data ManifoldsSusmit Jha, Uyeong Jang, Somesh Jha, Brian Jalaian. 547-552 [doi]
- Adversarial Examples Against the Deep Learning Based Network Intrusion Detection SystemsKaichen Yang, Jianqing Liu, Chi Zhang, Yuguang Fang. 559-564 [doi]
- DeepGFL: Deep Feature Learning via Graph for Attack Detection on Flow-Based Network TrafficYepeng Yao, Liya Su, Zhigang Lu. 579-584 [doi]
- Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) ArchitectureDeepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua. 593-598 [doi]
- Secure Communications Using Blockchain TechnologyPeter Menegay, Jason Salyers, Griffin College. 599-604 [doi]
- A Brief Introduction to NDN Dataset Synchronization (NDN Sync)Tianxiang Li, Wentao Shang, Alexander Afanasyev, Lan Wang, Lixia Zhang 0001. 612-618 [doi]
- NAC: Automating Access Control via Named DataZhiyi Zhang, Yingdi Yu, Sanjeev Kaushik Ramani, Alexander Afanasyev, Lixia Zhang 0001. 626-633 [doi]
- Enabling a Data-Centric Battlefield Through Information Access GatewaysTamer Refaei, Alexander Afanasyev. 634-639 [doi]
- NDN Impact on Tactical Application DevelopmentJeff Burke, Alexander Afanasyev, Tamer Refaei, Lixia Zhang 0001. 640-646 [doi]
- Tactical Router Interoperability: Concepts and ExperimentsArjen Holtzer, Ronald In't Velt, Floris Drijver, Henning Rogge, Jonathan Kirchhoff, Christoph Barz, Niels L. M. van Adrichem, Mariann Hauge. 647-654 [doi]
- Enabling XEP-0258 Security Labels in XMPPJuha Järvinen, Aleksi Marttinen, Risto Järvinen, Per Carlen, Marko Luoma, Markus Peuhkuri, Jukka Manner. 661-666 [doi]
- Does NATO Need a Blockchain?Konrad Wrona, Michal Jarosz. 667-672 [doi]
- Functional Analysis of Cyberspace OperationsAlberto Domingo, Manisha Parmar. 673-678 [doi]
- DCIS Cube: Defining Architecture Building Blocks for Next Generation Deployable IT SystemsMarc van Selm, Hermann Wietgrefe, Joel Varanda, Detlef Janezic. 679-684 [doi]
- Efficient Multirate Filter Bank Structure with Full Spectral Utilization for Multicarrier CommunicationsRavi Kadlimatti, Adly T. Fam. 697-702 [doi]
- Experimental Comparison of FB-MC-SS and DS-SS in HF ChannelsStephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny. 714-719 [doi]
- Uncertainty-Based Opinion Inference on Network Data Using Graph Convolutional Neural NetworksXujiang Zhao, Feng Chen, Jin-Hee Cho. 731-736 [doi]
- The Internet of Battlefield Things: The Next Generation of Command, Control, Communications and Intelligence (C3I) Decision-MakingStephen Russell, Tarek F. Abdelzaher. 737-742 [doi]
- On Tracking Realistic Targets in a Megacity with Contested Domain AccessJongdeog Lee, Tarek F. Abdelzaher, Hang Qiu, Ramesh Govindan, Kelvin Marcus, Reginald Hobbs, Niranjan Suri, Will Dron. 743-748 [doi]
- Investigating LoRa for the Internet of Battlefield Things: A Cyber PerspectiveTorkjel Søndrol, Brian Jalaian, Niranjan Suri. 749-756 [doi]
- Enabling Efficient and Interoperable Control of IoBT Devices in a Multi-Force EnvironmentFilippo Poltronieri, Laurel Sadler, Giacomo Benincasa, Timothy Gregory, John M. Harrell, Somiya Metu, Christine Moulton. 757-762 [doi]
- Radio Frequency IoT Sensors in Military Operations in a Smart CityAaron E. Cohen, Gina G. Jiang, David A. Heide, Vincenzo Pellegrini, Niranjan Suri. 763-767 [doi]
- Secure Proxy-Reencryption-Based Inter-Network Key ExchangeLloyd G. Greenwald, Kurt Rohloff, David Stott. 780-785 [doi]
- An Empirical Upper Bound on Secrecy Capacity of Multipath Fading ChannelsSima Azizi, Arash Komaee. 786-791 [doi]
- Secrecy Performance of a Relaying System Over Non-Identical Fading ChannelsXian Liu. 792-797 [doi]
- Distributed Coherent Group CommunicationsYi Shi 0001, Satya Prakash Ponnaluri, Yalin E. Sagduyu, Eric Van Doorn. 798-803 [doi]
- Socio-spatial Resource Management in Wireless Powered Public Safety NetworksDimitrios Sikeridis, Eirini-Eleni Tsiropoulou, Michael Devetsikiotis, Symeon Papavassiliou. 810-815 [doi]
- The Effects of a UAV on a Terrestrial MANETErlend Larsen, Lars Landmark, Øivind Kure. 816-821 [doi]
- Emulating Wireless Networks with High Fidelity RF Interference ModelingThomas Schucker, Tamal Bose, Bo Ryu. 822-828 [doi]
- Spatial Modulation for Improved Eavesdropping Resistance in Multi-Beam Satellite DownlinksStephan P. Winter, Matthias G. Schraml, Marcus T. Knopp, Andreas Knopp. 829-834 [doi]
- Satellite Downlink Jamming Propagation Measurements at Ku-BandChristian A. Hofmann, Andreas Knopp. 853-858 [doi]
- Dealing with Partial Observations in Dynamic Spectrum Access: Deep Recurrent Q-NetworksY. Xu, J. Yu, R. Michael Buehrer. 865-870 [doi]
- RF Photonic Equalization Using Stimulated Brillouin ScatteringElliott Grafer, George Miles, Alex Cramer, Anthony Klee, Charles Middleton, Richard DeSalvo. 893-895 [doi]
- Decentralized Public Key Infrastructure for Internet-of-ThingsJongho Won, Ankush Singla, Elisa Bertino, Greg Bollella. 907-913 [doi]
- OS Independent and Hardware-Assisted Insider Threat Detection and Prevention FrameworkEnes Erdin, Hidayet Aksu, A. Selcuk Uluagac, Michael Vai, Kemal Akkaya. 926-932 [doi]
- Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal LogicMark Moulin, Emeka Eyisi, Devu Manikantan Shila, Qinqing Zhang. 933-938 [doi]
- PatchSweetner: Exploit Detection Through the Automatic Transformation of Security PatchesAdriaan Larmuseau, Devu Shila. 939-945 [doi]
- Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance AttacksAbdullah Aydeger, Nico Saputro, Kemal Akkaya. 946-951 [doi]
- Achieving Perfect Secrecy with One Bit KeysMohsen Karimzadeh Kiskani, Hamid R. Sadjadpour. 977-982 [doi]
- A New Lightweight Two-Party Key Agreement Protocol Defined on Underdetermined Systems of Polynomial Equations for Probable SecurityJun Liu. 989-994 [doi]
- Control Plane Performance in Tactical Software Defined NetworksJoakim Flathagen, Ole Ingar Bentstuen. 1001-1006 [doi]
- Towards Rapid Waveform Design and Deployment via Modular Signal Processing FrameworksJeffrey Wildman, Scott Moore, Leonid Veytser, Thomas Capuano, Jon Shapiro, Jason Hillger, Bow-Nan Cheng. 1031-1036 [doi]
- State Estimation for Tactical Networks: Challenges and ApproachesRoberto Fronteddu, Alessandro Morelli, Mattia Mantovani, Blake Ordway, Lorenzo Campioni, Niranjan Suri, Kelvin M. Marcus. 1042-1048 [doi]
- Power Optimization for Energy Efficient Wireless Communications Using Hybrid-ARQYi Li, Wenhao Xiong, Nichole Sullivan, Genshe Chen, Biao Chen, Gregory Hadynski, Clifden Banner, Yiran Xu, Xin Tian 0002. 1062-1067 [doi]
- Learning Service Semantics for Self-Organization in Distributed Environments: Concepts and Research DirectionsGraham A. Bent, Geeth de Mel, Raghu K. Ganti, Tom La Porta, Gavin Pearson, Tien Pham, Sebastian Stein 0001, Leandros Tassiulas, Ian Taylor. 1080-1085 [doi]