Abstract is missing.
- Secure Transmission via Lens Antenna Array in Millimeter Wave MISO SystemsHyojin Lee, Wanjik Kim, Joonhyuk Kang. 1-6 [doi]
- Efficient and Robust Physical Layer Key GenerationTianyi Peng, Wenhan Dai, Moe Z. Win. 1-6 [doi]
- Domain Flux-based DGA Botnet Detection Using Feedforward Neural NetworkMd. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman. 1-6 [doi]
- Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based CorrelationJianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu 0020, Min Yu, Weiqing Huang, Prasant Mohapatra. 1-6 [doi]
- Towards Mature Federated Cyber Incident Management and Information Sharing Capabilities in NATO and NATO NationsSarah Brown, Tamsin Moye, Rob Hubertse, Cezar Glavan. 1-5 [doi]
- ScriptNet: Neural Static Analysis for Malicious JavaScript DetectionJack W. Stokes, Rakshit Agrawal, Geoff McDonald, Matthew J. Hausknecht. 1-8 [doi]
- A System for Analyzing Diversified Software BinariesDavid Reyes, Jaime C. Acosta, Adriana Escobar De La Torre, Salamah Salamah. 1-6 [doi]
- Human EMF Exposure in Wearable Networks for Internet of Battlefield ThingsImtiaz Nasim, Seungmo Kim. 1-6 [doi]
- A Practical Method for BEP Estimation of Convolutional Coding in Impulse Noise EnvironmentsPatrik Eliardsson, Erik Axell, Arwid Komulainen, Kia Wiklundh, Sara Örn Tengstrand. 1-6 [doi]
- Detecting Cellphone Camera Status at Distance by Exploiting Electromagnetic EmanationsBaki Berkay Yilmaz, Elvan Mert Ugurlu, Milos Prvulovic, Alenka G. Zajic. 1-6 [doi]
- Insights into Malware Detection via Behavioral Frequency Analysis Using Machine LearningAaron Walker, Shamik Sengupta. 1-6 [doi]
- Enabling Interoperability for ROS-based Robotic Devices for Smart City HADR OperationsManas Pradhan, Sushma Devaramani. 1-6 [doi]
- Model-Guided Infection Prediction and Active Defense Using Context-Specific Cybersecurity ObservationsHasan Cam. 1-6 [doi]
- A Case Study on using Deep Learning for Network Intrusion DetectionGabriel C. Fernandez, Shouhuai Xu. 1-6 [doi]
- Dynamic Generation of Empirical Cyberattack Models with Engineered Alert FeaturesAhmet Okutan, Fu-Yuan Cheng, Shao-Hsuan Su, Shanchieh Jay Yang. 1-6 [doi]
- Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case StudyEric Ficke, Kristin M. Schweitzer, Raymond M. Bateman, Shouhuai Xu. 1-6 [doi]
- Data Collection and Analysis Framework for Mobile Ad Hoc Network ResearchScott Arbiv, Rahul Amin, Tom Goff, Dow Street, Igor Pedan, Larry Bressler, Terrence Gibbons, Bow-Nan Cheng, Chayil Timmerman. 1-6 [doi]
- Scalable Blockchain Implementation for Edge-based Internet of Things PlatformAbel O. Gomez Rivera, Deepak K. Tosh, Laurent Njilla. 1-6 [doi]
- Real-Time and Embedded Deep Learning on FPGA for RF Signal ClassificationSohraab Soltani, Yalin E. Sagduyu, Raqibul Hasan, Kemal Davaslioglu, Hongmei Deng, Tugba Erpek. 1-6 [doi]
- The NNBC Anti-DDoS FirewallGregory L. Frazier, Jacob A. McGill, Ruffy Zarookian, Seth Robertson, Benjamin Floyd, Patrick M. McNeely. 1-7 [doi]
- Hardening Containers for Cross-Domain ApplicationsJason Dahlstrom, Jim Brock, Mekedem Tenaw, Matthew Shaver, Stephen Taylor. 1-6 [doi]
- Detection of Encrypted Malicious Network Traffic using Machine LearningMichael J. De Lucia, Chase Cotton. 1-6 [doi]
- On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the AdversaryManisha Parmar, Alberto Domingo. 1-6 [doi]
- Neural Malware Control with Deep Reinforcement LearningYu Wang, Jack W. Stokes, Mady Marinescu. 1-8 [doi]
- Denial of Service Detection & Mitigation Scheme using Responsive Autonomic Virtual Networks (RAvN)Allen Starke, ZiXiang Nie, Morgan Hodges, Corey Baker, Janise McNair. 1-6 [doi]
- Are We There Yet?: Monitoring the Technical Deployment of the National Segments of the InternetVeikko Siukonen, Mari Ristolainen, Juha-Pekka Nikkarila, Juha Kukkola. 1-5 [doi]
- Detection of Prevalent Malware Families with Deep LearningJack W. Stokes, Christian Seifert, Jerry Li, Nizar Hejazi. 1-8 [doi]
- Automating Distributed Firewalls: A Case for Software Defined Tactical NetworksBrent E. Logan, Geoffrey G. Xie. 1-6 [doi]
- On the Application of Key-Based Physical Layer Security in 5G Heterogeneous NetworksAnil Kumar Yerrapragada, Patrick Ormond, Brian Kelley. 1-6 [doi]
- Runtime Detection of Userspace ImplantsJ. Aaron Pendergrass, Nathan Hull, John Clemens, Sarah C. Helble, Mark Thober, Kathleen Mcgill, Machon Gregory, Peter Loscocco. 1-6 [doi]
- Rumor Detection on Time-Series of Tweets via Deep LearningChandra Mouli Madhav Kotteti, Xishuang Dong, Lijun Qian. 1-7 [doi]
- An Intelligent System for Preventing SSL Stripping-based Session Hijacking AttacksMainduddin Ahmad Jonas, Md. Shohrab Hossain, Risul Islam, Husnu S. Narman, Mohammed Atiquzzaman. 1-6 [doi]
- When Autonomous Intelligent Goodware Will Fight Autonomous Intelligent Malware: A Possible Future of Cyber DefensePaul Théron, Alexander Kott. 1-7 [doi]
- Optimal Timing of Moving Target Defense: A Stackelberg Game ModelHenger Li, Zizhan Zheng. 1-6 [doi]
- Synthetic Intrusion Alert Generation through Generative Adversarial NetworksChristopher Sweet, Stephen Moskal, Shanchieh Jay Yang. 1-6 [doi]
- AI and Game Theory based Autonomous UAV Swarm for CybersecurityJanusz Kusyk, M. Ümit Uyar, Kelvin Ma, Joseph Plishka, Giorgio Bertoli, Jeffrey Boksiner. 1-6 [doi]
- VulnerVAN: A Vulnerable Network Generation ToolSridhar Venkatesan, E. Allison Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, Cho-Yu Jason Chiang, Alexander Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, Ritu Chadha. 1-6 [doi]
- Game-Theoretic Planning to Counter DDoS in NEMESISEric van den Berg, Seth Robertson. 1-6 [doi]
- An Online System Dependency Graph Anomaly Detection based on Extended Weisfeiler-Lehman KernelYongming Ben, Yanni Han, Ning Cai, Wei An, Zhen Xu. 1-6 [doi]
- A Gini Index-Based Countermeasure Against Sybil Attack in the Internet of ThingsBryan Groves, Cong Pu. 1-6 [doi]
- Understanding the Effects of TCP Tunneling on Approaching High Performance HAIPE-Encrypted Satellite Communication SystemsQi Zhao, Xin Tian 0002, Genshe Chen, Russell Harkanson, Yoohwan Kim, Khanh D. Pham. 1-6 [doi]
- Exploring the Application of Homomorphic Encryption to a Cross Domain SolutionCody Tinker, Kevin Millar, Alan Kaminsky, Michael T. Kurdziel, Marcin Lukowiak, Stanislaw P. Radziszowski. 1-6 [doi]
- IoTSpot: Identifying the IoT Devices Using their Anonymous Network Traffic DataLiangdong Deng, Yuzhou Feng, Dong Chen, Naphtali Rishe. 1-6 [doi]
- Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic RiskKamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Sharif Ullah. 1-8 [doi]
- Privacy-preserving Crowd-sensing for Dynamic Spectrum AccessErald Troja, Joshua Gitter. 1-6 [doi]
- Flexible Modem Interface Demonstration for Military TerminalsJoseph Vanderpoorten, Gary Thompson, David Brunnenmeyer, Rajeev Gopal, David Meadows, Mark Dale, Kevin Zhang. 1-8 [doi]
- Robust MIMO Communications Against Antenna Blockage and InterferenceYang Liu, Biao Chen, Janek J. Mroczek, John E. Malowicki, Richard J. Michalak. 7-12 [doi]
- On A Method to Evaluate Satellite Link Performance to Optimize PowerLino Gonzalez, Jerry Rippon. 9-12 [doi]
- Phase Noise, SATCOM and MIL-STD-188-165BLino Gonzalez, Jerry Rippon, John Besse. 13-16 [doi]
- Space-Time Coded ARTM CPM for Aeronautical TelemetryChad Josephson, Erik Perrins, Michael Rice. 13-18 [doi]
- Multi-User MIMO Satellite Communications with Secrecy ConstraintsMatthias G. Schraml, Andreas Knopp, Kai-Uwe Storek. 17-22 [doi]
- Frequency-Selective High-Order Phase Shift KeyingAlan J. Michaels, Michael Fletcher. 19-23 [doi]
- Outage Probability and Performance of Moderate-Length Codes under Partial-Band Noise Jamming (PBNJ)Lan K. Nguyen, Richard B. Wells, Duy H. N. Nguyen, Nghi H. Tran. 23-27 [doi]
- Multi-Cluster Frequency Correlation Modelling for Tactical VHF Channels in Mountainous TerrainMohamad Alkadamani, Colin Brown, Pierre Bouchard, Jeff Pugh. 24-29 [doi]
- Framework for Interoperable Command & Control of Joint Electromagnetic Spectrum OperationsYuriy Posherstnik, Edward Rocky Rocksvald, Bill Lussier, Mike Makowski. 28-33 [doi]
- Performance Evaluation of Transport Protocols in Tactical Network EnvironmentsAlessandro Morelli, Michel Provosty, Roberto Fronteddu, Niranjan Suri. 30-36 [doi]
- Improving the Performance of Tactical Waveform Software using Free and Open-Source ToolsMike Johnson, Terry D. May, Sean R. Thornton, Steve W. Boyd, Brent Merle. 34-39 [doi]
- Information Autonomy: Self-Adaptive Information Management for Edge-Assisted Autonomous UAV SystemsDavide Callegaro, Sabur Baidya, Gowri Sankar Ramachandran, Bhaskar Krishnamachari, Marco Levorato. 40-45 [doi]
- Experimental Evaluation of Named Data Networking (NDN) in Tactical EnvironmentsLorenzo Campioni, Mauro Tortonesi, Bastiaan Wissingh, Niranjan Suri, Mariann Hauge, Lars Landmark. 43-48 [doi]
- Efficiently Composing Validated Systems Integration Gateways for Dynamic, Diverse DataColleen T. Rock, Nathaniel Soule, Benjamin Toll, Emily H. Do, James R. Milligan, Matthew S. Paulini. 46-53 [doi]
- Joint Flocking and Deconfliction in Unmanned Aerial Vehicle SwarmsSrijita Mukherjee, Kamesh Namuduri. 49-55 [doi]
- Effects from Mutual Coupling on Communication Link ReliabilitySofia Bergström, Tore Lindgren. 54-58 [doi]
- Adding an on Off Keying (OOK) Communications Signal to a Free Space Optical Beacon Pointing Focal Plane Array SystemRyan C. Shoup, Steven Michael, James Glettler, Pablo I. Hopman. 59-64 [doi]
- A MBSE Approach to Satellite Clock Time and Frequency Adjustment in Highly Elliptical OrbitElliot Weiss, Linh-Thao Chung, Lan Nguyen. 65-69 [doi]
- Wideband Automated Planning Tool (WAPT) Prototype DevelopmentRichard L. Gobbi, Jonathon Hay, Nathan Tanner, Larry Lipke, Scot Miller, John A. Kirk. 70-75 [doi]
- An Open Standard for Ka-band Interoperable Satellite AntennasEric Cross. 76-81 [doi]
- SATCOM Digital IF Stream Rate Considerations for Earth Segment TransportA. J. Vigil, Dahesh A. Khalil. 82-88 [doi]
- An Algorithmic Approach to Highly Resilient SATCOMLan K. Nguyen, Joseph W. Tringe, Clayton Bosler, David Brunnenmeyer. 89-94 [doi]
- Tiered Unassisted Neighbor Discovery in Directional NetworksMatthew Sherman, Nicholas Sherman, Matthew Rasa, Joseph Stepien. 95-101 [doi]
- AWS-3 Interference Mitigation: Improving Spectrum Sharing with LTE & 5G Uplink Spectrum ControlHoward McDonald, Joy Cantalupo, Mike DiFrancisco, Anthony Rennier, Darcy Swain-Walsh, Jeffrey T. Correia, Venkatesh Ramaswamy, Cameron Patterson. 102-107 [doi]
- Portable Programmable Layer 3 QoS for Tactical MANETs: A P4/PSA-Based Architectural ApproachAlexander Poylisher, Yitzchak M. Gottlieb, Latha A. Kant. 108-112 [doi]
- Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud DetectionJianguo Jiang, Jiuming Chen, Tianbo Gu, Kim-Kwang Raymond Choo, Chao Liu 0020, Min Yu, Weiqing Huang, Prasant Mohapatra. 109-114 [doi]
- Combined Interference and Communications Strategy as a Defense Mechanism in Cognitive Radio Military NetworksMarcelo Camilo, David Fernandes Cruz Moura, Ronaldo M. Salles. 113-118 [doi]
- A Cognitive ML Agent for Airborne NetworkingF. Dell Kronewitter, Sumner Lee, Kenneth Oliphant. 115-120 [doi]
- Managing Video Streaming in Tactical NetworksRoberto Fronteddu, Daniel Duran, Adrien Moucheboeuf, Rita Lenzi, Alessandro Morelli, Niranjan Suri. 119-124 [doi]
- RSS-Based Q-Learning for Indoor UAV NavigationMd Moin Uddin Chowdhury, Fatih Erden, Ismail Güvenç. 121-126 [doi]
- High-Fidelity LTE Waveform Modeling for Commercial-DoD Spectrum Sharing: Characteristics and MethodsDarcy Swain-Walsh, Jeffrey T. Correia, Venkatesh Ramaswamy, Cameron Patterson, Howard McDonald, Josephine Cantalupo, Anthony Rennier, Mike DiFrancisco. 125-130 [doi]
- Aircraft Location Prediction using Deep LearningDamilola Adesina, Olutobi Adagunodo, Xishuang Dong, Lijun Qian. 127-132 [doi]
- Experiments with a Queuing Mechanism over Ever-Changing Data Rates in a VHF NetworkRoberto Rigolin Ferreira Lopes, Pooja Hanavadi Balaraju, Adrián Toribio Silva, Paulo H. L. Rettore, Peter Sevenich. 131-136 [doi]
- Communications Aware Adversarial Residual Networks for over the Air Evasion AttacksBryse Flowers, R. Michael Buehrer, William C. Headley. 133-140 [doi]
- Spectrum Sharing Test and Demonstration Program: Key Findings and ImplicationsAnthony Rennier, Howard McDonald, Joy Cantalupo, Kalle Kontson, Mike DiFrancisco, Jerry Hampton, Steve Jones, Jeffrey T. Correia. 137-142 [doi]
- Satellite Digital Channelizer with Predistorted High-Power AmplifierMadhuprana Goswami, Vidhi Rana, Hyuck M. Kwon, Khanh Pham, James Lyke. 141-144 [doi]
- Complementary Intermittently Nonlinear Filtering for Mitigation of Hidden Outlier InterferenceAlexei V. Nikitin, Ruslan L. Davidchack. 145-152 [doi]
- Chirp Spread Spectrum Signaling for Future Air-Ground CommunicationsNozhan Hosseini, David W. Matolak. 153-158 [doi]
- FHSS Signal Separation using Constrained ClusteringParker D. White, R. Michael Buehrer, William C. Headley. 159-164 [doi]
- A Stacked Predictor and Dynamic Thresholding Algorithm for Anomaly Detection in SpacecraftTianyu Li, Mary L. Comer, Edward J. Delp, Sundip R. Desai, James L. Mathieson, Richard H. Foster, Moses W. Chan. 165-170 [doi]
- The Potential Gains of Macrodiversity in mmWave Cellular Networks with Correlated BlockingEnass Hriba, Matthew C. Valenti. 171-176 [doi]
- Developing RFML Intuition: An Automatic Modulation Classification Architecture Case StudyWilliam H. Clark, Vanessa Arndorfer, Brook Tamir, Daniel Kim, Cristian Vives, Hunter Morris, Lauren J. Wong, William C. Headley. 292-298 [doi]
- Distributed Automatic Modulation Classification with Compressed DataLauren J. Wong, Parker D. White, Michael Fowler, William C. Headley. 299-304 [doi]
- Data Augmentation for Blind Signal ClassificationPeng Wang, Manuel Vindiola. 305-310 [doi]
- Practical Radio Frequency Learning for Future Wireless Communication SystemsDamilola Adesina, Joshua Bassey, Lijun Qian. 311-317 [doi]
- Multiple Machine Learning Algorithms Comparison for Modulation Type Classification for Efficient Cognitive RadioInna Valieva, Mats Björkman, Johan Åkerberg, Mikael Ekström, Iurii Voitenko. 318-323 [doi]
- IoT: Smart City Parking Solutions with Metric-Chisini-Jensen-Shannon Divergence based KernelsPiyush Sharma, Adrienne Raglin. 324-330 [doi]
- Adaptive Kalman Tracking for Indoor Visible Light PositioningYusuf Said Eroglu, Fatih Erden, Ismail Güvenç. 331-336 [doi]
- Data Association for Tracking Extended TargetsFlorian Meyer, Moe Z. Win. 337-342 [doi]
- Event-Triggered Synchronization for Mobile Distributed Transmit BeamformingDmitry Kramarev, Ishtiaq Ahmad, Kelvin J. Layton, Marc Lavenant, Hidayat Soetiyono, Gottfried Lechner, Hajime Suzuki, Ian Grivell, Stephen Leak. 343-348 [doi]
- An Acquisition Technique for LTE over SatelliteXiangdong Liu, Dilip Gokhale. 349-354 [doi]
- HopSAC: Frequency Hopping Parameter Estimation Based on Random Sample Consensus for Counter-Unmanned Aircraft SystemsBrandon F. Lo, Scott Torborg, Chun Kin Au-Yeung. 355-360 [doi]
- An Effective Load Balanced Controller Placement Approach in Software-Defined WANsNing Cai, Yanni Han, Yongming Ben, Wei An, Zhen Xu. 361-366 [doi]
- Dandelion: A Novel, High-Level Programming System for Software Defined Coalitions with Local State SharingXin Wang, Qiao Xiang, Jeremy Tucker, Vinod K. Mishra, Yang Richard Yang. 367-372 [doi]
- An Integrated Software-Defined Battlefield Network Testbed for Tactical Scenario EmulationQi Zhao, Adam J. Brown, Jae H. Kim, Mario Gerla. 373-378 [doi]
- Identifying Bottleneck Nodes using Packet Delay StatisticsJoshua Marker, John M. Shea, Tan F. Wong, Eric Graves 0001, Paul L. Yu. 447-452 [doi]
- Physical Layer Firewall Design using Co-Channel Underlay-Based Watermark AuthenticationMichael Fletcher, Joseph D. Gaeddert, Alan J. Michaels. 453-457 [doi]
- Deep Learning for an Anti-Jamming CPM ReceiverY. Qiu, C. Brown, L. Li. 458-463 [doi]
- Cooperative UAV Jammer for Enhancing Physical Layer Security: Robust Design for Jamming Power and TrajectoryYujung Roh, Seungjae Jung, Joonhyuk Kang. 464-469 [doi]
- Achievable Information-Theoretic Secrecy in the Presence of a RadarBo Guan, Dennis L. Goeckel. 476-481 [doi]
- Assessing Anti-Jamming Performance of Directional Wireless LinksFeng Ouyang, Oscar F. Somerlock, Arnab Das, David E. Bengtson. 482-489 [doi]
- Stochastic Packet Forwarding Algorithm in Flying Ad Hoc NetworksCong Pu. 490-495 [doi]
- QFloor: Queue Delay Reduction in Dynamic Backpressure NetworksLaura Poplawski Ma, Stephen Zabele, Christophe J. Merlin, Gregory Lauer, Stephen Dabideen. 496-501 [doi]
- G3M: A heuristic for low-latency multicast back-pressure forwardingStephen Dabideen, Stephen Zabele, Christophe J. Merlin, Laura Poplawski Ma, Gregory Lauer. 502-507 [doi]
- Modeling Resource Limited Cooperative Broadcasting using Hard Core Poisson ProcessWenjun Huang, Xu Li 0007, Hancheng Ma, Yanan Liang. 508-513 [doi]
- Improving Tactical Voice Communications using Cooperative Broadcast over a Narrowband ChannelArwid Komulainen, Jimmi Grönkvist, Ulf Sterner, Ulrika Uppman. 514-520 [doi]
- VINE: Zero-Control-Packet Routing for Ultra-Low-Capacity Mobile Ad Hoc NetworksAyush Dusia, Ram Ramanathan, Warren Ramanathan, Christophe Servaes, Adarshpal S. Sethi. 521-526 [doi]
- Securing IoT RF Fingerprinting Systems with Generative Adversarial NetworksKevin Merchant, Bryan Nousain. 584-589 [doi]
- Enhanced RF Fingerprinting for IoT Devices with Recurrent Neural NetworksKevin Merchant, Bryan Nousain. 590-597 [doi]
- Impairment Shift Keying: Covert Signaling by Deep Learning of Controlled Radio ImperfectionsKunal Sankhe, Kaushik R. Chowdhury, Francesco Restuccia, Salvatore D'Oro, Tong Jian, Zifeng Wang, Amani Al-Shawabka, Jennifer G. Dy, Tommaso Melodia, Stratis Ioannidis. 598-603 [doi]
- Intelligent Decentralized Dynamic Power Allocation in MANET at Tactical Edge based on Mean-Field Game TheoryZejian Zhou, Lijun Qian, Hao Xu. 604-609 [doi]
- QoS and Jamming-Aware Wireless Networking Using Deep Reinforcement LearningNof Abuzainab, Volkan Isler, Aylin Yener, Tugba Erpek, Kemal Davaslioglu, Yalin E. Sagduyu, Yi Shi 0001, Sharon J. Mackey, Mitesh P. Patel, Frank Panettieri, Muhammad A. Qureshi. 610-615 [doi]
- An Empirical Analysis of Plugin-Based Tor Traffic over SSH TunnelZhong Guan, Gaopeng Gou, Yangyang Guan, Bingxu Wang. 616-621 [doi]
- Optimizing Drone Deployment for Cellular Communication Coverage During Crowded EventsChérifa Boucetta, Aicha Dridi, Hassine Moungla, Hossam Afifi, Ahmed E. Kamal. 622-627 [doi]
- SSB and DSB Enabled Hybrid Waveforms for the Space-Ground Link SystemDan Shen, Khanh D. Pham, Genshe Chen. 628-633 [doi]
- A Multi-waveform Radio Receiver, an Example of Machine Learning Enabled Radio Architecture and DesignWade Leonard, Alex Saunders, Michael Calabro, Katherine Olsen. 634-639 [doi]
- Very High Throughput Internet of Things Networks with $K$ access points and $K$ devicesAnil Kumar Yerrapragada, Brian Kelley. 640-645 [doi]
- Reinforcement Learning-Enabled Reliable Wireless Sensor Networks in Dynamic Underground EnvironmentsHongzhi Guo, Bincy Ben. 646-651 [doi]
- Optimal Power Control with Channel Uncertainty in Ad Hoc NetworksShaoran Li, Y. Thomas Hou, Wenjing Lou, Brian Jalaian, Stephen Russell 0001, Benjamin MacCall. 652-657 [doi]
- Massive MIMO for Tactical Ad-hoc Networks in RF Contested EnvironmentsAsanka Kekirigoda, Kin-Ping Hui, Qingqing Cheng, Zhipeng Lin, J. Andrew Zhang, Diep N. Nguyen, Xiaojing Huang. 658-663 [doi]
- Autonomic Clustering in Temporal Network GraphsJoseph P. Macker, Jeffery W. Weston, David J. Claypool. 664-669 [doi]
- Multi-Domain Effects and the Internet of Battlefield ThingsStephen Russell 0001, Tarek F. Abdelzaher, Niranjan Suri. 724-730 [doi]
- P4-Based Hybrid Error Control Booster Providing New Design Tradeoffs in Wireless NetworksAnthony J. McAuley, Yitzchak M. Gottlieb, Latha A. Kant, John Lee 0003, Alexander Poylisher. 731-736 [doi]
- Mitigation of Civilian-to-Military Interference in DSRC for Urban OperationsSeungmo Kim, Tsigigenet Dessalgn. 737-742 [doi]
- CH-MAC: A Cluster-based, Hybrid TDMA MAC Protocol over Wireless Ad-hoc NetworksHoyong Choi, Jihwan Bang, Namjo Ahn, Jinhwan Jung, Jungwook Choi, Soobum Park, Yung Yi. 743-748 [doi]
- Coalition C3 Information Exchange Using Binary Symbolic VectorsChris Simpkin, Ian Taylor, Alun D. Preece, Graham A. Bent, Richard Tomsett, Raghu K. Ganti, Olwen Worthington. 784-789 [doi]
- Leveraging and Fusing Civil and Military Sensors to support Disaster Relief Operations in Smart EnvironmentsKonrad S. Wrona, Mauro Tortonesi, Michal Marks, Niranjan Suri. 790-797 [doi]
- MARGOT: Dynamic IoT Resource Discovery for HADR EnvironmentsLorenzo Campioni, Rita Lenzi, Filippo Poltronieri, Manas Pradhan, Mauro Tortonesi, Cesare Stefanelli, Niranjan Suri. 809-814 [doi]
- A Dynamic Transport Overlay System for Mission-Oriented Dispersed Computing Over IoBTAdrian E. Conway, Michael Wang, Emir Ljuca, P. David Lebling. 815-820 [doi]
- The Case for Robust Adaptation: Autonomic Resource Management is a VulnerabilityJoseph Noor, Ahmed Ali-Eldin, Luis Garcia, Chirag Rao, Venkat R. Dasari, Deepak Ganesan, Brian Jalaian, Prashant J. Shenoy, Mani B. Srivastava. 821-826 [doi]
- Application of Trust Assessment Techniques to IoBT SystemsIoannis Agadakos, Gabriela F. Ciocarlie, Bogdan Copos, Michael Emmi, Jemin George, Nandi Leslie, James Michaelis. 833-840 [doi]
- Evaluating Usability of Permissioned Blockchain for Internet-of-Battlefield Things SecurityErick D. Buenrostro, Abel O. Gomez Rivera, Deepak K. Tosh, Jaime C. Acosta, Laurent Njilla. 841-846 [doi]
- Pub/Sub-Sum: A Content Summarization Pub/Sub Protocol for Information-Centric NetworksJongdeog Lee, Suk Min Hwang, Tarek F. Abdelzaher, Kelvin Marcus, Kevin Chan 0001. 847-852 [doi]
- An Evaluation of Consensus Latency in Partitioning NetworksJason A. Tran, Gowri Sankar Ramachandran, Claudiu B. Danilov, Bhaskar Krishnamachari. 853-858 [doi]