Intrinsic physical-layer authentication of integrated circuits WE Cobb, ED Laspe, RO Baldwin, MA Temple, YC Kim IEEE Transactions on Information Forensics and Security 7 (1), 14-24, 2011 | 150 | 2011 |
Bluetooth inquiry time characterization and selection BS Peterson, RO Baldwin, JP Kharoufeh IEEE Transactions on mobile computing 5 (9), 1173-1187, 2006 | 136 | 2006 |
Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting HJ Patel, MA Temple, RO Baldwin IEEE transactions on reliability 64 (1), 221-233, 2014 | 127 | 2014 |
The use of attack and protection trees to analyze security for an online banking system K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 113 | 2007 |
An analysis of XML compression efficiency CJ Augeri, DA Bulutoglu, BE Mullins, RO Baldwin, LC Baird III Proceedings of the 2007 workshop on Experimental computer science, 7-es, 2007 | 94 | 2007 |
Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles MT Hyland, BE Mullins, RO Baldwin, MA Temple 21st International Conference on Advanced Information Networking and …, 2007 | 93 | 2007 |
Physical layer identification of embedded devices using RF-DNA fingerprinting WE Cobb, EW Garcia, MA Temple, RO Baldwin, YC Kim 2010-Milcom 2010 Military Communications Conference, 2168-2173, 2010 | 92 | 2010 |
A real-time medium access control protocol for ad hoc wireless local area networks RO Baldwin, NJ Davis IV, SF Midkiff ACM SIGMOBILE Mobile Computing and Communications Review 3 (2), 20-27, 1999 | 91 | 1999 |
A survey of state-of-the-art in anonymity metrics DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008 | 65 | 2008 |
Using relocatable bitstreams for fault tolerance DP Montminy, RO Baldwin, PD Williams, BE Mullins Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 701-708, 2007 | 64 | 2007 |
A novel communications protocol using geographic routing for swarming uavs performing a search mission RL Lidowski, BE Mullins, RO Baldwin 2009 IEEE International Conference on Pervasive Computing and Communications …, 2009 | 62 | 2009 |
Improving cross-device attacks using zero-mean unit-variance normalization DP Montminy, RO Baldwin, MA Temple, ED Laspe Journal of cryptographic engineering 3, 99-110, 2013 | 57 | 2013 |
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011 | 57 | 2011 |
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations CM Canadeo, MA Temple, RO Baldwin, RA Raines 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 1, 678-682, 2003 | 54 | 2003 |
Network intrusion detection: automated and manual methods prone to attack and evasion DJ Chaboya, RA Raines, RO Baldwin, BE Mullins IEEE security & privacy 4 (6), 36-43, 2006 | 52 | 2006 |
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol RO Baldwin, NJ Davis IV, SF Midkiff, RA Raines ACM SIGMOBILE Mobile Computing and Communications Review 5 (3), 11-25, 2001 | 48 | 2001 |
Improving the global information grid's performance through satellite communications layer enhancements VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila IEEE Communications Magazine 44 (11), 66-72, 2006 | 45 | 2006 |
Queueing network analysis: concepts, terminology, and methods RO Baldwin, NJ Davis Iv, SF Midkiff, JE Kobza Journal of systems and software 66 (2), 99-117, 2003 | 45 | 2003 |
Intrinsic physical layer authentication of integrated circuits WE Cobb, MA Temple, RO Baldwin, EW Garcia, ED Laspe US Patent 9,036,891, 2015 | 33 | 2015 |
Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process SJ Stone, MA Temple, RO Baldwin International Journal of Critical Infrastructure Protection 9, 41-51, 2015 | 31 | 2015 |