


Остановите войну!
for scientists:


default search action
35th MILCOM 2016: Baltimore, MD, USA
- Jerry Brand, Matthew C. Valenti, Akinwale Akinpelu, Bharat T. Doshi, Bonnie L. Gorsic:
2016 IEEE Military Communications Conference, MILCOM 2016, Baltimore, MD, USA, November 1-3, 2016. IEEE 2016, ISBN 978-1-5090-3781-0 - Michael Atighetchi, Fusun Yaman, Borislava I. Simidchieva
, Marco M. Carvalho
:
An autonomous resiliency toolkit - needs, challenges, and concepts for next generation cyber defense platforms. 1-6 - Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini
, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. 7-12 - Steven W. Stone:
Agility in decision-making for cyberspace operations. 13-18 - Marco M. Carvalho
, Thomas C. Eskridge
, Michael Atighetchi, Nicholas Paltzer:
Semi-automated wrapping of defenses (SAWD) for cyber command and control. 19-24 - Elisha Peterson:
Dagger: Modeling and visualization for mission impact situation awareness. 25-30 - Eric D. Trias, William R. Simpson, Kevin E. Foltz, Frank P. Konieczny:
Enterprise Level Security. 31-36 - Zhuo Lu, Yalin E. Sagduyu:
Risk assessment based access control with text and behavior analysis for document management. 37-42 - Weiwei Zhao, Aixin Zhang, Jianhua Li, Xinghua Wu, Yuchen Liu:
Analysis and design of an authentication protocol for space information network. 43-48 - Nicolas Papernot, Patrick D. McDaniel, Ananthram Swami, Richard E. Harang:
Crafting adversarial input sequences for recurrent neural networks. 49-54 - David Whelihan, Michael Vai, Daniil M. Utin, Roger Khazan, Karen Gettings, Tom Anderson, Antonio Godfrey, Raymond Govotski, Mark Yeager, Brendon Chetwynd, Ben Nahill, Eric Koziel:
SHAMROCK: A Synthesizable High Assurance Cryptography and Key management coprocessor. 55-60 - Younghee Park, Shruti Daftari, Pratik Inamdar, Snehal Salavi, Aniket Savanand, Youngsoo Kim:
IoTGuard: Scalable and agile safeguards for Internet of Things. 61-66 - Vikas Bollapragada Subrahmanya, Harlan B. Russell:
Recovering the reserved transmission time slots in an ad hoc network with scheduled channel access. 67-72 - Zhifeng He, Shiwen Mao, Sastry Kompella
, Ananthram Swami:
Link scheduling and channel assignment with a graph spectral clustering approach. 73-78 - John Metzger, Vincent W. S. Chan, Christopher C. Yu:
A random access scheme for satellite packet communication with intentional interference. 79-84 - Zejue Wang, Hongjia Li, Dan Wang, Liming Wang, Song Ci:
Adaptive relaying for full-duplex energy harvesting enabled cooperative communication in harsh environments. 85-90 - Michael T. Cunningham, Gary J. Saulnier, Robert Chase, Edward M. Curt, Kyle R. Wilt, Francisco J. Maldonado, Stephen Oonk, Henry A. Scarton:
Low-rate ultrasonic communications and power delivery for sensor applications. 91-96 - Kevin Schubert, Nicholas Bambos:
Data aggregation for low power wireless devices. 97-102 - Nick Letzepis:
Optimal power allocation for parallel Gaussian channels with LPD constraints. 103-107 - Yalin E. Sagduyu, Yi Shi, Sharon J. Mackey, Derya H. Cansever, Mitesh P. Patel, Bart F. Panettieri:
Analytical framework for MANET learning and routing. 108-113 - Vincentzio Roman, Jakub J. Moskal, Mieczyslaw M. Kokar, Roger P. Guseman, Robert B. Normoyle, David H. Scheidt:
Reusability of knowledge for deriving latent situational information in EW scenarios. 114-119 - Di Wu, Dongmei Zhao, Weimiao Feng, Siye Wang
, Yu Zhang:
SPIN: An active location verification scheme for wireless sensor networks. 120-125 - Xin Tian, Genshe Chen, Khanh D. Pham, Erik Blasch:
Joint transmission power control in transponded SATCOM systems. 126-131 - Krittetash Pinyoanuntapong, Madhuprana Goswami, Ashfia Binte Habib, Hyuck M. Kwon, Khanh D. Pham:
Boundaries of signal-to-noise ratio for adaptive code modulations. 132-137 - Matthew Hannon, Shaung Feng, Hyuck M. Kwon, Khanh D. Pham:
Jamming statistics-dependent frequency hopping. 138-143 - Haya Shajaiah, Jasmin A. Mahal, Charles Clancy:
Resource management with anti-jamming capability for cognitive space communication systems. 144-149 - Tien M. Nguyen, Andy T. Guillen, Sumner S. Matsunaga:
Practical achievable capacity for advanced SATCOM on-the-Move. 150-155 - Mengqi Ren, Ruixin Niu, Gang Wang, Genshe Chen:
Minimax anti-jammer design for FHSS/QPSK satellite communication systems. 156-161 - Thi My Chinh Chu, Hans-Jürgen Zepernick
, Hoc Phan:
Optimal secrecy capacity of underlay cognitive radio networks with multiple relays. 162-167 - Wenqi Liu, Hongxiang Li, Sanjuli Agarwal, Bin Xie:
Optimize the spectrum sensing and decision making strategies under uncertainty for SATCOM. 168-173 - Yang Li, Qihang Peng:
Achieving secure spectrum sensing in presence of malicious attacks utilizing unsupervised machine learning. 174-179 - J. Daniel Park
, John F. Doherty:
A steganographic approach for covert waveform design. 180-185 - Tyler Ward, Eduardo L. Pasiliao, John M. Shea, Tan F. Wong:
Autonomous navigation to an RF source in multipath environments. 186-191 - Kyuman Lee, Jaesung Lim:
Self-correction scheme by adjusting the navigation signal transmission time. 192-197 - Elias Yaacoub
:
On the use of massive cylindrical antenna arrays for physical layer security. 198-203 - Gui Chao Huang, Magdy F. Iskander, Mahbub Hoque:
Advanced antenna array designs for directional networks. 204-207 - Kendrick Q. Henderson, Saeed I. Latif, Georgios Y. Lazarou:
A microstrip line-fed multi-resonant slot antenna in the 4G/LTE band for smartphones. 208-212 - Chriss Hammerschmidt, Robert T. Johnk:
Extracting clutter metrics from mobile propagation measurements in the 1755-1780 MHz band. 213-218 - Swapnil Mhaske, Predrag Spasojevic
, Ahsan Aziz, Malik Muhammad Usman Gul:
Link quality analysis in the presence of blockages for analog beamformed mm-wave channel. 219-224 - François Chan, Yiu Tong Chan, Robert J. Inkol:
Path loss exponent estimation and RSS localization using the linearizing variable constraint. 225-229 - Venkatesh Ramaswamy, Jerediah R. Fevold, Jeffrey T. Correia, Timothy E. Daughters:
Design of an anti-jamming Appliqué for LTE-based military communications. 230-235 - Gwenael Poitau:
LTE-UTac: LTE-U customization for multi-mission tactical networks. 236-241 - Rakibul Hasan, Sharif Atique, Mohammad Saquib, Jeffrey Boksiner:
Network coverage detection using order statistics: An LTE perspective. 242-247 - Lan K. Nguyen, Richard B. Wells, Khanh D. Pham:
Impact of satellite transponder nonlinearities on the performance of protected tactical waveform (PTW) for the return link (RL). 248-253 - Lun Li, Xin Tian, Genshe Chen, Khanh D. Pham, Erik Blasch:
Secure spectrum-efficient frequency hopping for return link of protected tactical satellite communications. 254-258 - Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger:
Agility maneuvers to mitigate inference attacks on sensed location data. 259-264 - Omar Nakhila, Cliff C. Zou:
Parallel active dictionary attack on IEEE 802.11 enterprise networks. 265-270 - Jon R. Ward, Mohamed F. Younis:
A cross-layer traffic analysis countermeasure against adaptive attackers of Wireless Sensor Networks. 271-276 - Xiaotao Feng, Zizhan Zheng, Derya Cansever, Ananthram Swami, Prasant Mohapatra:
Stealthy attacks with insider information: A game theoretic model with asymmetric feedback. 277-282 - Emrah Korkmaz, Andrey M. Dolgikh, Matthew Davis, Victor A. Skormin:
ICS security testbed with delay attack case study. 283-288 - Xinyuan Wang:
On the feasibility of real-time cyber attack attribution on the Internet. 289-294 - Akshay Kumar, Ahmed Abdel-Hadi, Charles Clancy:
A delay-optimal packet scheduler for M2M uplink. 295-300 - Clement Kam, Sastry Kompella
, Gam D. Nguyen, Jeffrey E. Wieselthier, Anthony Ephremides:
Controlling the age of information: Buffer size, deadline, and packet replacement. 301-306 - Xiang Mi, Limin Xiao, Ming Zhao, Xibin Xu, Shidong Zhou, Jing Wang:
Statistical QoS-driven power control and source adaptation for D2D communications. 307-312 - Akshay Kumar, Ahmed Abdelhadi, Charles Clancy:
A delay efficient multiclass packet scheduler for heterogeneous M2M uplink. 313-318 - Andrew Thornburg, Robert W. Heath Jr.
, Robert C. Daniels:
Capacity and scaling laws of dense mmWave and interference alignment ad hoc networks. 319-324 - Mahmudur Khan, Suman Bhunia, Murat Yuksel, Shamik Sengupta:
LOS discovery in 3D for highly directional transceivers. 325-330 - Rahul Amin, Tom Goff, Bow-Nan Cheng:
An evaluation of layer 2 and layer 3 routing on high capacity aerial directional links. 331-336 - Suman Bhunia, Mahmudur Khan, Shamik Sengupta, Murat Yuksel:
LOS discovery for highly directional full duplex RF/FSO transceivers. 337-342 - Joy Na Wang, Thomas H. Shake, Patricia Deutsch, Andrea Coyle, Bow-Nan Cheng:
Topology management algorithms for large-scale aerial high capacity directional networks. 343-348 - Jun Xiang Yeo, Yee Hui Lee
, Jin Teong Ong:
Use of weather radar rain cell motion forecasting for site diversity system. 349-353 - Pengyuan Du, Sobhan Nazari, Jorge Mena, Ruolin Fan, Mario Gerla, Riten Gupta:
Multipath TCP in SDN-enabled LEO satellite networks. 354-359 - Sobhan Nazari, Pengyuan Du, Mario Gerla, Ceilidh Hoffmann, Jae H. Kim, Antonio Capone
:
Software Defined naval network for satellite communications (SDN-SAT). 360-366 - Jonathon Cheah:
MUOS satellite communication beyond latitude 65° North. 367-372 - Yash Vasavada
, Ying Liu, Javier Sanchez, Prashant Kapoor, Yezdi Antia, Jack Rozmaryn, John Border:
An Uplink Power Control driven compensation of wideband, semi-static, rain or interference induced link impairments affecting satellite feeder links operating at Ka band and above. 373-378 - Bosung Kim, Gyumin Lee, Geunkyung Choi, Byeong-Hee Roh
:
Effective bandwidth based capacity request for real-time voice in GEO satellite system. 379-384 - Sungjun Ahn, Wonju Lee, Kwang-Eog Lee, Joonhyuk Kang:
Deterministic pilot jamming symbol design for enhanced physical layer secrecy. 385-389 - Karim A. Banawan
, Sennur Ulukus, Peng Wang, Brian Henz:
Secure rates in multiband broadcast channels with combating jammers. 390-395 - Corey D. Cooke
, Frederick K. Reed
, Luke J. Prince
, Jason M. Vann
, Adam L. Anderson
:
An efficient sparse FFT algorithm with application to signal source separation and 2D virtual image feature extraction. 396-400 - Darcy A. Bibb, Zhengqing Yun, Magdy F. Iskander:
Machine learning for source localization in urban environments. 401-405 - Marc Lichtman, T. Charles Clancy, Jeffrey H. Reed:
Reactive jammer piggybacking: Achieving antifragile electronic warfare. 406-411 - Zijian Mo, Weifeng Su, John D. Matyjas:
Amplify and forward relaying protocol design with optimum power and time allocation. 412-417 - Siddhartha S. Borkotoky, Michael B. Pursley:
A method for network-coded broadcast in an ad hoc network. 418-423 - Magdy F. Iskander, Zhengqing Yun, Farhan A. Qazi, Galen H. Sasaki, Asutosh Das:
Physical layer based approach for advanced directional networking. 424-429 - Ahmad A. I. Ibrahim, Jing Guo
, David J. Love, Navid Yazdani, Keith W. Forsythe:
Receiver design and bit allocation for a multi-user distributed relay network performing vector quantization. 430-435 - Bilal Al-Doori, Xian Liu:
Enabling NAICS to mitigate inter-cell interference in evolving wireless networks. 436-441 - Benjamin Peiffer, Raghu Mudumbai, Sairam Goguri, Anton Kruger, Soura Dasgupta:
Experimental demonstration of retrodirective beamforming from a fully wireless distributed array. 442-447 - Yavuz Yaman, Predrag Spasojevic
:
Reducing the LOS ray beamforming setup time for IEEE 802.11ad and IEEE 802.15.3c. 448-453 - Min Wang, Hui Gao, Xin Su, Tiejun Lv:
Joint channel allocation, mode selection and power control in D2D-enabled femtocells. 454-459 - Kareem Bonna, Predrag Spasojevic
, Emmanuel Kanterakis:
Subspace-based SIMO blind channel identification: Asymptotic performance comparison. 460-465 - Salvatore Talarico, Matthew C. Valenti, Thomas R. Halford:
Controlled barrage regions: Stochastic modeling, analysis, and optimization. 466-472 - Wenhao Xiong, Zijian Mo, Genshe Chen, Khanh D. Pham, Erik Blasch, Hyuck M. Kwon:
Agile MU-MIMO in congested environments with robust channel estimation. 473-478 - Brian Thompson, James R. Morris-King, Hasan Çam:
Controlling risk of data exfiltration in cyber networks due to stealthy propagating malware. 479-484 - Brian Thompson, James R. Morris-King, Richard E. Harang:
Slowing the spread of Bluetooth-based malware in mobile tactical networks. 485-490 - Scott E. Brown, Harold Brown, Michael Russell, Brian Henz, Michael Edwards, Frank Turner, Giorgio Bertoli:
Validation of network simulation model and scalability tests using example malware. 491-496 - Kayla M. Straub, Avik Sengupta, Joseph M. Ernst, Robert W. McGwier, Merrick Watchorn, Richard Tilley, Randolph Marchany:
Malware propagation in fully connected networks: A netflow-based analysis. 497-502 - James R. Morris-King, Hasan Çam:
Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning. 503-508 - Ragib Hasan
, Shams Zawoad, Md Munirul Haque:
StuxMob: A situational-aware malware for targeted attack on smart mobile devices. 509-514 - Heng Song, Xiangyang Li:
Collaborative detection of Covert Storage Channels. 515-520 - Kyuho Oh, Kyuman Lee, Jaesung Lim:
Point Transformation Scheme to protect location data changing in real time. 521-526 - Jinsheng Zhang, Qiumao Ma, Wensheng Zhang, Daji Qiao:
TSKT-ORAM: A two-server k-ary tree ORAM for access pattern protection in cloud storage. 527-532 - Mikko Kiviharju, Arseny Kurnikov:
Tactical CAC profile for NATO OLP? Performance estimations for NATO OLP cryptographic evolution stage. 533-538 - Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel:
Enabling reproducible cyber research - four labeled datasets. 539-544 - Ulrika Uppman, Jan Nilsson, Ulf Sterner:
Jamming effects on multicast traffic in ad hoc networks for different terrains. 545-550 - Weichen Wang, Ruohan Cao, Hui Gao, Tiejun Lv:
Robust beamforming and power allocation for secrecy in multi-pair decode-and-forward relay networks. 551-556 - Paul T. Watrobski, Douglas H. Summerville:
De-encapsulation of network packets for network protocol reverse engineering. 557-562 - Mazda Salmanian, J. David Brown, Ming Li, Tricia J. Willink:
On the robustness of the OLSR protocol under unwanted interference. 563-568 - Zhenxiang Gao, Weihua Zhou, Yongming Wang:
Exploiting social relationship for secure routing in mobile social networks. 569-575 - Lisa M. Scott, Kelvin Marcus, Rommie L. Hardy, Kevin S. Chan:
Exploring dependencies of networks of multi-genre network experiments. 576-581 - Joseph P. Macker:
Hamlet: A metaphor for modeling and analyzing network conversational adjacency graphs. 582-587 - Siddharth Pal, Yuxiao Dong, Bishal Thapa, Nitesh V. Chawla
, Ananthram Swami, Ram Ramanathan:
Deep learning for network analysis: Problems, approaches and challenges. 588-593 - Wei Gao:
Exploiting deployment information for social-aware contact prediction at the tactical edge. 594-599 - Joseph P. Macker:
An improved local bridging centrality model for distributed network analytics. 600-605 - Prithwish Basu:
K-anycasting strategies in networks: To grow or to prune? 606-611 - Vijitha Weerackody:
Spectrum sharing of VMES terminals with fixed service stations. 612-617 - Stephan P. Winter, Christian A. Hofmann
, Andreas Knopp:
Antenna diversity techniques for enhanced jamming resistance in multi-beam satellites. 618-623 - Tat Fung, Jeff Hoppe, Syed Akbar, Tom Rittenbach, Jenelle Vickberg:
Distributed SATCOM On-The-Move (SOTM) Terminal Open Standard Architecture. 624-629 - Jeff Hoppe, Tat Fung, Syed Akbar, Tom Rittenbach:
Distributed SATCOM On-The-Move Terminal Open Standard Architecture architectural details. 630-635 - Sebastián A. Zanlongo, Alexander C. Wilson, Leonardo Bobadilla
, Tamim Sookoor:
Scheduling and path planning for computational ferrying. 636-641 - Md. Mahbubur Rahman
, Leonardo Bobadilla
, Brian Rapp:
Establishing line-of-sight communication via autonomous relay vehicles. 642-647 - Guosheng Yang, Jun Wang, Guangrong Yue, Shaoqian Li:
Myriad MSK signal detection for VLF/LF communication. 648-653 - Juan Zeng, Ying Wang, Xinke Zhang, Keke Hu
, Yongming Wang:
Reduced-complexity IBDFE for faster-than-Nyquist communication systems. 654-659 - Stephen G. Wilson, Ho Him Jonathan Lo:
Optimum digital pulse shaping filters. 660-665 - Bruce F. McGuffin:
Median of Maxima Estimate (MOME) receivers for robust adaptive signal detection. 666-671 - Steven W. Ellingson, R. Michael Buehrer:
Frequency channel delay modulation for interference-robust low data rate communication. 672-677 - Alan J. Michaels, David B. Chester:
Adaptive correlation techniques for spread spectrum communication systems. 678-681 - Xin Wang, Xiaolin Zhang, Yuan Yang:
Doppler frequency offset estimation and compensation in OFDM aeronautical communication systems in the presence of narrow-band interference. 682-687 - Mostafa Ibrahim, Hüseyin Arslan
:
Zero Tail Filter Bank Spread OFDM. 688-693 - Gunjan Verma, Fikadu T. Dagefu, Brian M. Sadler
, Predrag Spasojevic
:
Implications of time/frequency synchronization tradeoff of quasi-synchronous multi-carrier DS-CDMA for robust communications at lower VHF. 694-699 - Donald C. Buzanowski, Frederick J. Block, Thomas C. Royster IV:
Digital construction and characterization of noise-like spread spectrum signals. 700-704 - Alexandros Palaios, Masih Nilforoushan, Petri Mähönen:
Understanding European forest radio propagation dynamics with in and out of forest transmitters. 705-710 - Stephen Andrew Laraway, José Loera, Hussein Moradi, Behrouz Farhang-Boroujeny:
Experimental results of FB-MC-SS on a wideband HF NVIS propagation channel. 711-716