Barry E. Mullins

According to our database1, Barry E. Mullins authored at least 84 papers between 1997 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver.
TCPS, 2019

Unsupervised Time Series Extraction from Controller Area Network Payloads.
CoRR, 2019

Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Pattern-of-Life Modeling in Smart Homes.
IEEE Internet of Things Journal, 2018

Unsupervised Time Series Extraction from Controller Area Network Payloads.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Variable Speed Simulation for Accelerated Industrial Control System Cyber Training.
Proceedings of the Critical Infrastructure Protection XII, 2018

2017
The Z-Wave routing protocol and its security implications.
Comput. Secur., 2017

Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance.
Proceedings of the Critical Infrastructure Protection XI, 2017

Defending Building Automation Systems Using DECOY Networks.
Proceedings of the Critical Infrastructure Protection XI, 2017

Generating Honeypot Traffic for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols.
I. J. Network Security, 2016

Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016

Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver.
Digital Investigation, 2016

Practical Application Layer Emulation in Industrial Control System Honeypots.
Proceedings of the Critical Infrastructure Protection X, 2016

2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.
IEEE Trans. Dependable Sec. Comput., 2015

Constructing cost-effective and targetable industrial control system honeypots for production networks.
Int. J. Crit. Infrastructure Prot., 2015

Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers.
Int. J. Crit. Infrastructure Prot., 2015

SDN shim: Controlling legacy devices.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

2014
VANISH: a variable advanced network IRC stealth handling system.
IJSN, 2014

Network vulnerability analysis of the Player command and control protocol.
IJSN, 2014

A black hole attack model using topology approximation for reactive ad-hoc routing protocols.
IJSN, 2014

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices.
Int. J. Crit. Infrastructure Prot., 2014

Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Large-scale cooperative task distribution on peer-to-peer networks.
Web Intelligence and Agent Systems, 2013

A Bin Packing Heuristic for On-Line Service Placement and Performance Control.
IEEE Trans. Network and Service Management, 2013

Watching for Weakness in Wild WPANs.
Proceedings of the 32th IEEE Military Communications Conference, 2013

TCP veto: A novel network attack and its Application to SCADA protocols.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks.
Proceedings of the Critical Infrastructure Protection VII, 2013

Design and Implementation of Industrial Control System Emulators.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Communications Surveys and Tutorials, 2012

RIPsec - Using reputation-based multilayer security to protect MANETs.
Comput. Secur., 2012

Improved tools for indoor ZigBee warwalking.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

PHY foundation for multi-factor ZigBee node authentication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Subjective audio quality over a secure IEEE 802.11n network.
IJSN, 2011

An FPGA System for Detecting Malicious DNS Network Traffic.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Provisioning Norm: An Asymmetric Quality Measure for SaaS Resource Allocation.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols.
IJSN, 2010

A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks.
IJAACS, 2010

Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation.
Proceedings of the 6th World Congress on Services, 2010

Simulating windows-based cyber attacks using live virtual machine introspection.
Proceedings of the SummerSim '10, 2010

Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Voice and video capacity of a secure IEEE 802.11g wireless network.
Mobile Computing and Communications Review, 2009

A secure group communication architecture for autonomous unmanned aerial vehicles.
Security and Communication Networks, 2009

Structured P2P technologies for distributed command and control.
Peer-to-Peer Networking and Applications, 2009

A security policy language for wireless sensor networks.
J. Syst. Softw., 2009

Enhancing realistic hands-on network training in a virtual environment.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Tracking Contraband Files Transmitted Using Bittorrent.
Proceedings of the Advances in Digital Forensics V, 2009

Towards a Taxonomy of Wired and Wireless Anonymous Networks.
Proceedings of IEEE International Conference on Communications, 2009

2008
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries.
Mobile Computing and Communications Review, 2008

A queueing approach to optimal resource replication in wireless sensor networks.
Perform. Evaluation, 2008

Hindering Reverse Engineering: Thinking Outside the Box.
IEEE Security & Privacy, 2008

Energy cost and error performance of range-aware, anchor-free localization algorithms.
Ad Hoc Networks, 2008

Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.
Proceedings of the 2008 IEEE International Performance, 2008

Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary.
Proceedings of the 2008 IEEE International Performance, 2008

The Scalability of Secure Lock.
Proceedings of the 2008 IEEE International Performance, 2008

A survey of state-of-the-art in anonymity metrics.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
A Cache Architecture for Extremely Unreliable Nanotechnologies.
IEEE Trans. Reliability, 2007

A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks.
Telecommunication Systems, 2007

Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Network, 2007

Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks.
IJSN, 2007

How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum.
IEEE Security & Privacy, 2007

Wireless sensor networks: guidelines for design and a survey of current research.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Alert Verification Evasion Through Server Response Forging.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment.
Proceedings of IEEE International Conference on Communications, 2007

The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An analysis of XML compression efficiency.
Proceedings of the Workshop on Experimental Computer Science, 2007

Audio-video capacity of an IEEE 802.11g wireless LAN.
Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems, 2007

Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Using Relocatable Bitstreams for Fault Tolerance.
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007

Program Fragmentation as a Metamorphic Software Protection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards.
Simulation, 2006

Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion.
IEEE Security & Privacy, 2006

Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Communications Magazine, 2006

2003
A portable microcontroller-based HTTP tunnelling activity detection system.
Proceedings of the IEEE International Conference on Systems, 2003

Toward finding an universal search algorithm for swarm robots.
Proceedings of the 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, Las Vegas, Nevada, USA, October 27, 2003

1998
Cater: an Opportunistic Medium Access Control Protocol for Wireless Local Area Networks.
PhD thesis, 1998

1997
An adaptive wireless local area network protocol that improves throughput via adaptive control of direct sequence spread spectrum parameters.
Mobile Computing and Communications Review, 1997

A Wireless Local Area Network Protocol that Improves Throughput via Adaptive Control.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997


  Loading...