Barry E. Mullins

Affiliations:
  • Air Force Institute of Technology, Wright-Patterson Air Force Base, USA


According to our database1, Barry E. Mullins authored at least 87 papers between 1997 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Security Analysis of the Masimo MightySat: Data Leakage to a Nosy Neighbor.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2019
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver.
ACM Trans. Cyber Phys. Syst., 2019

Unsupervised Time Series Extraction from Controller Area Network Payloads.
CoRR, 2019

Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Pattern-of-Life Modeling in Smart Homes.
IEEE Internet Things J., 2018

Unsupervised Time Series Extraction from Controller Area Network Payloads.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Variable Speed Simulation for Accelerated Industrial Control System Cyber Training.
Proceedings of the Critical Infrastructure Protection XII, 2018

2017
The Z-Wave routing protocol and its security implications.
Comput. Secur., 2017

Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance.
Proceedings of the Critical Infrastructure Protection XI, 2017

Defending Building Automation Systems Using DECOY Networks.
Proceedings of the Critical Infrastructure Protection XI, 2017

Generating Honeypot Traffic for Industrial Control Systems.
Proceedings of the Critical Infrastructure Protection XI, 2017

2016
An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols.
Int. J. Netw. Secur., 2016

Using timing-based side channels for anomaly detection in industrial control systems.
Int. J. Crit. Infrastructure Prot., 2016

Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver.
Digit. Investig., 2016

Practical Application Layer Emulation in Industrial Control System Honeypots.
Proceedings of the Critical Infrastructure Protection X, 2016

2015
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation.
IEEE Trans. Dependable Secur. Comput., 2015

Constructing cost-effective and targetable industrial control system honeypots for production networks.
Int. J. Crit. Infrastructure Prot., 2015

Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers.
Int. J. Crit. Infrastructure Prot., 2015

SDN shim: Controlling legacy devices.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

2014
VANISH: a variable advanced network IRC stealth handling system.
Int. J. Secur. Networks, 2014

Network vulnerability analysis of the Player command and control protocol.
Int. J. Secur. Networks, 2014

A black hole attack model using topology approximation for reactive ad-hoc routing protocols.
Int. J. Secur. Networks, 2014

Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices.
Int. J. Crit. Infrastructure Prot., 2014

Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Large-scale cooperative task distribution on peer-to-peer networks.
Web Intell. Agent Syst., 2013

A Bin Packing Heuristic for On-Line Service Placement and Performance Control.
IEEE Trans. Netw. Serv. Manag., 2013

Watching for Weakness in Wild WPANs.
Proceedings of the 32th IEEE Military Communications Conference, 2013

TCP veto: A novel network attack and its Application to SCADA protocols.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks.
Proceedings of the Critical Infrastructure Protection VII, 2013

Design and Implementation of Industrial Control System Emulators.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012

RIPsec - Using reputation-based multilayer security to protect MANETs.
Comput. Secur., 2012

Improved tools for indoor ZigBee warwalking.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

PHY foundation for multi-factor ZigBee node authentication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Subjective audio quality over a secure IEEE 802.11n network.
Int. J. Secur. Networks, 2011

An FPGA System for Detecting Malicious DNS Network Traffic.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Provisioning Norm: An Asymmetric Quality Measure for SaaS Resource Allocation.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols.
Int. J. Secur. Networks, 2010

A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation.
Proceedings of the 6th World Congress on Services, 2010

Simulating windows-based cyber attacks using live virtual machine introspection.
Proceedings of the SummerSim '10, 2010

Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Voice and video capacity of a secure IEEE 802.11g wireless network.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

A secure group communication architecture for autonomous unmanned aerial vehicles.
Secur. Commun. Networks, 2009

Structured P2P technologies for distributed command and control.
Peer-to-Peer Netw. Appl., 2009

A security policy language for wireless sensor networks.
J. Syst. Softw., 2009

Enhancing realistic hands-on network training in a virtual environment.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Tracking Contraband Files Transmitted Using Bittorrent.
Proceedings of the Advances in Digital Forensics V, 2009

Towards a Taxonomy of Wired and Wireless Anonymous Networks.
Proceedings of IEEE International Conference on Communications, 2009

Towards a Tree-Based Taxonomy of Anonymous Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

A queueing approach to optimal resource replication in wireless sensor networks.
Perform. Evaluation, 2008

Hindering Reverse Engineering: Thinking Outside the Box.
IEEE Secur. Priv., 2008

Energy cost and error performance of range-aware, anchor-free localization algorithms.
Ad Hoc Networks, 2008

Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks.
Proceedings of the 2008 IEEE International Performance, 2008

Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary.
Proceedings of the 2008 IEEE International Performance, 2008

The Scalability of Secure Lock.
Proceedings of the 2008 IEEE International Performance, 2008

A survey of state-of-the-art in anonymity metrics.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
A Cache Architecture for Extremely Unreliable Nanotechnologies.
IEEE Trans. Reliab., 2007

A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks.
Telecommun. Syst., 2007

Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007

Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks.
Int. J. Secur. Networks, 2007

How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum.
IEEE Secur. Priv., 2007

Wireless sensor networks: guidelines for design and a survey of current research.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Alert Verification Evasion Through Server Response Forging.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment.
Proceedings of IEEE International Conference on Communications, 2007

The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An analysis of XML compression efficiency.
Proceedings of the Workshop on Experimental Computer Science, 2007

Audio-video capacity of an IEEE 802.11g wireless LAN.
Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems, 2007

Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Using Relocatable Bitstreams for Fault Tolerance.
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007

Program Fragmentation as a Metamorphic Software Protection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards.
Simul., 2006

Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion.
IEEE Secur. Priv., 2006

Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006

2003
A portable microcontroller-based HTTP tunnelling activity detection system.
Proceedings of the IEEE International Conference on Systems, 2003

Toward finding an universal search algorithm for swarm robots.
Proceedings of the 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems, Las Vegas, Nevada, USA, October 27, 2003

1998
Cater: an Opportunistic Medium Access Control Protocol for Wireless Local Area Networks.
PhD thesis, 1998

1997
An adaptive wireless local area network protocol that improves throughput via adaptive control of direct sequence spread spectrum parameters.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1997

A Wireless Local Area Network Protocol that Improves Throughput via Adaptive Control.
Proceedings of the 1997 IEEE International Conference on Communications: Towards the Knowledge Millennium, 1997


  Loading...