E. Paul Ratazzi

Orcid: 0000-0002-9817-6025

According to our database1, E. Paul Ratazzi authored at least 24 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TISIN: Traceable Information Sharing in Intermittent Networks.
Proceedings of the IEEE Military Communications Conference, 2023

Discovering Complex Correlations Among Multiple IoT Devices in Smart Environments.
Proceedings of the IEEE Global Communications Conference, 2023

VoiceGuard: An Effective and Practical Approach for Detecting and Blocking Unauthorized Voice Commands to Smart Speakers.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Security Issues in Situational Awareness: Adversarial Threats and Mitigation Techniques.
IEEE Secur. Priv., 2022

DICE-Enabled Distributed Security Schemes for the Air Force Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

Fine-Tuned Access Control for Internet of Things.
Proceedings of the Seventh International Conference on Fog and Mobile Edge Computing, 2022

2020
Differentially Private Federated Learning for Resource-Constrained Internet of Things.
CoRR, 2020

2019
PINPOINT: Efficient and Effective Resource Isolation for Mobile Security and Privacy.
CoRR, 2019

A Light-Weight Authentication Scheme for Air Force Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Effective UAV and Ground Sensor Authentication.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
BP: Integrating Cyber Vulnerability Assessments Earlier into the Systems Development Lifecycle: A Methodology to Conduct Early-Cycle Cyber Vulnerability Assessments.
Proceedings of the 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

An Efficient Privacy-Preserving Incentive Scheme without TTP in Participatory Sensing Network.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A control flow graph-based signature for packer identification.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

2014
A Systematic Security Evaluation of Android's Multi-User Framework.
CoRR, 2014

Instructions-Based Detection of Sophisticated Obfuscation and Packing.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

2012
Near-Real-Time Cloud Auditing for Rapid Response.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2009
Signal Classification in Fading Channels Using Cyclic Spectral Analysis.
EURASIP J. Wirel. Commun. Netw., 2009

2008
Performance Evaluation of Adaptive Non-contiguous MC-CDMA and Non-contiguous CI/MC-CDMA for Dynamic Spectrum Access.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
Using Antenna Array Redundancy and Channel Diversity for Secure Wireless Transmissions.
J. Commun., 2007

Intelligent Sensor - WiFi.
Proceedings of the 2007 International Conference on Artificial Intelligence, 2007

2006
Array Redundancy and Diversity for Wireless Transmissions with Low Probability of Interception.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2002
Securing Wireless and Mobile Networks - Is It Possible?
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002


  Loading...