Richard A. Raines

According to our database1, Richard A. Raines authored at least 54 papers between 1994 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Malware Target Recognition of Unknown Threats.
IEEE Syst. J., 2013

2012
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012

RIPsec - Using reputation-based multilayer security to protect MANETs.
Comput. Secur., 2012

Malware target recognition via static heuristics.
Comput. Secur., 2012

2010
Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees.
Int. J. Secur. Networks, 2010

A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

Malware Type Recognition and Cyber Situational Awareness.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
Voice and video capacity of a secure IEEE 802.11g wireless network.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

An exploration of the current state of information assurance education.
ACM SIGCSE Bull., 2009

A secure group communication architecture for autonomous unmanned aerial vehicles.
Secur. Commun. Networks, 2009

Towards a Taxonomy of Wired and Wireless Anonymous Networks.
Proceedings of IEEE International Conference on Communications, 2009

Using qualia and multi-layered relationships in malware detection.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Towards a Tree-Based Taxonomy of Anonymous Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Hindering Reverse Engineering: Thinking Outside the Box.
IEEE Secur. Priv., 2008

Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary.
Proceedings of the 2008 IEEE International Performance, 2008

Cyberspace Policy For Critical Infrastructures.
Proceedings of the Critical Infrastructure Protection II, 2008

Biometric enhancements: Template aging error score analysis.
Proceedings of the 8th IEEE International Conference on Automatic Face and Gesture Recognition (FG 2008), 2008

A survey of state-of-the-art in anonymity metrics.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007

Communication Waveform Design Using an Adaptive Spectrally Modulated, Spectrally Encoded (SMSE) Framework.
J. Sel. Topics Signal Processing, 2007

Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks.
Int. J. Secur. Networks, 2007

Alert Verification Evasion Through Server Response Forging.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Analysis of Tools for Detecting Rootkits and Hidden Processes.
Proceedings of the Advances in Digital Forensics III, 2007

Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment.
Proceedings of IEEE International Conference on Communications, 2007

Graduate Digital Forensics Education at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

The Use of Attack and Protection Trees to Analyze Security for an Online Banking System.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An SMSE Implementation of CDMA with Partial Band Interference Suppression.
Proceedings of the Global Communications Conference, 2007

Program Fragmentation as a Metamorphic Software Protection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion.
IEEE Secur. Priv., 2006

Evolution of the air interface of cellular communications systems toward 4G realization.
IEEE Commun. Surv. Tutorials, 2006

Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006

A spectrally modulated, spectrally encoded analytic framework for carrier interferometry signals.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Bluetooth Discovery Time with Multiple Inquirers.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

A retrovirus inspired algorithm for virus detection & optimization.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

2005
Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs.
Wirel. Pers. Commun., 2005

Interference avoidance in spectrally encoded multiple access communications using MPSK modulation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

2004
Inquiry packet interference in bluetooth scatternets.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

Wireless Local Area Network Performance in a Bluetooth Interference Environment.
Int. J. Wirel. Opt. Commun., 2004

2003
Refinements to the packet error rate upper bound for Bluetooth networks.
IEEE Commun. Lett., 2003

Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Integrating CDX into the graduate program.
Proceedings of the IEEE International Conference on Systems, 2003

Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2002
Performance analysis of multicast algorithms for mobile satellite communication networks.
Comput. Commun., 2002

Transform domain communications and interference avoidance using wavelet packet decomposition.
Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record, 2002

2001
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001

Simulation, modeling, and evaluation of satellite-based multicasting protocols.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

2000
A General Interleaver for Equal and Unequal Error Protections of Turbo Codes with Short Frames.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

Energy Allocation Strategies for Turbo Codes with Short Frames.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

1999
The simulation modelling and performance analysis of low earth orbit satellite communication networks for personal communications.
Int. J. Commun. Syst., 1999

A model to describe the distribution of transmission path elevation angles to the Iridium and Globalstar satellite systems.
IEEE Commun. Lett., 1999

An Operational and Performance Overview of the IRIDIUM Low Earth Orbit Satellite System.
IEEE Commun. Surv. Tutorials, 1999

1998
A performance analysis of the IRIDIUM® low earth orbit satellite system with a degraded satellite constellation.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1998

1997
Computer-Aided Breast Cancer Detection and Diagnosis of Masses Using Difference of Gaussians and Derivative-Based Feature Saliency.
IEEE Trans. Medical Imaging, 1997

1994
The Application of Metamodeling to Interconnection Network Analysis.
INFORMS J. Comput., 1994


  Loading...