Richard R. Brooks

According to our database1, Richard R. Brooks authored at least 99 papers between 1996 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Review of Internet of Things (IoT) in Electric Power and Energy Systems.
IEEE Internet of Things Journal, 2018

The Future of CISE Distributed Research Infrastructure.
CoRR, 2018

Internet freedom in West Africa: technical support for journalists and democracy advocates.
Commun. ACM, 2018

Two-Level Clustering-Based Target Detection Through Sensor Deployment and Data Fusion.
Proceedings of the 21st International Conference on Information Fusion, 2018

Internet Security Liberated via Software Defined Exchanges.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
Stealthy Domain Generation Algorithms.
IEEE Trans. Information Forensics and Security, 2017

Denial of Service Attack on Tie-Line Bias Control in a Power System With PV Plant.
IEEE Trans. Emerging Topics in Comput. Intellig., 2017

Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data.
CoRR, 2017

Stochastic Tools for Network Intrusion Detection.
CoRR, 2017

TARN: A SDN-based Traffic Analysis Resistant Network Architecture.
CoRR, 2017

Stealthy Malware Traffic - Not as Innocent as It Looks.
CoRR, 2017

Provenance Threat Modeling.
CoRR, 2017

A Covert Data Transport Protocol.
CoRR, 2017

TARN: A SDN-based traffic analysis resistant network architecture.
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017

Improved multi-resolution method for MLE-based localization of radiation sources.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms.
ACM Comput. Surv., 2016

A brief survey of Cryptocurrency systems.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Provenance threat modeling.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

A source-attractor approach to network detection of radiation sources.
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016

A covert data transport protocol.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

Performance analysis of Wald-statistic based network detection methods for radiation sources.
Proceedings of the 19th International Conference on Information Fusion, 2016

2015
Deceiving entropy based DoS detection.
Computers & Security, 2015

Stealthy malware traffic - Not as innocent as it looks.
Proceedings of the 10th International Conference on Malicious and Unwanted Software, 2015

Side-Channels in Electric Power Synchrophasor Network Data Traffic.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Automobile ECU Design to Avoid Data Tampering.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Analysis of Botnet Counter-Counter-Measures.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

Semantic Similarity Detection For Data Leak Prevention.
Proceedings of the 10th Annual Cyber and Information Security Research Conference, 2015

2013
Inferring Statistically Significant Hidden Markov Models.
IEEE Trans. Knowl. Data Eng., 2013

A Normalized Statistical Metric Space for Hidden Markov Models.
IEEE Trans. Cybernetics, 2013

Circumventing keyloggers and screendumps.
Proceedings of the 8th International Conference on Malicious and Unwanted Software: "The Americas", 2013

DoS Detection is Easier Now.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

Tailoring trusted semantic information.
Proceedings of the Cyber Security and Information Intelligence, 2013

Applying POMDP to moving target optimization.
Proceedings of the Cyber Security and Information Intelligence, 2013

Operational system testing for designed in security.
Proceedings of the Cyber Security and Information Intelligence, 2013

Timing analysis in P2P botnet traffic using probabilistic context-free grammars.
Proceedings of the Cyber Security and Information Intelligence, 2013

Cost-effective quality assurance of wireless network security.
Proceedings of the Cyber Security and Information Intelligence, 2013

Security and performance evaluation of security protocols.
Proceedings of the Cyber Security and Information Intelligence, 2013

Creating a tailored trustworthy space for democracy advocates using hostile host.
Proceedings of the Cyber Security and Information Intelligence, 2013

2011
Methods to Window Data to Differentiate Between Markov Models.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2011

On Bandwidth-Limited Sum-of-Games Problems.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2011

A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set.
IEEE Trans. Automat. Contr., 2011

Side-Channel Analysis for Detecting Protocol Tunneling.
Adv. Internet of Things, 2011

Noise tolerant symbolic learning of Markov models of tunneled protocols.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Observable subspace solution for irreducible POMDPs with infinite horizon.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Security experimentation using operational systems.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Botnet traffic detection using hidden Markov models.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Fusion of threshold rules for target detection in wireless sensor networks.
TOSN, 2010

Orwell was an optimist.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Lies and the lying liars that tell them: a fair and balanced look at TLS.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Behavior Detection Using Confidence Intervals of Hidden Markov Models.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2009

Markovian Search Games in Heterogeneous Spaces.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2009

Zero knowledge hidden Markov model inference.
Pattern Recognition Letters, 2009

Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks.
IJDSN, 2009

Adaptive Optimizations for Surveillance Sensor Network Longevity.
IJDSN, 2009

Multicast Encryption Infrastructure for Security in Sensor Networks.
IJDSN, 2009

Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies.
IJDSN, 2009

Sensor Network Self-Organization Using Random Graphs.
IJDSN, 2009

2008
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2008

International Journal of Distributed Sensor Networks.
IJDSN, 2008

2007
Mobile Network Analysis Using Probabilistic Connectivity Matrices.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2007

On the Detection of Clones in Sensor Networks Using Random Key Predistribution.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2007

Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks.
IJDSN, 2007

Performance aware secure code partitioning.
Proceedings of the 2007 Design, Automation and Test in Europe Conference and Exposition, 2007

2006
A note on the spread of worms in scale-free networks.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2006

Denial-of-Service Attack-Detection Techniques.
IEEE Internet Computing, 2006

The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
IJDSN, 2006

A Review of: "Wireless Sensor Networks: An Information Processing.".
IJDSN, 2006

Kafka in the academy: a note on ethics in IA education.
IEEE Security & Privacy, 2006

Wavelet based Denial-of-Service detection.
Computers & Security, 2006

Pedigree Information for Enhanced Situation and Threat Assessment.
Proceedings of the 9th International Conference on Information Fusion, 2006

Secure Execution of Computations in Untrusted Hosts.
Proceedings of the Reliable Software Technologies, 2006

2005
Symmetric encryption in reconfigurable and custom hardware.
IJES, 2005

A Data-Driven Approach for Embedded Security.
Proceedings of the 2005 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2005), 2005

A Compiler-Based Approach to Data Security.
Proceedings of the Compiler Construction, 14th International Conference, 2005

2004
Special issue introduction--the road map for distributed sensor networks in the context of computing and communication.
J. Parallel Distrib. Comput., 2004

Aspect-oriented design of sensor networks.
J. Parallel Distrib. Comput., 2004

Tracking multiple targets with self-organizing distributed ground sensors.
J. Parallel Distrib. Comput., 2004

Mobile Code Daemons for Networks of Embedded Systems.
IEEE Internet Computing, 2004

Mobile Code Paradigms and Security Issues.
IEEE Internet Computing, 2004

A cellular automata model can quickly approximate UDP and TCP network traffic.
Complexity, 2004

Code protection for resource-constrained embedded devices.
Proceedings of the 2004 ACM SIGPLAN/SIGBED Conference on Languages, 2004

Fault Tolerant Algorithms for Network-On-Chip Interconnect.
Proceedings of the 2004 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2004), 2004

2003
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware.
MONET, 2003

Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network.
EURASIP J. Adv. Sig. Proc., 2003

Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering.
Proceedings of the Global Telecommunications Conference, 2003

Distributed adaptation methods for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2003

Masking the Energy Behavior of DES Encryption.
Proceedings of the 2003 Design, 2003

2002
A Model for Mobile Code Using Interacting Automata.
IEEE Trans. Mob. Comput., 2002

Efficient Global Optimization for Image Registration.
IEEE Trans. Knowl. Data Eng., 2002

Self-Organized Distributed Sensor Network Entity Tracking.
IJHPCA, 2002

Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms.
IJHPCA, 2002

2001
Recognition in the wavelet domain: A survey.
J. Electronic Imaging, 2001

2000
Reactive Sensor Networks.
Proceedings of the Distributed Autonomous Robotic Systems 4, 2000

1999
Flexible Optimization and Evolution of Underwater Autonomous Agents.
Proceedings of the New Directions in Rough Sets, 1999

1997
Resolution of Contradictory Sensor Data.
Intelligent Automation & Soft Computing, 1997

On localization of objects in the wavelet domain.
Proceedings of the Proceedings 1997 IEEE International Symposium on Computational Intelligence in Robotics and Automation CIRA'97, 1997

1996
Robust Distributed Comupting and Sensing Algorithm.
IEEE Computer, 1996

Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms.
Artif. Intell., 1996


  Loading...