Robert F. Mills

Orcid: 0000-0001-9404-7616

Affiliations:
  • Wright-Patterson Air Force Base, OH, USA
  • University of Kansas, KS, USA (PhD 1994)


According to our database1, Robert F. Mills authored at least 51 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Active 2D-DNA Fingerprinting of WirelessHART Adapters to Ensure Operational Integrity in Industrial Systems.
Sensors, 2022

2021
Traffic collision avoidance system: false injection viability.
J. Supercomput., 2021

2020
Sequence Pattern Mining with Variables.
IEEE Trans. Knowl. Data Eng., 2020

Multi-channel Security Through Data Fragmentation.
Proceedings of the Critical Infrastructure Protection XIV, 2020

Autonomous Space Resupply Vehicle Systems Security Design Principle Case Study.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems.
IEEE Access, 2019

A Top Down Approach for Eliciting Systems Security Requirements for a Notional Autonomous Space System.
Proceedings of the 2019 IEEE International Systems Conference, 2019

Vulnerability Assessment of InfiniBand Networking.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Conceptual Systems Security Requirements Analysis: Aerial Refueling Case Study.
IEEE Access, 2018

Securing Data in Power-Limited Sensor Networks Using Two-Channel Communications.
Proceedings of the Critical Infrastructure Protection XII, 2018

2017
Considerations for secure and resilient satellite architectures.
Proceedings of the 2017 International Conference on Cyber Conflict, 2017

2014
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection.
Proceedings of the Critical Infrastructure Protection VIII, 2014

REDIR: Automated static detection of obfuscated anti-debugging techniques.
Proceedings of the 2014 International Conference on Collaboration Technologies and Systems, 2014

Narratives as a Fundamental Component of Consciousness.
Proceedings of the 2014 Workshop on Computational Models of Narrative, 2014

2013
Enhancing the security of aircraft surveillance in the next generation air traffic control system.
Int. J. Crit. Infrastructure Prot., 2013

ADS-B encryption: confidentiality in the friendly skies.
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Establishing Cyberspace Sovereignty.
Int. J. Cyber Warf. Terror., 2012

RIPsec - Using reputation-based multilayer security to protect MANETs.
Comput. Secur., 2012

Eliciting a Sensemaking Process from Verbal Protocols of Reverse Engineers.
Proceedings of the 34th Annual Meeting of the Cognitive Science Society, 2012

2011
Security analysis of the ADS-B implementation in the next generation air transportation system.
Int. J. Crit. Infrastructure Prot., 2011

A case for DoD application of public cloud computing services.
Proceedings of the MILCOM 2011, 2011

An FPGA System for Detecting Malicious DNS Network Traffic.
Proceedings of the Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31, 2011

Log-Based Distributed Security Event Detection Using Simple Event Correlator.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Design considerations for a case-based reasoning engine for scenario-based cyber incident notification.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

A scalable architecture for improving the timeliness and relevance of cyber incident notifications.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols.
Int. J. Secur. Networks, 2010

Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees.
Int. J. Secur. Networks, 2010

Mission Assurance: Issues and Challenges.
Proceedings of the 2010 International Conference on Security & Management, 2010

Adding value to log event correlation using distributed techniques.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
A security policy language for wireless sensor networks.
J. Syst. Softw., 2009

Tracking Contraband Files Transmitted Using Bittorrent.
Proceedings of the Advances in Digital Forensics V, 2009

The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

Towards insider threat detection using web server logs.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

2008
Using PLSI-U to detect insider threats by datamining e-mail.
Int. J. Secur. Networks, 2008

Radio frequency fingerprinting commercial communication devices to enhance electronic security.
Int. J. Electron. Secur. Digit. Forensics, 2008

Using Spectral Fingerprints to Improve Wireless Network Security.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Improving the cyber incident mission impact assessment (CIMIA) process.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008

2007
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007

Communication Waveform Design Using an Adaptive Spectrally Modulated, Spectrally Encoded (SMSE) Framework.
J. Sel. Topics Signal Processing, 2007

How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum.
IEEE Secur. Priv., 2007

Using Author Topic to detect insider threats from email traffic.
Digit. Investig., 2007

The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An SMSE Implementation of CDMA with Partial Band Interference Suppression.
Proceedings of the Global Communications Conference, 2007

2006
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks.
J. Syst. Softw., 2006

Evolution of the air interface of cellular communications systems toward 4G realization.
IEEE Commun. Surv. Tutorials, 2006

Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006

A spectrally modulated, spectrally encoded analytic framework for carrier interferometry signals.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Using PLSI-U to Detect Insider Threats from Email Traffic.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

2005
Interference avoidance in spectrally encoded multiple access communications using MPSK modulation.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Developing an Insider Threat Model Using Functional Decomposition.
Proceedings of the Computer Network Security, 2005

2000
Detectability models for multiple access low-probability-of-intercept networks.
IEEE Trans. Aerosp. Electron. Syst., 2000


  Loading...