Rusty O. Baldwin

Affiliations:
  • Riverside Research, Beavercreek, OH, USA


According to our database1, Rusty O. Baldwin authored at least 66 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A New Way to Detect Cyberattacks: Extracting Changes in Register Values From Radio-Frequency Side Channels.
IEEE Signal Process. Mag., 2019

2015
Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting.
IEEE Trans. Reliab., 2015

Statistical analysis and comparison of linear regression attacks on the advanced encryption standard.
Int. J. Inf. Commun. Technol., 2015

Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process.
Int. J. Crit. Infrastructure Prot., 2015

A unified, clinician-focused "packets-to-patients" measurement approach for meaningful and usable electronic health records.
Proceedings of the 17th International Conference on E-health Networking, 2015

2014
Random Forest profiling attack on advanced encryption standard.
Int. J. Appl. Cryptogr., 2014

2013
Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations.
ACM Trans. Inf. Syst. Secur., 2013

Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios.
IEEE Trans. Inf. Forensics Secur., 2013

On the performance evaluation of query-based wireless sensor networks.
Perform. Evaluation, 2013

Improving cross-device attacks using zero-mean unit-variance normalization.
J. Cryptogr. Eng., 2013

2012
Intrinsic Physical-Layer Authentication of Integrated Circuits.
IEEE Trans. Inf. Forensics Secur., 2012

Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics.
IEEE Commun. Surv. Tutorials, 2012

Network performance impact of access control policies in Tactical Wireless Networks.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Differential Power Analysis using wavelet decomposition.
Proceedings of the 31st IEEE Military Communications Conference, 2012

GPU accelerated Differential Power Analysis.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2010
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

2009
Characterizing, Measuring, and Validating the Temporal Consistency of Live - Virtual - Constructive Environments.
Simul., 2009

A secure group communication architecture for autonomous unmanned aerial vehicles.
Secur. Commun. Networks, 2009

A security policy language for wireless sensor networks.
J. Syst. Softw., 2009

A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Towards a Taxonomy of Wired and Wireless Anonymous Networks.
Proceedings of IEEE International Conference on Communications, 2009

Using qualia and multi-layered relationships in malware detection.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Cyber Security, 2009

Towards a Tree-Based Taxonomy of Anonymous Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

A queueing approach to optimal resource replication in wireless sensor networks.
Perform. Evaluation, 2008

Hindering Reverse Engineering: Thinking Outside the Box.
IEEE Secur. Priv., 2008

Energy cost and error performance of range-aware, anchor-free localization algorithms.
Ad Hoc Networks, 2008

Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary.
Proceedings of the 2008 IEEE International Performance, 2008

A survey of state-of-the-art in anonymity metrics.
Proceedings of the 1st ACM workshop on Network Data Anonymization, 2008

2007
A Cache Architecture for Extremely Unreliable Nanotechnologies.
IEEE Trans. Reliab., 2007

A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks.
Telecommun. Syst., 2007

Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements.
IEEE Netw., 2007

A Hardware-based Architecture to Support Flexible Real-Time Parallel Intrusion Detection.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

Wireless sensor networks: guidelines for design and a survey of current research.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Alert Verification Evasion Through Server Response Forging.
Proceedings of the Recent Advances in Intrusion Detection, 10th International Symposium, 2007

Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network.
Proceedings of the Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007), 12, 2007

Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment.
Proceedings of IEEE International Conference on Communications, 2007

Graduate Digital Forensics Education at the Air Force Institute of Technology.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

The Use of Attack and Protection Trees to Analyze Security for an Online Banking System.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

An analysis of XML compression efficiency.
Proceedings of the Workshop on Experimental Computer Science, 2007

Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Using Relocatable Bitstreams for Fault Tolerance.
Proceedings of the Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 2007

Program Fragmentation as a Metamorphic Software Protection.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Bluetooth Inquiry Time Characterization and Selection.
IEEE Trans. Mob. Comput., 2006

Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards.
Simul., 2006

Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks.
J. Syst. Softw., 2006

Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion.
IEEE Secur. Priv., 2006

Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements.
IEEE Commun. Mag., 2006

Bluetooth Discovery Time with Multiple Inquirers.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs.
Wirel. Pers. Commun., 2005

Developing an Insider Threat Model Using Functional Decomposition.
Proceedings of the Computer Network Security, 2005

2004
Inquiry packet interference in bluetooth scatternets.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

Wireless Local Area Network Performance in a Bluetooth Interference Environment.
Int. J. Wirel. Opt. Commun., 2004

A Specification-Compatible Bluetooth Inquiry Simplification.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Queueing network analysis: concepts, terminology, and methods.
J. Syst. Softw., 2003

Refinements to the packet error rate upper bound for Bluetooth networks.
IEEE Commun. Lett., 2003

Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices.
Proceedings of the 11th IEEE International Conference on Networks, 2003

2002
Performance analysis of multicast algorithms for mobile satellite communication networks.
Comput. Commun., 2002

2001
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2001

Simulation, modeling, and evaluation of satellite-based multicasting protocols.
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001

2000
Improving the Real-time Performance of a Wireless Local Area Network.
PhD thesis, 2000

Real-time queueing theory: A tutorial presentation with an admission control application.
Queueing Syst. Theory Appl., 2000

1999
A real-time medium access control protocol for ad hoc wireless local area networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 1999


  Loading...