Search

Your search keyword '"Richard R. Brooks"' showing total 115 results

Search Constraints

Start Over You searched for: Author "Richard R. Brooks" Remove constraint Author: "Richard R. Brooks" Topic business.industry Remove constraint Topic: business.industry
115 results on '"Richard R. Brooks"'

Search Results

1. Network Detection of Radiation Sources Using Localization-Based Approaches

2. Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion

3. Evaluation and Design of Performable Distributed Systems

4. Global Internet Traffic Routing and Privacy

6. Internet freedom in West Africa

7. Review of Internet of Things (IoT) in Electric Power and Energy Systems

8. Denial of Service Attack on Tie-Line Bias Control in a Power System With PV Plant

9. Stealthy Domain Generation Algorithms

10. Traffic Analysis Resistant Network (TARN) Anonymity Analysis

11. Protocol Proxy: An FTE-based covert channel

12. Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions

13. SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System

14. Traffic Analysis Countermeasures Using Software-Defined Internet Exchanges

15. PhasorToolBox – A Python Package for Synchrophasor Application Prototyping

16. Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing

17. Internet Security Liberated via Software Defined Exchanges

18. Stochastic Tools for Network Intrusion Detection

19. Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data

20. Deceiving entropy based DoS detection

21. Regression for Radioactive Source Detection

22. TARN: A SDN-based traffic analysis resistant network architecture

23. Panel summary of cyber-physical systems (CPS) and Internet of Things (IoT) opportunities with information fusion

24. Inferring Statistically Significant Hidden Markov Models

25. A Normalized Statistical Metric Space for Hidden Markov Models

26. Provenance Threat Modeling

27. Security and Data Privacy of Modern Automobiles

28. A Covert Data Transport Protocol

29. A brief survey of Cryptocurrency systems

32. Distributed Sensor Networks

33. Distributed Sensor Networks

35. Data Registration

36. Query Processing in Sensor Networks

38. Cusum - entropy: an efficient method for DDoS attack detection

39. Methods to Window Data to Differentiate Between Markov Models

40. Behavior Detection Using Confidence Intervals of Hidden Markov Models

41. Zero knowledge hidden Markov model inference

42. Sensor Network Self-Organization Using Random Graphs

43. Multicast Encryption Infrastructure for Security in Sensor Networks

44. Adaptive Optimizations for Surveillance Sensor Network Longevity

45. Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies

46. On the Detection of Clones in Sensor Networks Using Random Key Predistribution

47. Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks

48. Cyber security in smart DC microgrid operations

49. Side-Channels in Electric Power Synchrophasor Network Data Traffic

50. Automobile ECU Design to Avoid Data Tampering

Catalog

Books, media, physical & digital resources