137 results on '"Raines, Richard A."'
Search Results
2. An Exploration of the Current State of Information Assurance Education
3. Cyberspace Policy For Critical Infrastructures
4. Alert Verification Evasion Through Server Response Forging
5. An investigation on the effects of emerging 4G transmissions on 3G networks **
6. Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs
7. Defining information operations forces: What do we need?
8. Computer-aided breast cancer detection and diagnosis of masses using difference of Gaussians and derivative-based feature saliency
9. Driving characteristics of open-toe piles in dense sand
10. Performance analysis of multicast algorithms for mobile satellite communication networks
11. Improving the global information grid performance through satellite communications layer enhancements
12. Cyberspace Policy For Critical Infrastructures
13. Alert Verification Evasion Through Server Response Forging
14. Driving towards Success in the Air Force Cyber Mission: Leveraging Our Heritage to Shape Our Future
15. Performance simulation of a transform domain communication system for multiple access applications
16. Malware Target Recognition of Unknown Threats
17. Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment
18. Developing Cyberspace Competencies for Air Force Professional Military Education
19. Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics
20. Performance modeling and analysis of parallel processing and low earth orbit satellite communication systems
21. Malware Type Recognition and Cyber Situational Awareness
22. An exploration of the current state of information assurance education
23. A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
24. Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees
25. Information security: Designing a stochastic‐network for throughput and reliability
26. Voice and video capacity of a secure IEEE 802.11g wireless network
27. Using qualia and novel representations in malware detection
28. Using qualia and multi-layered relationships in malware detection
29. Towards a Tree-Based Taxonomy of Anonymous Networks
30. A secure group communication architecture for autonomous unmanned aerial vehicles
31. Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary
32. A survey of state-of-the-art in anonymity metrics
33. Biometric enhancements: Template aging error score analysis
34. Digital Forensics Educational Needs in the Miami Valley Region
35. A qualia representation of cyberspace
36. Hindering Reverse Engineering: Thinking Outside the Box
37. A secure and efficient satellite-based multicast architecture
38. An SMSE Implementation of CDMA with Partial Band Interference Suppression
39. A Qualia Framework for Awareness in Cyberspace
40. Applying a Secure and Efficient Low Earth Orbit Satellite-Based Multicast Architecture in a Deployed Environment
41. Program Fragmentation as a Metamorphic Software Protection
42. Communication Waveform Design Using an Adaptive Spectrally Modulated, Spectrally Encoded (SMSE) Framework
43. The Use of Attack and Protection Trees to Analyze Security for an Online Banking System
44. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
45. Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements
46. Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion
47. Using Attack and Protection Trees to Analyze Threats and Defenses to Homeland Security
48. Entropy-Based Spectral Processing on the IEEE 802.11A OFDM Waveform
49. Time Hopping Biorthogonal Pulse Position Modulation in Modified Saleh-Valenzuela UWB Fading Channels
50. A retrovirus inspired algorithm for virus detection & optimization
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.