default search action
Rusty O. Baldwin
Person information
- affiliation: Riverside Research, Beavercreek, OH, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j36]Ronald A. Riley, James T. Graham, Ryan M. Fuller, Rusty O. Baldwin, Ashwin Fisher:
A New Way to Detect Cyberattacks: Extracting Changes in Register Values From Radio-Frequency Side Channels. IEEE Signal Process. Mag. 36(2): 49-58 (2019) - 2015
- [j35]Samuel J. Stone, Michael A. Temple, Rusty O. Baldwin:
Detecting anomalous programmable logic controller behavior using RF-based Hilbert transform features and a correlation-based verification process. Int. J. Crit. Infrastructure Prot. 9: 41-51 (2015) - [j34]Hiren J. Patel, Christine M. Schubert-Kabban, Rusty O. Baldwin, David P. Montminy:
Statistical analysis and comparison of linear regression attacks on the advanced encryption standard. Int. J. Inf. Commun. Technol. 7(2/3): 159-184 (2015) - [j33]Hiren J. Patel, Michael A. Temple, Rusty O. Baldwin:
Improving ZigBee Device Network Authentication Using Ensemble Decision Tree Classifiers With Radio Frequency Distinct Native Attribute Fingerprinting. IEEE Trans. Reliab. 64(1): 221-233 (2015) - [c29]Rusty Baldwin, Mark Danis:
A unified, clinician-focused "packets-to-patients" measurement approach for meaningful and usable electronic health records. HealthCom 2015: 44-49 - 2014
- [j32]Hiren J. Patel, Rusty O. Baldwin:
Random Forest profiling attack on advanced encryption standard. Int. J. Appl. Cryptogr. 3(2): 181-194 (2014) - 2013
- [j31]David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Eric D. Laspe:
Improving cross-device attacks using zero-mean unit-variance normalization. J. Cryptogr. Eng. 3(2): 99-110 (2013) - [j30]Guvenc Degirmenci, Jeffrey P. Kharoufeh, Rusty O. Baldwin:
On the performance evaluation of query-based wireless sensor networks. Perform. Evaluation 70(2): 124-147 (2013) - [j29]David P. Montminy, Rusty O. Baldwin, Michael A. Temple, Mark E. Oxley:
Differential Electromagnetic Attacks on a 32-bit Microprocessor Using Software Defined Radios. IEEE Trans. Inf. Forensics Secur. 8(12): 2101-2114 (2013) - [j28]William E. Cobb, Rusty O. Baldwin, Eric D. Laspe:
Leakage Mapping: A Systematic Methodology for Assessing the Side-Channel Information Leakage of Cryptographic Implementations. ACM Trans. Inf. Syst. Secur. 16(1): 2 (2013) - 2012
- [j27]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Michael R. Grimaila, Barry E. Mullins:
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics. IEEE Commun. Surv. Tutorials 14(2): 579-606 (2012) - [j26]William E. Cobb, Eric D. Laspe, Rusty O. Baldwin, Michael A. Temple, Yong C. Kim:
Intrinsic Physical-Layer Authentication of Integrated Circuits. IEEE Trans. Inf. Forensics Secur. 7(1): 14-24 (2012) - [c28]Hiren J. Patel, Rusty Baldwin:
GPU accelerated Differential Power Analysis. MILCOM 2012: 1-5 - [c27]Hiren J. Patel, Rusty Baldwin:
Differential Power Analysis using wavelet decomposition. MILCOM 2012: 1-5 - [c26]William M. S. Stout, Rusty O. Baldwin:
Network performance impact of access control policies in Tactical Wireless Networks. MILCOM 2012: 1-6 - 2010
- [j25]Cory J. Antosh, Barry E. Mullins, Rusty O. Baldwin, Richard A. Raines:
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 350-368 (2010)
2000 – 2009
- 2009
- [j24]David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. J. Syst. Softw. 82(1): 101-111 (2009) - [j23]Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles. Secur. Commun. Networks 2(1): 55-69 (2009) - [j22]Douglas D. Hodson, Rusty O. Baldwin:
Characterizing, Measuring, and Validating the Temporal Consistency of Live - Virtual - Constructive Environments. Simul. 85(10): 671-682 (2009) - [c25]Douglas J. Kelly, Richard A. Raines, Rusty Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Tree-Based Taxonomy of Anonymous Networks. CCNC 2009: 1-2 - [c24]Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers:
Using qualia and multi-layered relationships in malware detection. CICS 2009: 91-98 - [c23]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Taxonomy of Wired and Wireless Anonymous Networks. ICC 2009: 1-8 - [c22]Robert L. Lidowski, Barry E. Mullins, Rusty O. Baldwin:
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission. PerCom 2009: 1-7 - 2008
- [j21]Gustav J. Jordt, Rusty O. Baldwin, John F. Raquet, Barry E. Mullins:
Energy cost and error performance of range-aware, anchor-free localization algorithms. Ad Hoc Networks 6(4): 539-559 (2008) - [j20]Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter:
Hindering Reverse Engineering: Thinking Outside the Box. IEEE Secur. Priv. 6(2): 58-65 (2008) - [j19]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
A queueing approach to optimal resource replication in wireless sensor networks. Perform. Evaluation 65(10): 689-700 (2008) - [j18]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries. ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(2): 31-39 (2008) - [c21]Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins:
A survey of state-of-the-art in anonymity metrics. NDA 2008: 31-40 - [c20]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. IPCCC 2008: 524-531 - 2007
- [j17]Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. IEEE Netw. 21(4): 51-56 (2007) - [j16]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks. Telecommun. Syst. 35(1-2): 67-86 (2007) - [j15]George R. Roelke, Rusty O. Baldwin, Barry E. Mullins, Yong C. Kim:
A Cache Architecture for Extremely Unreliable Nanotechnologies. IEEE Trans. Reliab. 56(2): 182-197 (2007) - [c19]Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington:
Program Fragmentation as a Metamorphic Software Protection. IAS 2007: 369-374 - [c18]David P. Montminy, Rusty O. Baldwin, Paul D. Williams, Barry E. Mullins:
Using Relocatable Bitstreams for Fault Tolerance. AHS 2007: 701-708 - [c17]M. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple:
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles. AINA Workshops (2) 2007: 249-256 - [c16]Christopher J. Augeri, Dursun A. Bulutoglu, Barry E. Mullins, Rusty O. Baldwin, Leemon C. Baird III:
An analysis of XML compression efficiency. Experimental Computer Science 2007: 7 - [c15]Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert W. Bennington, Christopher E. Reuter:
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. HICSS 2007: 144 - [c14]Gilbert L. Peterson, Richard A. Raines, Rusty O. Baldwin:
Graduate Digital Forensics Education at the Air Force Institute of Technology. HICSS 2007: 264 - [c13]Justin T. Kautz, Barry E. Mullins, Rusty O. Baldwin, Scott R. Graham:
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks. HICSS 2007: 292 - [c12]Nicholas A. Fraser, Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. ICC 2007: 1197-1202 - [c11]Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Christopher B. Mayer, Rusty O. Baldwin:
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. MobiQuitous 2007: 1-8 - [c10]Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Rusty O. Baldwin, Christopher B. Mayer:
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network. NCA 2007: 273-282 - [c9]Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers:
Alert Verification Evasion Through Server Response Forging. RAID 2007: 256-275 - [c8]Christopher R. Mann, Rusty O. Baldwin, Barry E. Mullins:
Wireless sensor networks: guidelines for design and a survey of current research. SpringSim (1) 2007: 41-50 - [c7]Stephen Mott, Samuel Hart, David P. Montminy, Paul D. Williams, Rusty O. Baldwin:
A Hardware-based Architecture to Support Flexible Real-Time Parallel Intrusion Detection. SoSE 2007: 1-6 - 2006
- [j14]Victor P. Hubenko Jr., Richard A. Raines, Robert F. Mills, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements. IEEE Commun. Mag. 44(11): 66-72 (2006) - [j13]David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. IEEE Secur. Priv. 4(6): 36-43 (2006) - [j12]Rusty O. Baldwin, Brian S. Peterson, Robert F. Mills:
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks. J. Syst. Softw. 79(12): 1782-1788 (2006) - [j11]Sean A. Jeffers, Rusty O. Baldwin, Barry E. Mullins:
Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards. Simul. 82(8): 549-558 (2006) - [j10]Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh:
Bluetooth Inquiry Time Characterization and Selection. IEEE Trans. Mob. Comput. 5(9): 1173-1187 (2006) - [c6]Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines:
Bluetooth Discovery Time with Multiple Inquirers. HICSS 2006 - 2005
- [j9]Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines:
Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs. Wirel. Pers. Commun. 35(4): 407-432 (2005) - [c5]Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin:
Developing an Insider Threat Model Using Functional Decomposition. MMM-ACNS 2005: 412-417 - 2004
- [j8]Randall B. Noel, Rusty O. Baldwin, Richard A. Raines, Michael A. Temple:
Wireless Local Area Network Performance in a Bluetooth Interference Environment. Int. J. Wirel. Opt. Commun. 2(1): 19-34 (2004) - [j7]Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines:
Inquiry packet interference in bluetooth scatternets. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2): 66-75 (2004) - [c4]Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh:
A Specification-Compatible Bluetooth Inquiry Simplification. HICSS 2004 - 2003
- [j6]Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Richard A. Raines:
Refinements to the packet error rate upper bound for Bluetooth networks. IEEE Commun. Lett. 7(8): 382-384 (2003) - [j5]Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff, John E. Kobza:
Queueing network analysis: concepts, terminology, and methods. J. Syst. Softw. 66(2): 99-117 (2003) - [c3]Timothy F. Kneeland, Richard A. Raines, Michael A. Temple, Rusty O. Baldwin:
Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices. ICON 2003: 665-671 - [c2]Courtney M. Canadeo, Michael A. Temple, Rusty O. Baldwin, Richard A. Raines:
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations. WCNC 2003: 678-682 - 2002
- [j4]Ryan W. Thomas, Richard A. Raines, Rusty O. Baldwin, Michael A. Temple:
Performance analysis of multicast algorithms for mobile satellite communication networks. Comput. Commun. 25(11-12): 1085-1093 (2002) - 2001
- [j3]Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff, Richard A. Raines:
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(3): 11-25 (2001) - [c1]Ryan W. Thomas, Richard A. Raines, Rusty O. Baldwin, Michael A. Temple:
Simulation, modeling, and evaluation of satellite-based multicasting protocols. VTC Fall 2001: 305-309 - 2000
- [b1]Rusty O. Baldwin:
Improving the Real-time Performance of a Wireless Local Area Network. Virginia Tech, Blacksburg, VA, USA, 2000 - [j2]Rusty O. Baldwin, Nathaniel J. Davis IV, John E. Kobza, Scott F. Midkiff:
Real-time queueing theory: A tutorial presentation with an admission control application. Queueing Syst. Theory Appl. 35(1-4): 1-21 (2000)
1990 – 1999
- 1999
- [j1]Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff:
A real-time medium access control protocol for ad hoc wireless local area networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 3(2): 20-27 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint