default search action
Richard R. Brooks
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j58]Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid:
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. DTRAP 4(2): 24:1-24:20 (2023) - 2022
- [j57]Richard R. Brooks, Lu Yu, Ilker Özçelik, Jon Oakley, Nathan Tusing:
Distributed Denial of Service (DDoS): A History. IEEE Ann. Hist. Comput. 44(2): 44-54 (2022) - [j56]Fei Sun, Richard R. Brooks, Gurcan Comert, Nathan Tusing:
Side-Channel Security Analysis of Connected Vehicle Communications Using Hidden Markov Models. IEEE Trans. Intell. Transp. Syst. 23(10): 17562-17574 (2022) - [c50]Xingsi Zhong, Ganesh K. Venayagamoorthy, Richard R. Brooks:
A Virtual Synchrophasor Network for Power System Resiliency Under Concurrent DoS Attacks. SSCI 2022: 1342-1349 - 2021
- [j55]Amani Altarawneh, Fei Sun, Richard R. Brooks, Oluwakemi Hambolu, Lu Yu, Anthony Skjellum:
Availability analysis of a permissioned blockchain with a lightweight consensus protocol. Comput. Secur. 102: 102098 (2021) - [j54]Lu Yu, Yu Fu, Jonathan Oakley, Oluwakemi Hambolu, Richard R. Brooks:
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms. Comput. Secur. 105: 102206 (2021) - [c49]Paul Black, Iqbal Gondal, Richard R. Brooks, Lu Yu:
AFES: An Advanced Forensic Evidence System. EDOC Workshops 2021: 67-74 - [i10]Jon Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid:
Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion. CoRR abs/2109.05649 (2021) - 2020
- [j53]Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard R. Brooks:
Protocol Proxy: An FTE-based covert channel. Comput. Secur. 92: 101777 (2020) - [c48]Satyabrata Sen, Nageswara S. V. Rao, Chase Q. Wu, Richard R. Brooks, Christopher Temples:
Detecting Low-level Radiation Sources Using Border Monitoring Gamma Sensors. MFI 2020: 342-347 - [p2]Carl R. Worley, Lu Yu, Richard R. Brooks, Jon Oakley, Anthony Skjellum, Amani Altarawneh, Sai Medury, Ujan Mukhopadhyay:
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications. Blockchain Cybersecurity, Trust and Privacy 2020: 51-67 - [i9]Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard R. Brooks:
Protocol Proxy: An FTE-based Covert Channel. CoRR abs/2002.10687 (2020)
2010 – 2019
- 2019
- [j52]Chase Qishi Wu, Mark L. Berry, Kayla M. Grieme, Satyabrata Sen, Nageswara S. V. Rao, Richard R. Brooks, Guthrie Cordone:
Network Detection of Radiation Sources Using Localization-Based Approaches. IEEE Trans. Ind. Informatics 15(4): 2308-2320 (2019) - [c47]Nathan Tusing, Jonathan Oakley, C. Geddings Barrineau, Lu Yu, Kuang-Ching Wang, Richard R. Brooks:
Traffic Analysis Resistant Network (TARN) Anonymity Analysis. ICNP 2019: 1-2 - [i8]Lu Yu, Oluwakemi Hambolu, Yu Fu, Jon Oakley, Richard R. Brooks:
Privacy Preserving Count Statistics. CoRR abs/1910.07020 (2019) - 2018
- [j51]Richard R. Brooks, Lu Yu, Yu Fu, Oluwakemi Hambolu, John Gaynard, Julie Owono, Archippe Yepmou, Felix Blanc:
Internet freedom in West Africa: technical support for journalists and democracy advocates. Commun. ACM 61(5): 72-82 (2018) - [j50]Guneet Bedi, Ganesh Kumar Venayagamoorthy, Rajendra Singh, Richard R. Brooks, Kuang-Ching Wang:
Review of Internet of Things (IoT) in Electric Power and Energy Systems. IEEE Internet Things J. 5(2): 847-870 (2018) - [c46]Kuang-Ching Wang, Richard R. Brooks, C. Geddings Barrineau, Jonathan Oakley, Lu Yu, Qing Wang:
Internet Security Liberated via Software Defined Exchanges. SDN-NFV@CODASPY 2018: 19-22 - [c45]Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu, Richard R. Brooks:
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing. SDN-NFV@CODASPY 2018: 55-58 - [c44]Chase Q. Wu, Wuji Liu, Satyabrata Sen, Nageswara S. V. Rao, Richard R. Brooks, Guthrie Cordone:
Two-Level Clustering-Based Target Detection Through Sensor Deployment and Data Fusion. FUSION 2018: 2376-2383 - [c43]Sai Medury, Anthony Skjellum, Richard R. Brooks, Lu Yu:
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System. MALWARE 2018: 145-152 - [c42]Jonathan Oakley, Carl R. Worley, Lu Yu, Richard R. Brooks, Anthony Skjellum:
Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions. MALWARE 2018: 161-166 - [i7]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - 2017
- [j49]Xingsi Zhong, Iroshani Jayawardene, Ganesh Kumar Venayagamoorthy, Richard R. Brooks:
Denial of Service Attack on Tie-Line Bias Control in a Power System With PV Plant. IEEE Trans. Emerg. Top. Comput. Intell. 1(5): 375-390 (2017) - [j48]Yu Fu, Lu Yu, Oluwakemi Hambolu, Ilker Özçelik, Benafsh Husain, Jingxuan Sun, Karan Sapra, Dan Du, Christopher Tate Beasley, Richard R. Brooks:
Stealthy Domain Generation Algorithms. IEEE Trans. Inf. Forensics Secur. 12(6): 1430-1443 (2017) - [c41]Guthrie Cordone, Richard R. Brooks, Satyabrata Sen, Nageswara S. V. Rao, Chase Q. Wu, Mark L. Berry, Kayla M. Grieme:
Improved multi-resolution method for MLE-based localization of radiation sources. FUSION 2017: 1-8 - [c40]Lu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang:
TARN: A SDN-based traffic analysis resistant network architecture. MALWARE 2017: 91-98 - [i6]Xingsi Zhong, Yu Fu, Lu Yu, Richard R. Brooks:
Stealthy Malware Traffic - Not as Innocent as It Looks. CoRR abs/1703.02200 (2017) - [i5]Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks:
A Covert Data Transport Protocol. CoRR abs/1703.02201 (2017) - [i4]Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum:
Provenance Threat Modeling. CoRR abs/1703.03835 (2017) - [i3]Lu Yu, Qing Wang, C. Geddings Barrineau, Jon Oakley, Richard R. Brooks, Kuang-Ching Wang:
TARN: A SDN-based Traffic Analysis Resistant Network Architecture. CoRR abs/1709.00782 (2017) - [i2]Lu Yu, Richard R. Brooks:
Stochastic Tools for Network Intrusion Detection. CoRR abs/1709.07567 (2017) - [i1]Richard R. Brooks, Lu Yu, Yu Fu, Guthrie Cordone, Jon Oakley, Xingsi Zhong:
Using Markov Models and Statistics to Learn, Extract, Fuse, and Detect Patterns in Raw Data. CoRR abs/1709.07573 (2017) - 2016
- [j47]Buke Ao, Yongcai Wang, Lu Yu, Richard R. Brooks, S. S. Iyengar:
On Precision Bound of Distributed Fault-Tolerant Sensor Fusion Algorithms. ACM Comput. Surv. 49(1): 5:1-5:23 (2016) - [c39]Satyabrata Sen, Nageswara S. V. Rao, Chase Q. Wu, Mark L. Berry, Kayla M. Grieme, Richard R. Brooks, Guthrie Cordone:
Performance analysis of Wald-statistic based network detection methods for radiation sources. FUSION 2016: 820-827 - [c38]Yu Fu, Zhe Jia, Lu Yu, Xingsi Zhong, Richard R. Brooks:
A covert data transport protocol. MALWARE 2016: 93-100 - [c37]Chase Q. Wu, Mark L. Berry, Kayla M. Grieme, Satyabrata Sen, Nageswara S. V. Rao, Richard R. Brooks, Guthrie Cordone:
A source-attractor approach to network detection of radiation sources. MFI 2016: 394-399 - [c36]Oluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum:
Provenance threat modeling. PST 2016: 384-387 - [c35]Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Richard R. Brooks:
A brief survey of Cryptocurrency systems. PST 2016: 745-752 - 2015
- [j46]Ilker Özçelik, Richard R. Brooks:
Deceiving entropy based DoS detection. Comput. Secur. 48: 234-245 (2015) - [c34]Xingsi Zhong, Paranietharan Arunagirinathan, Afshin Ahmadi, Richard R. Brooks, Ganesh Kumar Venayagamoorthy:
Side-Channels in Electric Power Synchrophasor Network Data Traffic. CISR 2015: 3:1-3:8 - [c33]Dan Du, Lu Yu, Richard R. Brooks:
Semantic Similarity Detection For Data Leak Prevention. CISR 2015: 4:1-4:6 - [c32]Yu Fu, Benafsh Husain, Richard R. Brooks:
Analysis of Botnet Counter-Counter-Measures. CISR 2015: 9:1-9:4 - [c31]Lu Yu, Juan Deng, Richard R. Brooks, SeokBae Yun:
Automobile ECU Design to Avoid Data Tampering. CISR 2015: 10:1-10:4 - [c30]Xingsi Zhong, Yu Fu, Lu Yu, Richard R. Brooks, Ganesh Kumar Venayagamoorthy:
Stealthy malware traffic - Not as innocent as it looks. MALWARE 2015: 110-116 - 2013
- [j45]Chen Lu, Jason M. Schwier, Ryan Craven, Lu Yu, Richard R. Brooks, Christopher Griffin:
A Normalized Statistical Metric Space for Hidden Markov Models. IEEE Trans. Cybern. 43(3): 806-819 (2013) - [j44]Lu Yu, Jason M. Schwier, Ryan Craven, Richard R. Brooks, Christopher Griffin:
Inferring Statistically Significant Hidden Markov Models. IEEE Trans. Knowl. Data Eng. 25(7): 1548-1558 (2013) - [c29]Richard R. Brooks, Benafsh Husain, SeokBae Yun, Juan Deng:
Security and performance evaluation of security protocols. CSIIRW 2013: 2 - [c28]Chen Lu, Richard R. Brooks:
Timing analysis in P2P botnet traffic using probabilistic context-free grammars. CSIIRW 2013: 14 - [c27]Katherine C. Cameron, Richard R. Brooks, Juan Deng:
Cost-effective quality assurance of wireless network security. CSIIRW 2013: 15 - [c26]Lianyu Zhao, Richard R. Brooks:
Tailoring trusted semantic information. CSIIRW 2013: 17 - [c25]Lu Yu, Richard R. Brooks:
Applying POMDP to moving target optimization. CSIIRW 2013: 49 - [c24]Richard R. Brooks, Oluwakemi Hambolu, Paul Marusich, Yu Fu, Saiprasad Balachandran:
Creating a tailored trustworthy space for democracy advocates using hostile host. CSIIRW 2013: 50 - [c23]Ilker Özçelik, Richard R. Brooks:
Operational system testing for designed in security. CSIIRW 2013: 55 - [c22]Ilker Özçelik, Yu Fu, Richard R. Brooks:
DoS Detection is Easier Now. GREE 2013: 50-55 - [c21]Karan Sapra, Benafsh Husain, Richard R. Brooks, Melissa C. Smith:
Circumventing keyloggers and screendumps. MALWARE 2013: 103-108 - 2011
- [j43]Harakrishnan Bhanu, Jason M. Schwier, Ryan Craven, Richard R. Brooks, Kathryn Hempstalk, Daniele Gunetti, Christopher Griffin:
Side-Channel Analysis for Detecting Protocol Tunneling. Adv. Internet Things 1(2): 13-26 (2011) - [j42]Christopher Griffin, Richard R. Brooks, Jason M. Schwier:
A Hybrid Statistical Technique for Modeling Recurrent Tracks in a Compact Set. IEEE Trans. Autom. Control. 56(8): 1926-1931 (2011) - [j41]Chinar Dingankar, Sampada Karandikar, Richard R. Brooks, Christopher Griffin:
On Bandwidth-Limited Sum-of-Games Problems. IEEE Trans. Syst. Man Cybern. Part A 41(2): 341-349 (2011) - [j40]Jason M. Schwier, Richard R. Brooks, Christopher Griffin:
Methods to Window Data to Differentiate Between Markov Models. IEEE Trans. Syst. Man Cybern. Part B 41(3): 650-663 (2011) - [c20]Chen Lu, Richard R. Brooks:
Botnet traffic detection using hidden Markov models. CSIIRW 2011: 31 - [c19]Ilker Özçelik, Richard R. Brooks:
Security experimentation using operational systems. CSIIRW 2011: 79 - [c18]Lu Yu, Richard R. Brooks:
Observable subspace solution for irreducible POMDPs with infinite horizon. CSIIRW 2011: 83 - [c17]Harakrishnan Bhanu, Jason M. Schwier, Ryan Craven, Ilker Özçelik, Christopher Griffin, Richard R. Brooks:
Noise tolerant symbolic learning of Markov models of tunneled protocols. IWCMC 2011: 1310-1314 - 2010
- [j39]Mengxia Zhu, Song Ding, Qishi Wu, Richard R. Brooks, Nageswara S. V. Rao, S. Sitharama Iyengar:
Fusion of threshold rules for target detection in wireless sensor networks. ACM Trans. Sens. Networks 6(2): 18:1-18:7 (2010) - [c16]Ryan Craven, Christopher Abbott, Harikrishnan Bhanu, Juan Deng, Richard R. Brooks:
Orwell was an optimist. CSIIRW 2010: 57 - [c15]Richard R. Brooks, Juan Deng:
Lies and the lying liars that tell them: a fair and balanced look at TLS. CSIIRW 2010: 59
2000 – 2009
- 2009
- [j38]Richard R. Brooks, Brijesh Pillai, Matthew Pirretti, Michele C. Weigle:
Multicast Encryption Infrastructure for Security in Sensor Networks. Int. J. Distributed Sens. Networks 5(2): 139-157 (2009) - [j37]Richard R. Brooks, Hemanth Siddulugari:
Adaptive Optimizations for Surveillance Sensor Network Longevity. Int. J. Distributed Sens. Networks 5(2): 158-184 (2009) - [j36]Richard R. Brooks:
Sensor Network Self-Organization Using Random Graphs. Int. J. Distributed Sens. Networks 5(3): 201-208 (2009) - [j35]Richard R. Brooks, P. Y. Govindaraju, Matthew Pirretti, Narayanan Vijaykrishnan, Mahmut T. Kandemir:
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies. Int. J. Distributed Sens. Networks 5(3): 209-223 (2009) - [j34]Mengxia Zhu, Richard R. Brooks:
Comparison of Petri Net and Finite State Machine Discrete Event Control of Distributed Surveillance Networks. Int. J. Distributed Sens. Networks 5(5): 480-501 (2009) - [j33]Jason M. Schwier, Richard R. Brooks, Christopher Griffin, Satish T. S. Bukkapatnam:
Zero knowledge hidden Markov model inference. Pattern Recognit. Lett. 30(14): 1273-1280 (2009) - [j32]Richard R. Brooks, Jason M. Schwier, Christopher Griffin:
Markovian Search Games in Heterogeneous Spaces. IEEE Trans. Syst. Man Cybern. Part B 39(3): 626-635 (2009) - [j31]Richard R. Brooks, Jason M. Schwier, Christopher Griffin:
Behavior Detection Using Confidence Intervals of Hidden Markov Models. IEEE Trans. Syst. Man Cybern. Part B 39(6): 1484-1492 (2009) - [j30]Richard R. Brooks, S. Sander, Juan Deng, Joachim Taiber:
Automobile security concerns. IEEE Veh. Technol. Mag. 4(2): 52-64 (2009) - 2008
- [j29]S. Sitharama Iyengar, Richard R. Brooks, Günter Karjoth:
International Journal of Distributed Sensor Networks. Int. J. Distributed Sens. Networks 4(1): 1-3 (2008) - [j28]Richard R. Brooks, Jing-En Pang, Christopher Griffin:
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games. IEEE Trans. Syst. Man Cybern. Part A 38(6): 1281-1294 (2008) - [c14]Christopher Griffin, Richard R. Brooks, Jason M. Schwier:
Determining a purely symbolic transfer function from symbol streams: Theory and algorithms. ACC 2008: 4065-4067 - 2007
- [j27]Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti:
Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks. Int. J. Distributed Sens. Networks 3(3): 273-287 (2007) - [j26]Richard R. Brooks, Brijesh Pillai, Stephen A. Racunas, Suresh Rai:
Mobile Network Analysis Using Probabilistic Connectivity Matrices. IEEE Trans. Syst. Man Cybern. Part C 37(4): 694-702 (2007) - [j25]Richard R. Brooks, P. Y. Govindaraju, Matthew Pirretti, Narayanan Vijaykrishnan, Mahmut T. Kandemir:
On the Detection of Clones in Sensor Networks Using Random Key Predistribution. IEEE Trans. Syst. Man Cybern. Part C 37(6): 1246-1258 (2007) - [c13]Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Richard R. Brooks:
Performance aware secure code partitioning. DATE 2007: 1122-1127 - 2006
- [j24]Glenn Carl, Richard R. Brooks, Suresh Rai:
Wavelet based Denial-of-Service detection. Comput. Secur. 25(8): 600-615 (2006) - [j23]Richard R. Brooks, Christopher N. Vutsinas:
Kafka in the academy: a note on ethics in IA education. IEEE Secur. Priv. 4(4): 50-53 (2006) - [j22]Richard R. Brooks:
A Review of: "Wireless Sensor Networks: An Information Processing.". Int. J. Distributed Sens. Networks 2(1): 101-102 (2006) - [j21]Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrishnan, Patrick D. McDaniel, Mahmut T. Kandemir, Richard R. Brooks:
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Int. J. Distributed Sens. Networks 2(3): 267-287 (2006) - [j20]Glenn Carl, George Kesidis, Richard R. Brooks, Suresh Rai:
Denial-of-Service Attack-Detection Techniques. IEEE Internet Comput. 10(1): 82-89 (2006) - [j19]Christopher Griffin, Richard R. Brooks:
A note on the spread of worms in scale-free networks. IEEE Trans. Syst. Man Cybern. Part B 36(1): 198-202 (2006) - [c12]Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Richard R. Brooks, Ibrahim Kolcu:
Secure Execution of Computations in Untrusted Hosts. Ada-Europe 2006: 106-118 - [c11]Marion G. Ceruti, Subrata Das, Adam Ashenfelter, Gary Raven, Richard R. Brooks, Moises Sudit, Genshe Chen, Edward Wright:
Pedigree Information for Enhanced Situation and Threat Assessment. FUSION 2006: 1-8 - 2005
- [j18]Eric J. Swankoski, Narayanan Vijaykrishnan, Richard R. Brooks, Mahmut T. Kandemir, Mary Jane Irwin:
Symmetric encryption in reconfigurable and custom hardware. Int. J. Embed. Syst. 1(3/4): 205-217 (2005) - [c10]Feihui Li, Guilin Chen, Mahmut T. Kandemir, Richard R. Brooks:
A Compiler-Based Approach to Data Security. CC 2005: 188-203 - [c9]Hendra Saputra, Ozcan Ozturk, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Richard R. Brooks:
A Data-Driven Approach for Embedded Security. ISVLSI 2005: 104-109 - 2004
- [j17]Richard R. Brooks, Christopher Griffin, T. Alan Payne:
A cellular automata model can quickly approximate UDP and TCP network traffic. Complex. 9(3): 32-40 (2004) - [j16]Richard R. Brooks:
Mobile Code Paradigms and Security Issues. IEEE Internet Comput. 8(3): 54-59 (2004) - [j15]Richard R. Brooks, Thomas E. Keiser:
Mobile Code Daemons for Networks of Embedded Systems. IEEE Internet Comput. 8(4): 72-79 (2004) - [j14]S. Sitharama Iyengar, Richard R. Brooks:
Special issue introduction--the road map for distributed sensor networks in the context of computing and communication. J. Parallel Distributed Comput. 64(7): 785-787 (2004) - [j13]Richard R. Brooks, Mengxia Zhu, Jacob Lamb, S. Sitharama Iyengar:
Aspect-oriented design of sensor networks. J. Parallel Distributed Comput. 64(7): 853-865 (2004) - [j12]Richard R. Brooks, David Friedlander, John Koch, Shashi Phoha:
Tracking multiple targets with self-organizing distributed ground sensors. J. Parallel Distributed Comput. 64(7): 874-884 (2004) - [c8]Matthew Pirretti, Greg M. Link, Richard R. Brooks, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin:
Fault Tolerant Algorithms for Network-On-Chip Interconnect. ISVLSI 2004: 46-51 - [c7]Hendra Saputra, Guangyu Chen, Richard R. Brooks, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin:
Code protection for resource-constrained embedded devices. LCTES 2004: 240-248 - [p1]Qishi Wu, Nageswara S. V. Rao, Richard R. Brooks, S. Sitharama Iyengar, Mengxia Zhu:
Computational andNetworking Problemsin Distributed Sensor Networks. Handbook of Sensor Networks 2004 - 2003
- [j11]David Friedlander, Christopher Griffin, Noah Jacobson, Shashi Phoha, Richard R. Brooks:
Dynamic Agent Classification and Tracking Using an Ad Hoc Mobile Acoustic Sensor Network. EURASIP J. Adv. Signal Process. 2003(4): 371-377 (2003) - [j10]John Zachary, Richard R. Brooks:
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware. Mob. Networks Appl. 8(2): 137-143 (2003) - [j9]Richard R. Brooks, Parameswaran Ramanathan, Akbar M. Sayeed:
Distributed target classification and tracking in sensor networks. Proc. IEEE 91(8): 1163-1171 (2003) - [c6]Hendra Saputra, Narayanan Vijaykrishnan, Mahmut T. Kandemir, Mary Jane Irwin, Richard R. Brooks, Soontae Kim, Wei Zhang:
Masking the Energy Behavior of DES Encryption. DATE 2003: 10084-10089 - [c5]Shashi Phoha, Noah Jacobson, David Friedlander, Richard R. Brooks:
Sensor network based localization and target tracking through hybridization in the operational domains of beamforming and dynamic space-time clustering. GLOBECOM 2003: 2952-2956 - [c4]Richard R. Brooks, Matthew Pirretti, Mengxia Zhu, S. Sitharama Iyengar:
Distributed adaptation methods for wireless sensor networks. GLOBECOM 2003: 2967-2971 - 2002
- [j8]Richard R. Brooks, Christopher Griffin, David Friedlander:
Self-Organized Distributed Sensor Network Entity Tracking. Int. J. High Perform. Comput. Appl. 16(3): 207-219 (2002) - [j7]Richard R. Brooks, Christopher Griffin:
Traffic Model Evaluation of Ad Hoc Target Tracking Algorithms. Int. J. High Perform. Comput. Appl. 16(3): 221-234 (2002) - [j6]Ying Chen, Richard R. Brooks, S. Sitharama Iyengar, Nageswara S. V. Rao, Jacob Barhen:
Efficient Global Optimization for Image Registration. IEEE Trans. Knowl. Data Eng. 14(1): 79-92 (2002) - [j5]Richard R. Brooks, Nathan Orr:
A Model for Mobile Code Using Interacting Automata. IEEE Trans. Mob. Comput. 1(4): 313-326 (2002) - 2001
- [j4]Richard R. Brooks, Lynne L. Grewe, S. Sitharama Iyengar:
Recognition in the wavelet domain: A survey. J. Electronic Imaging 10(3): 757-784 (2001) - 2000
- [c3]Richard R. Brooks, Eric Grele, Wojtek Klimkiewicz, Jamila Moore, Christopher Griffin, Brian Kovak, John Koch:
Reactive Sensor Networks. DARS 2000: 471-472
1990 – 1999
- 1999
- [c2]Eugene Eberbach, Richard R. Brooks, Shashi Phoha:
Flexible Optimization and Evolution of Underwater Autonomous Agents. RSFDGrC 1999: 519-527 - 1997
- [j3]Richard R. Brooks, Nageswara S. V. Rao, S. Sitharama Iyengar:
Resolution of Contradictory Sensor Data. Intell. Autom. Soft Comput. 3(3): 287-299 (1997) - [c1]Lynne L. Grewe, Richard R. Brooks:
On localization of objects in the wavelet domain. CIRA 1997: 412-418 - 1996
- [j2]Richard R. Brooks, S. Sitharama Iyengar, Jianhua Chen:
Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms. Artif. Intell. 84(1-2): 339-354 (1996) - [j1]Richard R. Brooks, S. Sitharama Iyengar:
Robust Distributed Comupting and Sensing Algorithm. Computer 29(6): 53-60 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint