default search action
Barry E. Mullins
Person information
- affiliation: Air Force Institute of Technology, Wright-Patterson Air Force Base, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Christopher James Augeri, Barry E. Mullins, Leemon C. Baird III, Dursun A. Bulutoglu, Rusty O. Baldwin:
An Analysis of XML Compression Efficiency. CoRR abs/2410.07603 (2024) - 2021
- [c48]Stephanie Long, Richard Dill, Barry E. Mullins:
Security Analysis of the Masimo MightySat: Data Leakage to a Nosy Neighbor. HICSS 2021: 1-8
2010 – 2019
- 2019
- [j37]Christopher W. Badenhop, Scott R. Graham, Barry E. Mullins, Logan O. Mailloux:
Looking Under the Hood of Z-Wave: Volatile Memory Introspection for the ZW0301 Transceiver. ACM Trans. Cyber Phys. Syst. 3(2): 20:1-20:24 (2019) - [c47]Luis Cintron, Scott R. Graham, Douglas D. Hodson, Barry E. Mullins:
Modeling Liability Data Collection Systems for Intelligent Transportation Infrastructure Using Hyperledger Fabric. Critical Infrastructure Protection 2019: 137-156 - [i1]Brent J. Stone, Scott R. Graham, Barry E. Mullins, Christine M. Schubert-Kabban:
Unsupervised Time Series Extraction from Controller Area Network Payloads. CoRR abs/1904.03078 (2019) - 2018
- [j36]Steven M. Beyer, Barry E. Mullins, Scott R. Graham, Jason M. Bindewald:
Pattern-of-Life Modeling in Smart Homes. IEEE Internet Things J. 5(6): 5317-5325 (2018) - [c46]Luke Bradford, Barry E. Mullins, Stephen Dunlap, Timothy H. Lacey:
Variable Speed Simulation for Accelerated Industrial Control System Cyber Training. Critical Infrastructure Protection 2018: 283-306 - [c45]Brent C. Nolan, Scott R. Graham, Barry E. Mullins, Christine M. Schubert-Kabban:
Unsupervised Time Series Extraction from Controller Area Network Payloads. VTC Fall 2018: 1-5 - 2017
- [j35]Christopher W. Badenhop, Scott R. Graham, Benjamin W. P. Ramsey, Barry E. Mullins, Logan O. Mailloux:
The Z-Wave routing protocol and its security implications. Comput. Secur. 68: 112-129 (2017) - [c44]Htein Lin, Stephen Dunlap, Mason Rice, Barry E. Mullins:
Generating Honeypot Traffic for Industrial Control Systems. Critical Infrastructure Protection 2017: 193-223 - [c43]Caleb Mays, Mason Rice, Benjamin W. P. Ramsey, John M. Pecarina, Barry E. Mullins:
Defending Building Automation Systems Using DECOY Networks. Critical Infrastructure Protection 2017: 297-317 - [c42]Anthony Rose, Jason M. Bindewald, Benjamin W. P. Ramsey, Mason Rice, Barry E. Mullins:
Securing Bluetooth low Energy Locks from Unauthorizedaccess and Surveillance. Critical Infrastructure Protection 2017: 319-338 - 2016
- [j34]Christopher W. Badenhop, Benjamin W. P. Ramsey, Barry E. Mullins, Logan O. Mailloux:
Extraction and analysis of non-volatile memory of the ZW0301 module, a Z-Wave transceiver. Digit. Investig. 17: 14-27 (2016) - [j33]Stephen Dunlap, Jonathan Butts, Juan Lopez Jr., Mason Rice, Barry E. Mullins:
Using timing-based side channels for anomaly detection in industrial control systems. Int. J. Crit. Infrastructure Prot. 15: 12-26 (2016) - [j32]Christopher W. Badenhop, Benjamin W. P. Ramsey, Barry E. Mullins:
An Analytical Black Hole Attack Model Using a Stochastic Topology Approximation Technique for Reactive Ad-Hoc Routing Protocols. Int. J. Netw. Secur. 18(4): 667-677 (2016) - [c41]Kyle Girtz, Barry E. Mullins, Mason Rice, Juan Lopez Jr.:
Practical Application Layer Emulation in Industrial Control System Honeypots. Critical Infrastructure Protection 2016: 83-98 - 2015
- [j31]Benjamin W. P. Ramsey, Tyler D. Stubbs, Barry E. Mullins, Michael A. Temple, Mark A. Buckner:
Wireless infrastructure protection using low-cost radio frequency fingerprinting receivers. Int. J. Crit. Infrastructure Prot. 8: 27-39 (2015) - [j30]Michael Winn, Mason Rice, Stephen Dunlap, Juan Lopez Jr., Barry E. Mullins:
Constructing cost-effective and targetable industrial control system honeypots for production networks. Int. J. Crit. Infrastructure Prot. 10: 47-58 (2015) - [j29]Benjamin W. P. Ramsey, Barry E. Mullins, Michael A. Temple, Michael R. Grimaila:
Wireless Intrusion Detection and Device Fingerprinting through Preamble Manipulation. IEEE Trans. Dependable Secur. Comput. 12(5): 585-596 (2015) - [c40]Daniel J. Casey, Barry E. Mullins:
SDN shim: Controlling legacy devices. LCN 2015: 169-172 - 2014
- [j28]Roland Bodenheim, Jonathan Butts, Stephen Dunlap, Barry E. Mullins:
Evaluation of the ability of the Shodan search engine to identify Internet-facing industrial control devices. Int. J. Crit. Infrastructure Prot. 7(2): 114-123 (2014) - [j27]Christopher W. Badenhop, Barry E. Mullins:
A black hole attack model using topology approximation for reactive ad-hoc routing protocols. Int. J. Secur. Networks 9(2): 63-77 (2014) - [j26]Wayne C. Henry, Barry E. Mullins:
VANISH: a variable advanced network IRC stealth handling system. Int. J. Secur. Networks 9(2): 114-123 (2014) - [j25]John T. Hagen, Barry E. Mullins:
Network vulnerability analysis of the Player command and control protocol. Int. J. Secur. Networks 9(3): 154-166 (2014) - [c39]Juan Lopez Jr., Michael A. Temple, Barry E. Mullins:
Exploitation of HART Wired Signal Distinct Native Attribute (WS-DNA) Features to Verify Field Device Identity and Infer Operating State. CRITIS 2014: 24-30 - [c38]Benjamin W. P. Ramsey, Barry E. Mullins, William M. Lowder, Ryan Speers:
Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking. MILCOM 2014: 104-109 - 2013
- [j24]M. Brent Reynolds, Don R. Hulce, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
A Bin Packing Heuristic for On-Line Service Placement and Performance Control. IEEE Trans. Netw. Serv. Manag. 10(3): 326-339 (2013) - [j23]Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins:
Large-scale cooperative task distribution on peer-to-peer networks. Web Intell. Agent Syst. 11(1): 67-79 (2013) - [c37]Robert Jaromin, Barry E. Mullins, Jonathan W. Butts, Juan Lopez Jr.:
Design and Implementation of Industrial Control System Emulators. Critical Infrastructure Protection 2013: 35-46 - [c36]Benjamin W. P. Ramsey, Barry E. Mullins:
Defensive Rekeying Strategies for Physical-Layer-Monitored Low-Rate Wireless Personal Area Networks. Critical Infrastructure Protection 2013: 63-79 - [c35]John T. Hagen, Barry E. Mullins:
TCP veto: A novel network attack and its Application to SCADA protocols. ISGT 2013: 1-6 - [c34]Benjamin W. P. Ramsey, Barry E. Mullins, Ryan Speers, Katherine A. Batterton:
Watching for Weakness in Wild WPANs. MILCOM 2013: 1404-1409 - 2012
- [j22]Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers:
RIPsec - Using reputation-based multilayer security to protect MANETs. Comput. Secur. 31(1): 122-136 (2012) - [j21]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Michael R. Grimaila, Barry E. Mullins:
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics. IEEE Commun. Surv. Tutorials 14(2): 579-606 (2012) - [c33]Benjamin W. P. Ramsey, Michael A. Temple, Barry E. Mullins:
PHY foundation for multi-factor ZigBee node authentication. GLOBECOM 2012: 795-800 - [c32]M. Brent Reynolds, Don R. Hulce, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
Cloud Chamber: A Self-Organizing Facility to Create, Exercise, and Examine Software as a Service Tenants. HICSS 2012: 5546-5555 - [c31]Benjamin W. P. Ramsey, Barry E. Mullins, Edward D. White:
Improved tools for indoor ZigBee warwalking. LCN Workshops 2012: 921-924 - 2011
- [j20]Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective audio quality over a secure IEEE 802.11n network. Int. J. Secur. Networks 6(1): 53-63 (2011) - [c30]M. Brent Reynolds, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
Provisioning Norm: An Asymmetric Quality Measure for SaaS Resource Allocation. IEEE SCC 2011: 112-119 - [c29]Brennon Thomas, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
An FPGA System for Detecting Malicious DNS Network Traffic. IFIP Int. Conf. Digital Forensics 2011: 195-207 - 2010
- [j19]Cory J. Antosh, Barry E. Mullins, Rusty O. Baldwin, Richard A. Raines:
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 350-368 (2010) - [j18]Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
An FPGA-based system for tracking digital information transmitted via Peer-to-Peer protocols. Int. J. Secur. Networks 5(4): 236-247 (2010) - [c28]Joseph R. Erskine, Gilbert L. Peterson, Barry E. Mullins, Michael R. Grimaila:
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining. CSIIRW 2010: 74 - [c27]Dustyn A. Dodge, Barry E. Mullins, Gilbert L. Peterson, James S. Okolica:
Simulating windows-based cyber attacks using live virtual machine introspection. SummerSim 2010: 550-555 - [c26]M. Brent Reynolds, Kenneth M. Hopkinson, Mark E. Oxley, Barry E. Mullins:
Iterative Configuration Method: An Effective and Efficient Heuristic for Service Oriented Infrastructure Resource Allocation. SERVICES 2010: 156-157
2000 – 2009
- 2009
- [j17]David W. Marsh, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
A security policy language for wireless sensor networks. J. Syst. Softw. 82(1): 101-111 (2009) - [j16]Daniel R. Karrels, Gilbert L. Peterson, Barry E. Mullins:
Structured P2P technologies for distributed command and control. Peer-to-Peer Netw. Appl. 2(4): 311-333 (2009) - [j15]Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles. Secur. Commun. Networks 2(1): 55-69 (2009) - [j14]Barry E. Mullins, Jason R. Seyba, Richard A. Raines, Benjamin W. P. Ramsey, Paul D. Williams:
Voice and video capacity of a secure IEEE 802.11g wireless network. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(1): 26-34 (2009) - [c25]Douglas J. Kelly, Richard A. Raines, Rusty Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Tree-Based Taxonomy of Anonymous Networks. CCNC 2009: 1-2 - [c24]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Taxonomy of Wired and Wireless Anonymous Networks. ICC 2009: 1-8 - [c23]Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills:
Tracking Contraband Files Transmitted Using Bittorrent. IFIP Int. Conf. Digital Forensics 2009: 159-173 - [c22]Robert L. Lidowski, Barry E. Mullins, Rusty O. Baldwin:
A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission. PerCom 2009: 1-7 - [c21]Michael G. Wabiszewski Jr., Todd R. Andel, Barry E. Mullins, Ryan W. Thomas:
Enhancing realistic hands-on network training in a virtual environment. SpringSim 2009 - 2008
- [j13]Gustav J. Jordt, Rusty O. Baldwin, John F. Raquet, Barry E. Mullins:
Energy cost and error performance of range-aware, anchor-free localization algorithms. Ad Hoc Networks 6(4): 539-559 (2008) - [j12]Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter:
Hindering Reverse Engineering: Thinking Outside the Box. IEEE Secur. Priv. 6(2): 58-65 (2008) - [j11]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
A queueing approach to optimal resource replication in wireless sensor networks. Perform. Evaluation 65(10): 689-700 (2008) - [j10]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
Energy-efficient search for finite-lifetime resources in sensor networks with time-constrained queries. ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(2): 31-39 (2008) - [c20]Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins:
A survey of state-of-the-art in anonymity metrics. NDA 2008: 31-40 - [c19]Benjamin W. P. Ramsey, Barry E. Mullins, Ryan W. Thomas, Todd R. Andel:
Subjective Audio Quality over Secure IEEE 802.11 Wireless Local Area Networks. IPCCC 2008: 469-474 - [c18]Cory J. Antosh, Barry E. Mullins:
The Scalability of Secure Lock. IPCCC 2008: 507-512 - [c17]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. IPCCC 2008: 524-531 - [c16]Matthew Judge, Paul D. Williams, Yong Kim, Barry E. Mullins:
Software Cannot Protect Software: An Argument for Dedicated Hardware in Security and a Categorization of the Trustworthiness of Information. WISTP 2008: 36-48 - 2007
- [j9]Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass:
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum. IEEE Secur. Priv. 5(5): 40-49 (2007) - [j8]Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. Potoczny:
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. Int. J. Secur. Networks 2(3/4): 260-271 (2007) - [j7]Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. IEEE Netw. 21(4): 51-56 (2007) - [j6]Christopher R. Mann, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Barry E. Mullins:
A trajectory-based selective broadcast query protocol for large-scale, high-density wireless sensor networks. Telecommun. Syst. 35(1-2): 67-86 (2007) - [j5]George R. Roelke, Rusty O. Baldwin, Barry E. Mullins, Yong C. Kim:
A Cache Architecture for Extremely Unreliable Nanotechnologies. IEEE Trans. Reliab. 56(2): 182-197 (2007) - [c15]Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington:
Program Fragmentation as a Metamorphic Software Protection. IAS 2007: 369-374 - [c14]David P. Montminy, Rusty O. Baldwin, Paul D. Williams, Barry E. Mullins:
Using Relocatable Bitstreams for Fault Tolerance. AHS 2007: 701-708 - [c13]M. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple:
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles. AINA Workshops (2) 2007: 249-256 - [c12]Jason R. Seyba, Barry E. Mullins, Gregory L. Bonafede:
Audio-video capacity of an IEEE 802.11g wireless LAN. CTS 2007: 372-378 - [c11]Christopher J. Augeri, Dursun A. Bulutoglu, Barry E. Mullins, Rusty O. Baldwin, Leemon C. Baird III:
An analysis of XML compression efficiency. Experimental Computer Science 2007: 7 - [c10]Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass:
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. HICSS 2007: 271 - [c9]Justin T. Kautz, Barry E. Mullins, Rusty O. Baldwin, Scott R. Graham:
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks. HICSS 2007: 292 - [c8]Nicholas A. Fraser, Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. ICC 2007: 1197-1202 - [c7]Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Christopher B. Mayer, Rusty O. Baldwin:
Assessing Standard and Inverted Skip Graphs Using Multi-Dimensional Range Queries and Mobile Nodes. MobiQuitous 2007: 1-8 - [c6]Gregory J. Brault, Christopher J. Augeri, Barry E. Mullins, Rusty O. Baldwin, Christopher B. Mayer:
Enabling Skip Graphs to Process K-Dimensional Range Queries in a Mobile Sensor Network. NCA 2007: 273-282 - [c5]Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers:
Alert Verification Evasion Through Server Response Forging. RAID 2007: 256-275 - [c4]Christopher R. Mann, Rusty O. Baldwin, Barry E. Mullins:
Wireless sensor networks: guidelines for design and a survey of current research. SpringSim (1) 2007: 41-50 - 2006
- [j4]Victor P. Hubenko Jr., Richard A. Raines, Robert F. Mills, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements. IEEE Commun. Mag. 44(11): 66-72 (2006) - [j3]David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. IEEE Secur. Priv. 4(6): 36-43 (2006) - [j2]Sean A. Jeffers, Rusty O. Baldwin, Barry E. Mullins:
Accelerating Missile Threat Simulations Using Personal Computer Graphics Cards. Simul. 82(8): 549-558 (2006) - 2003
- [c3]Daniel J. Pack, Barry E. Mullins:
Toward finding an universal search algorithm for swarm robots. IROS 2003: 1945-1950 - [c2]Daniel J. Pack, Barry E. Mullins:
A portable microcontroller-based HTTP tunnelling activity detection system. SMC 2003: 1544-1549
1990 – 1999
- 1998
- [b1]Barry E. Mullins:
Cater: an Opportunistic Medium Access Control Protocol for Wireless Local Area Networks. Virginia Tech, Blacksburg, VA, USA, 1998 - 1997
- [j1]Barry E. Mullins, Nathaniel J. Davis IV, Scott F. Midkiff:
An adaptive wireless local area network protocol that improves throughput via adaptive control of direct sequence spread spectrum parameters. ACM SIGMOBILE Mob. Comput. Commun. Rev. 1(3): 9-20 (1997) - [c1]Barry E. Mullins, Nathaniel J. Davis IV, Scott F. Midkiff:
A Wireless Local Area Network Protocol that Improves Throughput via Adaptive Control. ICC (3) 1997: 1427-1431
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint