default search action
Richard A. Raines
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2013
- [j28]Thomas E. Dube, Richard A. Raines, Michael R. Grimaila, Kenneth W. Bauer Jr., Steven K. Rogers:
Malware Target Recognition of Unknown Threats. IEEE Syst. J. 7(3): 467-477 (2013) - 2012
- [j27]Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers:
RIPsec - Using reputation-based multilayer security to protect MANETs. Comput. Secur. 31(1): 122-136 (2012) - [j26]Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers:
Malware target recognition via static heuristics. Comput. Secur. 31(1): 137-147 (2012) - [j25]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Michael R. Grimaila, Barry E. Mullins:
Exploring Extant and Emerging Issues in Anonymous Networks: A Taxonomy and Survey of Protocols and Metrics. IEEE Commun. Surv. Tutorials 14(2): 579-606 (2012) - 2010
- [j24]Cory J. Antosh, Barry E. Mullins, Rusty O. Baldwin, Richard A. Raines:
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 350-368 (2010) - [j23]George C. Dalton II, Kenneth S. Edge, Robert F. Mills, Richard A. Raines:
Analysing security risks in computer and Radio Frequency Identification (RFID) networks using attack and protection trees. Int. J. Secur. Networks 5(2/3): 87-95 (2010) - [c26]Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers:
Malware Type Recognition and Cyber Situational Awareness. SocialCom/PASSAT 2010: 938-943
2000 – 2009
- 2009
- [j22]Adrian N. Phillips, Barry E. Mullins, Richard A. Raines, Rusty O. Baldwin:
A secure group communication architecture for autonomous unmanned aerial vehicles. Secur. Commun. Networks 2(1): 55-69 (2009) - [j21]Stephen Cooper, Christine Nickell, Victor P. Piotrowski Jr., Brenda Oldfield, Ali E. Abdallah, Matt Bishop, Bill Caelli, Melissa Dark, Elizabeth K. Hawthorne, Lance J. Hoffman, Lance C. Pérez, Charles P. Pfleeger, Richard A. Raines, Corey D. Schou, Joel Brynielsson:
An exploration of the current state of information assurance education. ACM SIGCSE Bull. 41(4): 109-125 (2009) - [j20]Barry E. Mullins, Jason R. Seyba, Richard A. Raines, Benjamin W. P. Ramsey, Paul D. Williams:
Voice and video capacity of a secure IEEE 802.11g wireless network. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(1): 26-34 (2009) - [c25]Douglas J. Kelly, Richard A. Raines, Rusty Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Tree-Based Taxonomy of Anonymous Networks. CCNC 2009: 1-2 - [c24]Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Mark E. Oxley, Steven K. Rogers:
Using qualia and multi-layered relationships in malware detection. CICS 2009: 91-98 - [c23]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards a Taxonomy of Wired and Wireless Anonymous Networks. ICC 2009: 1-8 - 2008
- [j19]Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter:
Hindering Reverse Engineering: Thinking Outside the Box. IEEE Secur. Priv. 6(2): 58-65 (2008) - [c22]Douglas J. Kelly, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Barry E. Mullins:
A survey of state-of-the-art in anonymity metrics. NDA 2008: 31-40 - [c21]John W. Carls, Richard A. Raines, Michael R. Grimaila, Steven K. Rogers:
Biometric enhancements: Template aging error score analysis. FG 2008: 1-8 - [c20]Dorsey Wilkin, Richard A. Raines, Paul D. Williams, Kenneth M. Hopkinson:
Cyberspace Policy For Critical Infrastructures. Critical Infrastructure Protection 2008: 17-28 - [c19]Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary. IPCCC 2008: 524-531 - 2007
- [j18]Kevin M. Finnigin, Barry E. Mullins, Richard A. Raines, Henry B. Potoczny:
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks. Int. J. Secur. Networks 2(3/4): 260-271 (2007) - [j17]Marcus L. Roberts, Michael A. Temple, Richard A. Raines, Robert F. Mills, Mark E. Oxley:
Communication Waveform Design Using an Adaptive Spectrally Modulated, Spectrally Encoded (SMSE) Framework. J. Sel. Topics Signal Processing 1(1): 203-213 (2007) - [j16]Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila:
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. IEEE Netw. 21(4): 51-56 (2007) - [c18]Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington:
Program Fragmentation as a Metamorphic Software Protection. IAS 2007: 369-374 - [c17]Marcus L. Roberts, Michael A. Temple, Robert F. Mills, Richard A. Raines:
An SMSE Implementation of CDMA with Partial Band Interference Suppression. GLOBECOM 2007: 4424-4428 - [c16]Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert W. Bennington, Christopher E. Reuter:
The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. HICSS 2007: 144 - [c15]Gilbert L. Peterson, Richard A. Raines, Rusty O. Baldwin:
Graduate Digital Forensics Education at the Air Force Institute of Technology. HICSS 2007: 264 - [c14]Nicholas A. Fraser, Douglas J. Kelly, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Using Client Puzzles to Mitigate Distributed Denial of Service Attacks in the Tor Anonymous Routing Environment. ICC 2007: 1197-1202 - [c13]Adam D. Todd, J. Benson, Gilbert L. Peterson, T. Franz, Michael Stevens, Richard A. Raines:
Analysis of Tools for Detecting Rootkits and Hidden Processes. IFIP Int. Conf. Digital Forensics 2007: 89-105 - [c12]Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers:
Alert Verification Evasion Through Server Response Forging. RAID 2007: 256-275 - 2006
- [j15]Victor P. Hubenko Jr., Richard A. Raines, Robert F. Mills, Rusty O. Baldwin, Barry E. Mullins, Michael R. Grimaila:
Improving the Global Information Grid's Performance through Satellite Communications Layer Enhancements. IEEE Commun. Mag. 44(11): 66-72 (2006) - [j14]Marcus L. Roberts, Michael A. Temple, Robert F. Mills, Richard A. Raines:
Evolution of the air interface of cellular communications systems toward 4G realization. IEEE Commun. Surv. Tutorials 8(1-4): 2-23 (2006) - [j13]David J. Chaboya, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins:
Network Intrusion Detection: Automated and Manual Methods Prone to Attack and Evasion. IEEE Secur. Priv. 4(6): 36-43 (2006) - [c11]Kenneth S. Edge, Gary B. Lamont, Richard A. Raines:
A retrovirus inspired algorithm for virus detection & optimization. GECCO 2006: 103-110 - [c10]Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines:
Bluetooth Discovery Time with Multiple Inquirers. HICSS 2006 - [c9]Marcus L. Roberts, Michael A. Temple, Mark E. Oxley, Robert F. Mills, Richard A. Raines:
A spectrally modulated, spectrally encoded analytic framework for carrier interferometry signals. IWCMC 2006: 1009-1014 - 2005
- [j12]Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines:
Packet Error Rate Distribution Between Random Bluetooth Piconet Pairs. Wirel. Pers. Commun. 35(4): 407-432 (2005) - [c8]Abel S. Nunez, Michael A. Temple, Robert F. Mills, Richard A. Raines:
Interference avoidance in spectrally encoded multiple access communications using MPSK modulation. WCNC 2005: 730-734 - 2004
- [j11]Randall B. Noel, Rusty O. Baldwin, Richard A. Raines, Michael A. Temple:
Wireless Local Area Network Performance in a Bluetooth Interference Environment. Int. J. Wirel. Opt. Commun. 2(1): 19-34 (2004) - [j10]Brian S. Peterson, Rusty O. Baldwin, Richard A. Raines:
Inquiry packet interference in bluetooth scatternets. ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2): 66-75 (2004) - 2003
- [j9]Brian S. Peterson, Rusty O. Baldwin, Jeffrey P. Kharoufeh, Richard A. Raines:
Refinements to the packet error rate upper bound for Bluetooth networks. IEEE Commun. Lett. 7(8): 382-384 (2003) - [c7]Timothy F. Kneeland, Richard A. Raines, Michael A. Temple, Rusty O. Baldwin:
Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices. ICON 2003: 665-671 - [c6]Gregg H. Gunsch, Richard A. Raines, Timothy H. Lacey:
Integrating CDX into the graduate program. SMC 2003: 4306-4310 - [c5]Courtney M. Canadeo, Michael A. Temple, Rusty O. Baldwin, Richard A. Raines:
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations. WCNC 2003: 678-682 - 2002
- [j8]Ryan W. Thomas, Richard A. Raines, Rusty O. Baldwin, Michael A. Temple:
Performance analysis of multicast algorithms for mobile satellite communication networks. Comput. Commun. 25(11-12): 1085-1093 (2002) - [c4]Marion J. Lee, Michael A. Temple, Roger L. Claypoole Jr., Richard A. Raines:
Transform domain communications and interference avoidance using wavelet packet decomposition. WCNC 2002: 255-259 - 2001
- [j7]Rusty O. Baldwin, Nathaniel J. Davis IV, Scott F. Midkiff, Richard A. Raines:
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol. ACM SIGMOBILE Mob. Comput. Commun. Rev. 5(3): 11-25 (2001) - [c3]Ryan W. Thomas, Richard A. Raines, Rusty O. Baldwin, Michael A. Temple:
Simulation, modeling, and evaluation of satellite-based multicasting protocols. VTC Fall 2001: 305-309 - 2000
- [c2]Moataz M. Salah, Richard A. Raines, Michael A. Temple, T. G. Bailey:
Energy Allocation Strategies for Turbo Codes with Short Frames. ITCC 2000: 408-411 - [c1]Moataz M. Salah, Richard A. Raines, Michael A. Temple, T. G. Bailey:
A General Interleaver for Equal and Unequal Error Protections of Turbo Codes with Short Frames. ITCC 2000: 412-415
1990 – 1999
- 1999
- [j6]Stephen R. Pratt, Richard A. Raines, Carl Edward Fossa Jr., Michael A. Temple:
An Operational and Performance Overview of the IRIDIUM Low Earth Orbit Satellite System. IEEE Commun. Surv. Tutorials 2(2): 2-10 (1999) - [j5]K. E. Crowe, Richard A. Raines:
A model to describe the distribution of transmission path elevation angles to the Iridium and Globalstar satellite systems. IEEE Commun. Lett. 3(8): 242-244 (1999) - [j4]Richard A. Raines, Nathaniel J. Davis IV:
The simulation modelling and performance analysis of low earth orbit satellite communication networks for personal communications. Int. J. Commun. Syst. 12(3): 197-215 (1999) - 1998
- [j3]Carl Edward Fossa Jr., Richard A. Raines, Gregg H. Gunsch, Michael A. Temple:
A performance analysis of the IRIDIUM® low earth orbit satellite system with a degraded satellite constellation. ACM SIGMOBILE Mob. Comput. Commun. Rev. 2(4): 54-61 (1998) - 1997
- [j2]William E. Polakowski, Donald A. Cournoyer, Steven K. Rogers, Martin P. DeSimio, Dennis W. Ruck, Jeffrey W. Hoffmeister, Richard A. Raines:
Computer-Aided Breast Cancer Detection and Diagnosis of Masses Using Difference of Gaussians and Derivative-Based Feature Saliency. IEEE Trans. Medical Imaging 16(6): 811-819 (1997) - 1994
- [j1]Wade H. Shaw Jr., Nathaniel J. Davis IV, Richard A. Raines:
The Application of Metamodeling to Interconnection Network Analysis. INFORMS J. Comput. 6(4): 369-380 (1994)
Coauthor Index
aka: Rusty Baldwin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint