2008 |
29 | EE | Richard R. Brooks,
Jing-En Pang,
Christopher Griffin:
Game and Information Theory Analysis of Electronic Countermeasures in Pursuit-Evasion Games.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 38(6): 1281-1294 (2008) |
28 | EE | S. Sitharama Iyengar,
Richard R. Brooks,
Günter Karjoth:
International Journal of Distributed Sensor Networks.
IJDSN 4(1): 1-3 (2008) |
2007 |
27 | EE | Sri Hari Krishna Narayanan,
Mahmut T. Kandemir,
Richard R. Brooks:
Performance aware secure code partitioning.
DATE 2007: 1122-1127 |
26 | EE | Richard R. Brooks,
Brijesh Pillai,
S. Racunas,
S. Rai:
Mobile Network Analysis Using Probabilistic Connectivity Matrices.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 37(4): 694-702 (2007) |
25 | EE | Richard R. Brooks,
P. Y. Govindaraju,
Matthew Pirretti,
Narayanan Vijaykrishnan,
Mahmut T. Kandemir:
On the Detection of Clones in Sensor Networks Using Random Key Predistribution.
IEEE Transactions on Systems, Man, and Cybernetics, Part C 37(6): 1246-1258 (2007) |
24 | EE | Richard R. Brooks,
Brijesh Pillai,
Michele C. Weigle,
Matthew Pirretti:
Optimal Layout of Multicast Groups Using Network Embedded Multicast Security in Ad Hoc Sensor Networks.
IJDSN 3(3): 273-287 (2007) |
2006 |
23 | EE | Sri Hari Krishna Narayanan,
Mahmut T. Kandemir,
Richard R. Brooks,
Ibrahim Kolcu:
Secure Execution of Computations in Untrusted Hosts.
Ada-Europe 2006: 106-118 |
22 | EE | Glenn Carl,
Richard R. Brooks,
Suresh Rai:
Wavelet based Denial-of-Service detection.
Computers & Security 25(8): 600-615 (2006) |
21 | EE | Glenn Carl,
George Kesidis,
Richard R. Brooks,
Suresh Rai:
Denial-of-Service Attack-Detection Techniques.
IEEE Internet Computing 10(1): 82-89 (2006) |
20 | EE | Christopher Griffin,
Richard R. Brooks:
A note on the spread of worms in scale-free networks.
IEEE Transactions on Systems, Man, and Cybernetics, Part B 36(1): 198-202 (2006) |
19 | EE | Matthew Pirretti,
Sencun Zhu,
Narayanan Vijaykrishnan,
Patrick McDaniel,
Mahmut T. Kandemir,
Richard R. Brooks:
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense.
IJDSN 2(3): 267-287 (2006) |
2005 |
18 | EE | Feihui Li,
Guilin Chen,
Mahmut T. Kandemir,
Richard R. Brooks:
A Compiler-Based Approach to Data Security.
CC 2005: 188-203 |
17 | EE | Hendra Saputra,
Ozcan Ozturk,
Narayanan Vijaykrishnan,
Mahmut T. Kandemir,
Richard R. Brooks:
A Data-Driven Approach for Embedded Security.
ISVLSI 2005: 104-109 |
16 | EE | Eric J. Swankoski,
Narayanan Vijaykrishnan,
Richard R. Brooks,
Mahmut T. Kandemir,
Mary Jane Irwin:
Symmetric encryption in reconfigurable and custom hardware.
IJES 1(3/4): 205-217 (2005) |
2004 |
15 | EE | Matthew Pirretti,
Greg M. Link,
Richard R. Brooks,
Narayanan Vijaykrishnan,
Mahmut T. Kandemir,
Mary Jane Irwin:
Fault Tolerant Algorithms for Network-On-Chip Interconnect.
ISVLSI 2004: 46-51 |
14 | EE | Hendra Saputra,
Guangyu Chen,
Richard R. Brooks,
Narayanan Vijaykrishnan,
Mahmut T. Kandemir,
Mary Jane Irwin:
Code protection for resource-constrained embedded devices.
LCTES 2004: 240-248 |
13 | EE | Richard R. Brooks,
Christopher Griffin,
T. Alan Payne:
A cellular automata model can quickly approximate UDP and TCP network traffic.
Complexity 9(3): 32-40 (2004) |
12 | EE | Richard R. Brooks:
Mobile Code Paradigms and Security Issues.
IEEE Internet Computing 8(3): 54-59 (2004) |
11 | EE | Richard R. Brooks,
Thomas E. Keiser:
Mobile Code Daemons for Networks of Embedded Systems.
IEEE Internet Computing 8(4): 72-79 (2004) |
10 | EE | S. Sitharama Iyengar,
Richard R. Brooks:
Special issue introduction--the road map for distributed sensor networks in the context of computing and communication.
J. Parallel Distrib. Comput. 64(7): 785-787 (2004) |
9 | EE | Richard R. Brooks,
Mengxia Zhu,
Jacob Lamb,
S. Sitharama Iyengar:
Aspect-oriented design of sensor networks.
J. Parallel Distrib. Comput. 64(7): 853-865 (2004) |
8 | EE | Richard R. Brooks,
David Friedlander,
John Koch,
Shashi Phoha:
Tracking multiple targets with self-organizing distributed ground sensors.
J. Parallel Distrib. Comput. 64(7): 874-884 (2004) |
2003 |
7 | EE | Hendra Saputra,
Narayanan Vijaykrishnan,
Mahmut T. Kandemir,
Mary Jane Irwin,
Richard R. Brooks,
Soontae Kim,
Wei Zhang:
Masking the Energy Behavior of DES Encryption.
DATE 2003: 10084-10089 |
6 | | John Zachary,
Richard R. Brooks:
Bidirectional Mobile Code Trust Management Using Tamper Resistant Hardware.
MONET 8(2): 137-143 (2003) |
2002 |
5 | EE | Ying Chen,
Richard R. Brooks,
S. Sitharama Iyengar,
Nageswara S. V. Rao,
Jacob Barhen:
Efficient Global Optimization for Image Registration.
IEEE Trans. Knowl. Data Eng. 14(1): 79-92 (2002) |
4 | EE | Richard R. Brooks,
Nathan Orr:
A Model for Mobile Code Using Interacting Automata.
IEEE Trans. Mob. Comput. 1(4): 313-326 (2002) |
2000 |
3 | | Richard R. Brooks,
Eric Grele,
Wojtek Klimkiewicz,
Jamila Moore,
Christopher Griffin,
Brian Kovak,
John Koch:
Reactive Sensor Networks.
DARS 2000: 471-472 |
1996 |
2 | EE | Richard R. Brooks,
S. Sitharama Iyengar,
Jianhua Chen:
Automatic Correlation and Calibration of Noisy Sensor Readings Using Elite Genetic Algorithms.
Artif. Intell. 84(1-2): 339-354 (1996) |
1 | | Richard R. Brooks,
S. Sitharama Iyengar:
Robust Distributed Comupting and Sensing Algorithm.
IEEE Computer 29(6): 53-60 (1996) |