Follow
Rusty Baldwin
Rusty Baldwin
Verified email at udayton.edu
Title
Cited by
Cited by
Year
Intrinsic physical-layer authentication of integrated circuits
WE Cobb, ED Laspe, RO Baldwin, MA Temple, YC Kim
IEEE Transactions on Information Forensics and Security 7 (1), 14-24, 2011
1472011
Bluetooth inquiry time characterization and selection
BS Peterson, RO Baldwin, JP Kharoufeh
IEEE Transactions on mobile computing 5 (9), 1173-1187, 2006
1352006
Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting
HJ Patel, MA Temple, RO Baldwin
IEEE transactions on reliability 64 (1), 221-233, 2014
1222014
The use of attack and protection trees to analyze security for an online banking system
K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1122007
An analysis of XML compression efficiency
CJ Augeri, DA Bulutoglu, BE Mullins, RO Baldwin, LC Baird III
Proceedings of the 2007 workshop on Experimental computer science, 7-es, 2007
922007
Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles
MT Hyland, BE Mullins, RO Baldwin, MA Temple
21st International Conference on Advanced Information Networking and …, 2007
922007
A real-time medium access control protocol for ad hoc wireless local area networks
RO Baldwin, NJ Davis IV, SF Midkiff
ACM SIGMOBILE Mobile Computing and Communications Review 3 (2), 20-27, 1999
921999
Physical layer identification of embedded devices using RF-DNA fingerprinting
WE Cobb, EW Garcia, MA Temple, RO Baldwin, YC Kim
2010-Milcom 2010 Military Communications Conference, 2168-2173, 2010
902010
Using relocatable bitstreams for fault tolerance
DP Montminy, RO Baldwin, PD Williams, BE Mullins
Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 701-708, 2007
642007
A survey of state-of-the-art in anonymity metrics
DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins
Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008
632008
A novel communications protocol using geographic routing for swarming uavs performing a search mission
RL Lidowski, BE Mullins, RO Baldwin
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
602009
Improving cross-device attacks using zero-mean unit-variance normalization
DP Montminy, RO Baldwin, MA Temple, ED Laspe
Journal of cryptographic engineering 3, 99-110, 2013
562013
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins
IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011
562011
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations
CM Canadeo, MA Temple, RO Baldwin, RA Raines
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 1, 678-682, 2003
532003
Network intrusion detection: automated and manual methods prone to attack and evasion
DJ Chaboya, RA Raines, RO Baldwin, BE Mullins
IEEE security & privacy 4 (6), 36-43, 2006
512006
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol
RO Baldwin, NJ Davis IV, SF Midkiff, RA Raines
ACM SIGMOBILE Mobile Computing and Communications Review 5 (3), 11-25, 2001
482001
Queueing network analysis: concepts, terminology, and methods
RO Baldwin, NJ Davis Iv, SF Midkiff, JE Kobza
Journal of systems and software 66 (2), 99-117, 2003
442003
Improving the global information grid's performance through satellite communications layer enhancements
VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila
IEEE Communications Magazine 44 (11), 66-72, 2006
422006
Intrinsic physical layer authentication of integrated circuits
WE Cobb, MA Temple, RO Baldwin, EW Garcia, ED Laspe
US Patent 9,036,891, 2015
332015
Detecting anomalous programmable logic controller behavior using rf-based hilbert transform features and a correlation-based verification process
SJ Stone, MA Temple, RO Baldwin
International Journal of Critical Infrastructure Protection 9, 41-51, 2015
312015
The system can't perform the operation now. Try again later.
Articles 1–20