Security analysis of the ADS-B implementation in the next generation air transportation system D McCallie, J Butts, R Mills International Journal of Critical Infrastructure Protection 4 (2), 78-87, 2011 | 310 | 2011 |
Using spectral fingerprints to improve wireless network security WC Suski II, MA Temple, MJ Mendenhall, RF Mills IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 185 | 2008 |
Using attack and protection trees to analyze threats and defenses to homeland security KS Edge, GC Dalton, RA Raines, RF Mills MILCOM 2006-2006 IEEE Military Communications conference, 1-7, 2006 | 141 | 2006 |
A comparison of various radiometer detection models RF Mills, GE Prescott IEEE Transactions on Aerospace and Electronic Systems 32 (1), 467-473, 1996 | 121 | 1996 |
Analyzing attack trees using generalized stochastic petri nets Dalton, Mills, Colombi, Raines 2006 IEEE Information Assurance Workshop, 116-123, 2006 | 106 | 2006 |
Radio frequency fingerprinting commercial communication devices to enhance electronic security WC Suski II, MA Temple, MJ Mendenhall, RF Mills International Journal of Electronic Security and Digital Forensics 1 (3 …, 2008 | 98 | 2008 |
Evolution of the air interface of cellular communications systems toward 4G realization ML Roberts, MA Temple, RF Mills, RA Raines IEEE Communications Surveys & Tutorials 8 (1), 2-23, 2006 | 93 | 2006 |
Enhancing the security of aircraft surveillance in the next generation air traffic control system C Finke, J Butts, R Mills, M Grimaila International Journal of Critical Infrastructure Protection 6 (1), 3-11, 2013 | 75 | 2013 |
Towards insider threat detection using web server logs J Myers, MR Grimaila, RF Mills Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009 | 74 | 2009 |
How the cyber defense exercise shaped an information-assurance curriculum BE Mullins, TH Lacey, RF Mills, JE Trechter, SD Bass IEEE Security & Privacy 5 (5), 40-49, 2007 | 53 | 2007 |
Communication waveform design using an adaptive spectrally modulated, spectrally encoded (SMSE) framework ML Roberts, MA Temple, RA Raines, RF Mills, ME Oxley IEEE Journal of Selected Topics in Signal Processing 1 (1), 203-213, 2007 | 47 | 2007 |
Improving the global information grid's performance through satellite communications layer enhancements VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila IEEE Communications Magazine 44 (11), 66-72, 2006 | 45 | 2006 |
Exploring Potential ADS-B Vulnerabilities in the FAA's Nextgen Air Transportation System DL McCallie, J Butts, R Mills Air Force Institute of Technology, 2011 | 37 | 2011 |
A method for revealing and addressing security vulnerabilities in cyber-physical systems by modeling malicious agent interactions with formal verification DC Wardell, RF Mills, GL Peterson, ME Oxley Procedia computer science 95, 24-31, 2016 | 36 | 2016 |
Using PLSI-U to detect insider threats by datamining e-mail JS Okolica, GL Peterson, RF Mills International Journal of Security and Networks 3 (2), 114-121, 2008 | 36 | 2008 |
A general analytic framework for spectrally modulated, spectrally encoded signals ML Roberts, MA Temple, ME Oxley, RF Mills, RA Raines 2006 International Waveform Diversity & Design Conference, 1-5, 2006 | 35 | 2006 |
Design and analysis of a dynamically configured log-based distributed security event detection methodology MR Grimaila, J Myers, RF Mills, G Peterson The Journal of Defense Modeling and Simulation 9 (3), 219-241, 2012 | 34 | 2012 |
Conceptual systems security requirements analysis: Aerial refueling case study M Span, LO Mailloux, RF Mills, W Young IEEE Access 6, 46668-46682, 2018 | 32 | 2018 |
RIPsec–Using reputation-based multilayer security to protect MANETs TH Lacey, RF Mills, BE Mullins, RA Raines, ME Oxley, SK Rogers computers & security 31 (1), 122-136, 2012 | 31 | 2012 |
Developing an insider threat model using functional decomposition JW Butts, RF Mills, RO Baldwin Computer Network Security: Third International Workshop on Mathematical …, 2005 | 31 | 2005 |