Rusty Baldwin
Rusty Baldwin
Verified email at
Cited by
Cited by
Bluetooth inquiry time characterization and selection
BS Peterson, RO Baldwin, JP Kharoufeh
IEEE Transactions on mobile computing 5 (9), 1173-1187, 2006
Intrinsic physical-layer authentication of integrated circuits
WE Cobb, ED Laspe, RO Baldwin, MA Temple, YC Kim
IEEE Transactions on Information Forensics and Security 7 (1), 14-24, 2011
The use of attack and protection trees to analyze security for an online banking system
K Edge, R Raines, M Grimaila, R Baldwin, R Bennington, C Reuter
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
An analysis of XML compression efficiency
CJ Augeri, DA Bulutoglu, BE Mullins, RO Baldwin, LC Baird III
Proceedings of the 2007 workshop on Experimental computer science, 7-es, 2007
Improving ZigBee device network authentication using ensemble decision tree classifiers with radio frequency distinct native attribute fingerprinting
HJ Patel, MA Temple, RO Baldwin
IEEE Transactions on Reliability 64 (1), 221-233, 2014
A real-time medium access control protocol for ad hoc wireless local area networks
RO Baldwin, NJ Davis IV, SF Midkiff
ACM SIGMOBILE Mobile Computing and Communications Review 3 (2), 20-27, 1999
Physical layer identification of embedded devices using RF-DNA fingerprinting
WE Cobb, EW Garcia, MA Temple, RO Baldwin, YC Kim
2010-Milcom 2010 Military Communications Conference, 2168-2173, 2010
Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles
MT Hyland, BE Mullins, RO Baldwin, MA Temple
21st International Conference on Advanced Information Networking and …, 2007
Using relocatable bitstreams for fault tolerance
DP Montminy, RO Baldwin, PD Williams, BE Mullins
Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007), 701-708, 2007
A survey of state-of-the-art in anonymity metrics
DJ Kelly, RA Raines, MR Grimaila, RO Baldwin, BE Mullins
Proceedings of the 1st ACM workshop on Network Data Anonymization, 31-40, 2008
Improving cross-device attacks using zero-mean unit-variance normalization
DP Montminy, RO Baldwin, MA Temple, ED Laspe
Journal of Cryptographic Engineering 3 (2), 99-110, 2013
Code selection for enhancing UWB multiple access communication performance using TH-PPM and DS-BPSK modulations
CM Canadeo, MA Temple, RO Baldwin, RA Raines
2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 1, 678-682, 2003
Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics
D Kelly, R Raines, R Baldwin, M Grimaila, B Mullins
IEEE Communications Surveys & Tutorials 14 (2), 579-606, 2011
A novel communications protocol using geographic routing for swarming uavs performing a search mission
RL Lidowski, BE Mullins, RO Baldwin
2009 IEEE International Conference on Pervasive Computing and Communications …, 2009
Packetized voice transmission using RT-MAC, a wireless real-time medium access control protocol
RO Baldwin, NJ Davis IV, SF Midkiff, RA Raines
ACM SIGMOBILE Mobile Computing and Communications Review 5 (3), 11-25, 2001
Network intrusion detection: automated and manual methods prone to attack and evasion
DJ Chaboya, RA Raines, RO Baldwin, BE Mullins
IEEE security & privacy 4 (6), 36-43, 2006
Queueing network analysis: concepts, terminology, and methods
RO Baldwin, NJ Davis Iv, SF Midkiff, JE Kobza
Journal of systems and software 66 (2), 99-117, 2003
A specification-compatible Bluetooth inquiry simplification
BS Peterson, RO Baldwin, JP Kharoufeh
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
Energy cost and error performance of range-aware, anchor-free localization algorithms
GJ Jordt, RO Baldwin, JF Raquet, BE Mullins
Ad Hoc Networks 6 (4), 539-559, 2008
Emulation-based software protection
WB Kimball, RO Baldwin
US Patent 8,285,987, 2012
The system can't perform the operation now. Try again later.
Articles 1–20