Security analysis of the ADS-B implementation in the next generation air transportation system D McCallie, J Butts, R Mills International Journal of Critical Infrastructure Protection 4 (2), 78-87, 2011 | 337 | 2011 |
Using spectral fingerprints to improve wireless network security WC Suski II, MA Temple, MJ Mendenhall, RF Mills IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, 1-5, 2008 | 203 | 2008 |
Using attack and protection trees to analyze threats and defenses to homeland security KS Edge, GC Dalton, RA Raines, RF Mills MILCOM 2006-2006 IEEE Military Communications Conference, 1-7, 2006 | 141 | 2006 |
A comparison of various radiometer detection models RF Mills, GE Prescott IEEE transactions on Aerospace and Electronic Systems 32 (1), 467-473, 2002 | 118 | 2002 |
Analyzing attack trees using generalized stochastic petri nets Dalton, Mills, Colombi, Raines 2006 IEEE Information Assurance Workshop, 116-123, 2006 | 107 | 2006 |
Radio frequency fingerprinting commercial communication devices to enhance electronic security WC Suski II, MA Temple, MJ Mendenhall, RF Mills International Journal of Electronic Security and Digital Forensics 1 (3 …, 2008 | 105 | 2008 |
Evolution of the air interface of cellular communications systems toward 4G realization ML Roberts, MA Temple, RF Mills, RA Raines IEEE Communications Surveys & Tutorials 8 (1), 2-23, 2006 | 98 | 2006 |
Aetiology and pathology of otitis media with effusion in adult life R Mills, I Hathorn The Journal of Laryngology & Otology 130 (5), 418-424, 2016 | 92 | 2016 |
Enhancing the security of aircraft surveillance in the next generation air traffic control system C Finke, J Butts, R Mills, M Grimaila International Journal of Critical Infrastructure Protection 6 (1), 3-11, 2013 | 83 | 2013 |
Towards insider threat detection using web server logs J Myers, MR Grimaila, RF Mills Proceedings of the 5th Annual Workshop on Cyber Security and Information …, 2009 | 76 | 2009 |
How the cyber defense exercise shaped an information-assurance curriculum BE Mullins, TH Lacey, RF Mills, JE Trechter, SD Bass IEEE Security & Privacy 5 (5), 40-49, 2007 | 57 | 2007 |
The role of end-user training in technology acceptance B Marshall, R Mills, D Olsen Review of Business Information Systems (RBIS) 12 (2), 1-8, 2008 | 51 | 2008 |
Results of myringoplasty operations in active and inactive ears in adults R Mills, G Thiel, N Mills The Laryngoscope 123 (9), 2245-2249, 2013 | 50 | 2013 |
Communication waveform design using an adaptive spectrally modulated, spectrally encoded (SMSE) framework ML Roberts, MA Temple, RA Raines, RF Mills, ME Oxley IEEE Journal of Selected Topics in Signal Processing 1 (1), 203-213, 2007 | 47 | 2007 |
Improving the global information grid's performance through satellite communications layer enhancements VP Hubenko, RA Raines, RF Mills, RO Baldwin, BE Mullins, MR Grimaila IEEE Communications Magazine 44 (11), 66-72, 2006 | 45 | 2006 |
A method for revealing and addressing security vulnerabilities in cyber-physical systems by modeling malicious agent interactions with formal verification DC Wardell, RF Mills, GL Peterson, ME Oxley Procedia computer science 95, 24-31, 2016 | 42 | 2016 |
Exploring Potential ADS-B Vulnerabilities in the FAA's Nextgen Air Transportation System DL McCallie, J Butts, R Mills Air Force Institute of Technology, 2011 | 39 | 2011 |
Using PLSI-U to detect insider threats by datamining e-mail JS Okolica, GL Peterson, RF Mills International Journal of Security and Networks 3 (2), 114-121, 2008 | 38 | 2008 |
A general analytic framework for spectrally modulated, spectrally encoded signals ML Roberts, MA Temple, ME Oxley, RF Mills, RA Raines 2006 International Waveform Diversity & Design Conference, 1-5, 2006 | 35 | 2006 |
Conceptual systems security requirements analysis: Aerial refueling case study M Span, LO Mailloux, RF Mills, W Young IEEE Access 6, 46668-46682, 2018 | 34 | 2018 |