David Raymond
David Raymond
Dirección de correo verificada de
Citado por
Citado por
Denial-of-service in wireless sensor networks: Attacks and defenses
DR Raymond, SF Midkiff
IEEE Pervasive Computing 7 (1), 74-81, 2008
Effects of denial-of-sleep attacks on wireless sensor network MAC protocols
DR Raymond, RC Marchany, MI Brownfield, SF Midkiff
IEEE transactions on vehicular technology 58 (1), 367-380, 2008
Performance evaluation of radio environment map-enabled cognitive spectrum-sharing networks
Y Zhao, D Raymond, C da Silva, JH Reed, SF Midkiff
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
Key terrain in cyberspace: Seeking the high ground
D Raymond, T Cross, G Conti, M Nowatkowski
2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014
Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks
DR Raymond, SF Midkiff
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
Towards a cyber common operating picture
G Conti, J Nelson, D Raymond
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-17, 2013
Teaching introductory programming, problem solving and information technology with robots at West Point
J Schumacher, D Welch, D Raymond
31st Annual Frontiers in Education Conference. Impact on Engineering and …, 2001
On Cyber: Towards an operational art for cyber conflict
G Conti, D Raymond
Kopidion Press, 2017
Scalable, cluster-based anti-replay protection for wireless sensor networks
DR Raymond, RC Marchany, SF Midkiff
2007 IEEE SMC Information Assurance and Security Workshop, 127-134, 2007
A control measure framework to limit collateral damage and propagation of cyber weapons
D Raymond, G Conti, T Cross, R Fanelli
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-16, 2013
When good Ninjas turn bad: Preventing your students from becoming the threat
T Cook, G Conti, D Raymond
Proceedings of the 16th Colloquium for Information System Security Education …, 2012
Leadership of cyber warriors: Enduring principles and new directions
G Conti, D Raymond
Small Wars Foundation, 2011
Automatic IoT Device Classification using Traffic Behavioral Characteristics
A Hsu, J Tront, D Raymond, G Wang, A Butt
2019 SoutheastCon, 1-7, 2019
Denial-of-sleep vulnerabilities and defenses in wireless sensor network mac protocols
DR Raymond
Virginia Tech, 2008
Integrating information technology and programming in a freshmen computer science course
DR Raymond, DJ Welch
30th Annual Frontiers in Education Conference. Building on A Century of …, 2000
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks
P Kobezak, R Marchany, D Raymond, J Tront
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Impact of Mobility Models on Simulated Ad Hoc Network Performance
D Raymond, I Burbey, Y Zhao, S Midkiff, CP Koelling
Proc. 9th International Symposium on Wireless Personal Multimedia …, 2006
Annotated memory references: A mechanism for informed cache management
AR Lebeck, DR Raymond, CL Yang, MS Thottethodi
Euro-Par’99 Parallel Processing: 5th International Euro-Par Conference …, 1999
The current state of cryptocurrency forensics
S Dudani, I Baggili, D Raymond, R Marchany
Forensic Science International: Digital Investigation 46, 301576, 2023
Pen Testing a City
G Conti, T Cross, D Raymond
Black Hat USA, 2015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20