Search

Your search keyword '"Bollmann, Chad A."' showing total 83 results

Search Constraints

Start Over You searched for: Author "Bollmann, Chad A." Remove constraint Author: "Bollmann, Chad A."
83 results on '"Bollmann, Chad A."'

Search Results

5. MACHINE LEARNING STATISTICAL DETECTION OF ANOMALIES USING NETFLOW RECORDS

6. IDENTIFICATION AND ANALYSIS OF ATTACKS USING RECOVERED RADIO NETWORK TEMPORARY IDENTIFIERS ON 5G USER EQUIPMENT

8. FRAMEWORK FOR ANONYMIZED COVERT COMMUNICATIONS: A BLOCKCHAIN-BASED PROOF-OF-CONCEPT

9. LEVERAGING OPENAIRINTERFACE AND SOFTWARE DEFINED RADIO TO ESTABLISH A LOW-COST 5G NON-STANDALONE ARCHITECTURE

10. ASIC BENCHMARKING FOR PROPOSED LIGHTWEIGHT CRYPTOGRAPHY STANDARD XOODYAK

11. DETECTION OF SYNTHETIC ANOMALIES ON AN EXPERIMENTALLY GENERATED 5G DATA SET USING CONVOLUTIONAL NEURAL NETWORKS

12. A SECURITY-CENTRIC APPLICATION OF PRECISION TIME PROTOCOL WITHIN ICS/SCADA SYSTEMS

13. AIS CYBERSECURITY SYSTEM FOR REDUCING THE ATTACK SURFACE OF VOYAGE NETWORKS

14. IMPLEMENTATION OF TACTICAL OPEN SOURCE 5G MOBILE NETWORKS

15. USAGE OF 5G IN UAV MISSIONS FOR ISR

19. Cyber Systems: Their Science, Engineering, and Security

20. SPECTRAL GRAPH-BASED CYBER DETECTION AND CLASSIFICATION SYSTEM WITH PHANTOM COMPONENTS

21. Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks

22. HARDENING AUTOMATIC IDENTIFICATION SYSTEMS: PROVIDING INTEGRITY THROUGH AN APPLICATION OF LIGHTWEIGHT CRYPTOGRAPHIC TECHNIQUES

23. USER EQUIPMENT-SIDE INITIATION FOR 5G COMMUNICATIONS

24. ADVERSARIAL MACHINE LEARNING FOR PHYSICAL-LAYER AUTHENTICATION

25. A SECURITY-CENTRIC APPLICATION OF PRECISION TIME PROTOCOL WITHIN ICS/SCADA SYSTEMS

26. LEVERAGING OPENAIRINTERFACE AND SOFTWARE DEFINED RADIO TO ESTABLISH A LOW-COST 5G NON-STANDALONE ARCHITECTURE

27. AIS CYBERSECURITY SYSTEM FOR REDUCING THE ATTACK SURFACE OF VOYAGE NETWORKS

28. PERFORMANCE OF HYBRID SIGNATURES FOR PUBLIC KEY INFRASTRUCTURE CERTIFICATES

29. Cyber Systems: Their Science, Engineering, and Security

30. An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities

31. Resilient real-time network anomaly detection using novel non-parametric statistical tests

33. Education is the Next Offset

34. A STATISTICAL ANALYSIS AND ASSESSMENT OF THE IMSI-CATCHING THREAT AGAINST MOBILE SECURITY STANDARDS

35. SPECTRAL GRAPH-BASED CYBER DETECTION AND CLASSIFICATION SYSTEM WITH PHANTOM COMPONENTS

36. HARDENING AUTOMATIC IDENTIFICATION SYSTEMS: PROVIDING INTEGRITY THROUGH AN APPLICATION OF LIGHTWEIGHT CRYPTOGRAPHIC TECHNIQUES

38. Education is the Next Offset

42. Cyber System Assurance through Improved Network Anomaly Modeling and Detection

43. Cyber System Assurance through Improved Network Anomaly Modeling and Detection

44. Improved Detection of Cyber Anomalies

45. Techniques to Improve Stable Distribution Modeling of Network Traffic

50. Improved Detection of Cyber Anomalies

Catalog

Books, media, physical & digital resources