Search

Your search keyword '"McEachen, John"' showing total 581 results

Search Constraints

Start Over You searched for: Author "McEachen, John" Remove constraint Author: "McEachen, John"
581 results on '"McEachen, John"'

Search Results

1. Topological Estimation of Number of Sources in Linear Monocomponent Mixtures

2. Parameter Identification for Malicious Transaction Detection in Blockchain Protocols

7. Symbol Generation and Frame Synchronization for Multipulse-Pulse Position Modulation

8. Error correction code-based embedding in adaptive rate communication system

13. Modeling Traffic Flow Using Conversation Exchange Dynamics for Identifying Network Attacks

14. FRAMEWORK FOR ANONYMIZED COVERT COMMUNICATIONS: A BLOCKCHAIN-BASED PROOF-OF-CONCEPT

15. A MACHINE LEARNING APPROACH FOR CLASSIFYING JAVASCRIPT USING STATIC CODE ANALYSIS

16. A DETAILED ANALYSIS AND OPTIMIZATION OF THE MODIFIED POLAR DECODING RNTI RECOVERY METHOD TO TRACK USER ACTIVITY IN 5G NETWORKS

17. Defining a Covert Analysis Detection (CAD) System and its Stealthy Date Capture, Control and Analysis Capabilities

23. Introduction to the Cellular and Wireless Networks Minitrack

24. Spectral Graph-based Cyber Worm Detection Using Phantom Components and Strong Node Concept

25. The use of partially observable Markov decision processes to optimally implement moving target defense

26. SPECTRAL GRAPH-BASED CYBER DETECTION AND CLASSIFICATION SYSTEM WITH PHANTOM COMPONENTS

27. POSITION ESTIMATE FIDELITY FROM TAG MULTILATERATION ATTACK WITHIN THE 5G ENVIRONMENT

28. AN EVALUATION OF DE-ANONYMIZATION ATTACKS AGAINST PHYSICAL DOWNLINK SHARED CHANNEL DATA IN 5G NEW RADIO

29. A MACHINE LEARNING APPROACH TO NETWORK SECURITY CLASSIFICATION USING NETFLOW DATA

30. Introduction to the Cellular and Wireless Networks Minitrack

32. Resilient real-time network anomaly detection using novel non-parametric statistical tests

34. System and Method for Clock-Skew-Based Covert Communication

35. OPTIMIZATION OF MOVING TARGET DEFENSE USING A PARTIALLY OBSERVABLE MARKOV DECISION PROCESS AND DETERMINIZED SPARSE PARTIALLY OBSERVABLE TREE

36. 5G MILLIMETER-WAVE PHYSICAL-LAYER AUTHENTICATION WITH PLANAR REFLECTORS

37. AN EFFICIENT METHODOLOGY TO DE-ANONYMIZE THE 5G-NEW RADIO PHYSICAL DOWNLINK CONTROL CHANNEL

38. A MOVING TARGET DEFENSE SCHEME WITH OVERHEAD OPTIMIZATION USING PARTIALLY OBSERVABLE MARKOV DECISION PROCESSES WITH ABSORBING STATES

39. SPECTRAL GRAPH-BASED CYBER DETECTION AND CLASSIFICATION SYSTEM WITH PHANTOM COMPONENTS

40. Collaborative Intrusion Detection leveraging Blockchain and Pluggable Authentication Modules

41. Capacity Estimation for Error Correction Code-based Embedding in Adaptive Rate Wireless Communication Systems

42. System and Method for Clock-Skew-Based Covert Communication

Catalog

Books, media, physical & digital resources