|
Search the dblp DataBase
Robert F. Mills:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. [Citation Graph (0, 0)][DBLP] HICSS, 2007, pp:271- [Conf]
- James S. Okolica, Gilbert L. Peterson, Robert F. Mills
Using Author Topic to Detect Insider Threats from Email Traffic. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:642-643 [Conf]
- Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin
Developing an Insider Threat Model Using Functional Decomposition. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2005, pp:412-417 [Conf]
- Rusty O. Baldwin, Brian S. Peterson, Robert F. Mills
Using playing cards to estimate interference in frequency-hopping spread spectrum radio networks. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2006, v:79, n:12, pp:1782-1788 [Journal]
- Marcus L. Roberts, Michael A. Temple, Mark E. Oxley, Robert F. Mills, Richard A. Raines
A spectrally modulated, spectrally encoded analytic framework for carrier interferometry signals. [Citation Graph (0, 0)][DBLP] IWCMC, 2006, pp:1009-1014 [Conf]
The Enhancement of Graduate Digital Forensics Education via the DC3 Digital Forensics Challenge. [Citation Graph (, )][DBLP]
Using PLSI-U to Detect Insider Threats from Email Traffic. [Citation Graph (, )][DBLP]
An SMSE Implementation of CDMA with Partial Band Interference Suppression. [Citation Graph (, )][DBLP]
Using Spectral Fingerprints to Improve Wireless Network Security. [Citation Graph (, )][DBLP]
Evolution of the air interface of cellular communications systems toward 4G realization. [Citation Graph (, )][DBLP]
Using Author Topic to detect insider threats from email traffic. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|