• Publications
  • Influence
Using Spectral Fingerprints to Improve Wireless Network Security
The proliferation of affordable RF communication devices has given every individual the capability to communicate voice and/or data worldwide. Expand
  • 115
  • 18
Security analysis of the ADS-B implementation in the next generation air transportation system
This paper analyzes the security vulnerabilities associated with the ADS-B implementation. Expand
  • 153
  • 9
Evolution of the air interface of cellular communications systems toward 4G realization
Coding, modulation, and multiple access developments within the evolutional framework of cellular communication systems which spans early first generation (1G) to future fourth generation (4G) systems. Expand
  • 70
  • 8
Radio frequency fingerprinting commercial communication devices to enhance electronic security
There is a current shift toward protecting against unauthorised network access at the open systems physical layer by exploiting radio frequency characteristics that are difficult to mimic. Expand
  • 64
  • 6
Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection
Three new algorithms recommended by the National Institute of Standards and Technology (NIST) for format-preserving encryption could potentially support the encryption of legacy protocols in critical infrastructure assets. Expand
  • 13
  • 5
A general analytic framework for spectrally modulated, spectrally encoded signals
This paper presents a general analytic framework which mathematically incorporates the waveform adaptivity and diversity found in spectrally modulated, spectrALLY encoded (SMSE) signals. Expand
  • 32
  • 4
Enhancing the security of aircraft surveillance in the next generation air traffic control system
This paper evaluates the limitations of the legacy systems currently used in air traffic control and explores the feasibility of employing format-preserving encryption, specifically the FFX algorithm, in the ADS-B environment. Expand
  • 32
  • 3
Detectability models for multiple access low-probability-of-intercept networks
In this paper, two multiple access LPI network detectability models, with their corresponding performance metrics, were developed. Expand
  • 14
  • 3
How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum
In this article, we provide a brief history of the Cyber Defense Exercise (CDX), describe Air Force Institute of Technology's participation in it, and explain how the experience shaped the information-assurance curriculum and course format at AFIT. Expand
  • 37
  • 2
Waveform design and analysis of frequency hopping LPI networks
The concept of a multiple access low-probability-of-intercept (LPI) network has generated considerable interest in the past few years, due to increased demands for highly connected, yet covert,Expand
  • 21
  • 2