Follow
David Raymond
Title
Cited by
Year
A control measure framework to limit collateral damage and propagation of cyber weapons
D Raymond, G Conti, T Cross, R Fanelli
2013 5th International Conference on Cyber Conflict (CYCON 2013), 1-16, 2013
272013
Annotated memory references: a mechanism for informed cache management
DR Raymond
Duke University, 1998
11998
Annotated memory references: A mechanism for informed cache management
AR Lebeck, DR Raymond, CL Yang, MS Thottethodi
Euro-Par’99 Parallel Processing: 5th International Euro-Par Conference …, 1999
91999
Automatic IoT Device Classification using Traffic Behavioral Characteristics
A Hsu, J Tront, D Raymond, G Wang, A Butt
2019 SoutheastCon, 1-7, 2019
122019
Clustered adaptive rate limiting: Defeating denial-of-sleep attacks in wireless sensor networks
DR Raymond, SF Midkiff
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
492007
Denial-of-service in wireless sensor networks: Attacks and defenses
DR Raymond, SF Midkiff
IEEE Pervasive Computing 7 (1), 74-81, 2008
6822008
Denial-of-sleep vulnerabilities and defenses in wireless sensor network mac protocols
DR Raymond
Virginia Tech, 2008
122008
Designing PhelkStat: Big Data Analytics for System Event Logs
M Salman, B Welch, D Raymond, R Marchany, J Tront
HICSS Symposium on Cybersecurity Big Data Analytics, 2017
32017
Designing PhelkStat: Big Data Analytics for System Event Logs Mohammed Salman∗, Brian Welch∗ and Joseph Tront∗∗ Department of Electrical and Computer Engineering Virginia Tech …
D Raymond, R Marchany
Effects of denial-of-sleep attacks on wireless sensor network MAC protocols
DR Raymond, RC Marchany, MI Brownfield, SF Midkiff
IEEE transactions on vehicular technology 58 (1), 367-380, 2008
3452008
Host Inventory Controls and Systems Survey: Evaluating the CIS Critical Security Control One in Higher Education Networks
P Kobezak, R Marchany, D Raymond, J Tront
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
102018
Impact of Mobility Models on Simulated Ad Hoc Network Performance
D Raymond, I Burbey, Y Zhao, S Midkiff, CP Koelling
Proc. 9th International Symposium on Wireless Personal Multimedia …, 2006
92006
Implementation and Performance Analysis of IP-Layer Chained Puzzles
A Blumer, D Raymond
Integrating information technology and programming in a freshmen computer science course
DR Raymond, DJ Welch
30th Annual Frontiers in Education Conference. Building on A Century of …, 2000
112000
Key terrain in cyberspace: Seeking the high ground
D Raymond, T Cross, G Conti, M Nowatkowski
2014 6th International Conference On Cyber Conflict (CyCon 2014), 287-300, 2014
522014
Leadership of cyber warriors: Enduring principles and new directions
G Conti, D Raymond
Small Wars Foundation, 2011
162011
Location privacy for users of wireless devices through cloaking
CL Bowen, DR Raymond, TL Martin
Hawaii International Conference on System Sciences, Proceedings of the 41st …, 2008
32008
MARCS: mobile augmented reality for cybersecurity
B Mattina, F Yeung, A Hsu, D Savoy, J Tront, D Raymond
Proceedings of the 12th Annual Conference on Cyber and Information Security …, 2017
42017
On Cyber: Towards an operational art for cyber conflict
G Conti, D Raymond
Kopidion Press, 2017
382017
Paradoxes of (Cyber) Counterinsurgency
D Raymond
Cyber Defense Review, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20